Decoding Disaster: How a Single Breach Unraveled Uber’s Cyber Defenses

Kamesh
InfoSec Write-ups
Published in
2 min readApr 19, 2024

--

An In-Depth Look at the Security Lapses That Led to Uber’s 2022 Cyber Catastrophe

Introduction

On September 15, 2022, Uber suffered a whopping security breach, which revealed significant vulnerabilities in corporate cybersecurity measures. This hideous breach was managed by an individual linked to what I believe was the infamous Lapsus$ group, and it facilitated an extensive organizational takeover. There was a severe escalation in cybersecurity threats.

So, what’s the Uber Breach?

So, the attack began with this super clever social engineering campaign, which was a target practice on one external contractor. There is some creepy stuff about this, as the attacker got their hands on the credentials through the dark web. The hacker then accessed Uber’s VPN and exploited hardcoded credentials in PowerShell scripts. This gave them access to a domain admin account for Uber’s Privileged Access Management (PAM) system, Thycotic.

Source: https://twitter.com/hacker_/status/1570582547415068672/photo/1

Taking it all Apart

First Foot in Door: They bought credentials from the dark web, which gave them entry to the .corp.uber.com network, using a dodgy VPN.

How did they get in? It went worse from their hardcoded passwords in this PowerShell script, which gave them admin keys to Thycotic, which runs Uber’s PAM.

Taking Over: When they took command of Thycotic, they obtained several essential systems: AWS, GCP, Slack, SentinelOne, and Uber’s internal repositories.

Damage Report: This disaster rippled out in several directions:

  • Thycotic (Real Bad): Admin control of PAM systems, like Thycotic, gave the thief the whole shebang, letting them see all our secrets.
  • AWS and VMware vSphere (Also Terrible): Control over these platforms potentially affected Uber’s entire cloud infrastructure and virtualization capabilities.
  • SentinelOne (Bad Enough): Fiddling with this XDR platform could’ve made it hard to see what they were up to, especially with all the dust they were kicking up.
  • Slack and GSuite (So-So): These parts could’ve let them do more phishing tricks and grab even more data.

What can we learn here?

  • Do you work with Strong Credential Management in mind? Firms must stop using hardcoded credentials and get a grip on secret management.
  • Better Monitoring and fast response: Spotting stuff going on all the time and quickly responding is pure gold in stopping a breach from being a disaster.
  • Remember to teach your staff and outside contracted folks: Regular training on how to spot dodgy stuff and ward off phishing is important for all employees, including those contract ones.

Conclusion

Last but not least, This breach signifies a severe security failure and is a crucial learning point for organizations worldwide. It emphasizes the need for stringent security practices, continuous vigilance, and proactive defense strategies to protect against sophisticated cyber threats.

References

--

--