Uber Names Hacking Group Responsible for Cyberattack

Uber says the attack was affiliated with Lapsus$.

Macy Meyer Editor I
Macy Meyer is a N.C. native who graduated from UNC-Chapel Hill in 2021 with a B.A. in English and Journalism. She currently resides in Charlotte, N.C., where she has been working as an Editor I, covering a variety of topics across CNET's Home and Wellness teams, including home security, fitness and nutrition, smart home tech and more. Prior to her time at CNET, Macy was featured in The News & Observer, The Charlotte Observer, INDY Week, and other state and national publications. In each article, Macy helps readers get the most out of their home and wellness. When Macy isn't writing, she's volunteering, exploring the town or watching sports.
Expertise Macy covers a variety of topics across CNET's Home and Wellness teams, including home security, smart home tech, fitness, nutrition, travel, lifestyle and more. Credentials
  • Macy has been working for CNET for coming on 2 years. Prior to CNET, Macy received a North Carolina College Media Association award in sports writing.
Macy Meyer
2 min read
Uber logo on mobile phone

Uber says no personal data was compromised, and services are back to normal and running smoothly. 

Angela Lang/CNET

Uber's computer network was breached by a cyberattacker last Thursday, who Uber now says hacked into the account of an EXT contractor after likely purchasing the employee's credentials from the dark web. In a blog post Monday, Uber said it is likely the contractor's personal device had been infected with malware, leading to those credentials becoming exposed.

Though Uber has online safety precautions in place for employee logins, the contractor unknowingly accepted a verification notification that ultimately granted the attacker access, the ride-share company said. From there, the attacker accessed several employee accounts and tools such as G-Suite and Slack. 

Uber laid the blame on hacking group Lapsus$, which used similar attacks to breach Microsoft, Cisco, Samsung, Nvidia, Okta and others in 2022. Lapsus$ was most recently reported to have been responsible for breaching Rockstar Games last Sunday and leaking early gameplay footage of Grand Theft Auto VI.

Uber also confirmed a report last week that the hacker sent a message to a company-wide Slack channel and "reconfigured Uber's OpenDNS to display a graphic image to employees on some internal sites." 

In its post, Uber says no personal data was compromised and services -- including Uber, Uber Eats, Uber Freight services and internal tools -- are back to normal and running smoothly. 

"First and foremost, we've not seen that the attacker accessed the production (ie public-facing) systems that power our apps; any user accounts; or the databases we use to store sensitive user information, like credit card numbers, user bank account info or trip history," Uber said. "We also encrypt credit card information and personal health data, offering a further layer of protection."

Uber says it immediately worked to respond to the security breach to protect internal systems and user data, including identifying employee accounts that were compromised and either blocking their access to Uber systems or requiring a password reset; disabling several internal tools; resetting access to many internal services; locking down the codebase; requiring employees to re-authenticate when access was restored; and adding internal environment monitoring "to keep an even closer eye on any further suspicious activity."

Uber said it is closely working with the FBI, the US Department of Justice and "several leading digital forensics firms" on the ongoing investigation.

The attack on Thursday led Uber to temporarily take down several internal communications and engineering systems, and it instructed employees not to use Slack. By Friday morning, Uber, Uber Eats, Uber Freight and Uber Drive were all up and running, and Uber was bringing back online its internal software tools.