X

Uber: No Evidence of Sensitive Data Breached in Security Incident

Several internal communications and engineering systems were taken down in the wake of the hack, The New York Times reports.

Steven Musil Night Editor / News
Steven Musil is the night news editor at CNET News. He's been hooked on tech since learning BASIC in the late '70s. When not cleaning up after his daughter and son, Steven can be found pedaling around the San Francisco Bay Area. Before joining CNET in 2000, Steven spent 10 years at various Bay Area newspapers.
Expertise I have more than 30 years' experience in journalism in the heart of the Silicon Valley.
Corinne Reichert Senior Editor
Corinne Reichert (she/her) grew up in Sydney, Australia and moved to California in 2019. She holds degrees in law and communications, and currently writes news, analysis and features for CNET across the topics of electric vehicles, broadband networks, mobile devices, big tech, artificial intelligence, home technology and entertainment. In her spare time, she watches soccer games and F1 races, and goes to Disneyland as often as possible.
Expertise News, mobile, broadband, 5G, home tech, streaming services, entertainment, AI, policy, business, politics Credentials
  • I've been covering technology and mobile for 12 years, first as a telecommunications reporter and assistant editor at ZDNet in Australia, then as CNET's West Coast head of breaking news, and now in the Thought Leadership team.
Steven Musil
Corinne Reichert
2 min read
An illuminated keyboard and an index finger hitting the return key

Uber is responding to a cybersecurity incident.

James Martin/CNET

Uber's computer network was breached Thursday, leading the ride-hailing giant to take several internal communications and engineering systems offline as it investigated the hack, as reported earlier by The New York Times.

Uber said its investigation is ongoing as of Friday at 10:30 a.m. PT, but said there's "no evidence that the incident involved access to sensitive user data."

Uber, Uber Eats, Uber Freight and Uber Drive were all up and running on Friday, and Uber is now bringing back online its internal software tools.

Uber had said in an earlier statement that it is investigating a cybersecurity incident and is in contact with law enforcement officials. The FBI is reportedly helping Uber investigate the incident. Uber didn't immediately respond to a request for comment on this.

On Thursday, the company had instructed employees not to use workplace messaging app Slack, the report said, citing two employees. Other internal systems were also inaccessible, the Times reported.

According to the Times, shortly before Slack was taken offline Thursday afternoon, Uber employees received a message on the app that read: "I announce I am a hacker and Uber has suffered a data breach." The message also listed several internal databases that the hacker claimed had been compromised, the Times reported.

The hacker, who said he was 18 years old, said he was motivated by what he called weak security and provided screenshots of internal Uber systems to prove his access, the Times reported.

The hacker sent the message through the app after compromising a worker's account, Uber told the Times. The hacker apparently was also able to gain access to other internal systems, posting an explicit photo on an internal information page for employees, the newspaper reported.

Uber has been hacked before. In 2018, it agreed to a $148 million settlement over a 2016 data breach the ride-hailing service failed to disclose. Hackers were able to steal data on 57 million drivers and riders, including personal information such as names, email addresses and driver's license numbers.

Rather than publicly disclosing the hack, which companies are required to do within a certain number of days in states like California, Uber paid the hackers $100,000 to delete the information and had them sign a nondisclosure agreement.

Joe Sullivan, who served as Uber's security chief from April 2015 to November 2017, was indicted in 2020 for allegedly covering up the breach. Sullivan described the payment as a bug bounty reward, which companies often pay to researchers who discover security flaws, but prosecutors said the payment was more of a cover-up than a bounty reward.