Podcast
Root Causes 247: Uber Breach Unpacked


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
October 13, 2022
A recent high-profile breach of Uber's systems led to widespread data loss. Join our experts as we unpack the specifics of how this attack came about.
Podcast Transcript
Lightly edited for flow and brevity.
I’ll read them out and maybe you can give some color here but, obviously, there is a chain of attacks. Well, I shouldn’t say there’s no such thing but it’s quite rare for an attacker just to do one thing and there’s a hack. This isn’t Hollywood movies. There’s typically several steps that an attacker needs to make and the initial move, the initial move, was probably some reconnaissance but really the initial move in and the initial thing that caused a stealing of a credential was social engineering.
So, this isn’t like the old days. I don’t know if you remember once upon a time there were these breaches and someone would get through the perimeter and it was just an open field. Free and they could go wherever they want. That’s not the case. Like they had the right sort of access control in place. The problem was once the user got inside or once the attacker, I should say, got inside they then found additional credentials that were available for harvesting that were stronger than the original credentials that they had.
And here, Tim, this is why we are calling this out – none of that was enough.
And I think that, yes, there’s a number of things you could do. You could go off and scrub review code but are you ever gonna find everything? Well, question mark. But if you completely rethink how you do authentication – obviously, for legacy systems, you gotta think about those things about maybe isolating them more or monitoring them in a different way. But for any kind of systems, especially modern systems that Uber might have been using or that you are using, hey, using client certificates for authentication goes a long way to defeating. You can’t share that credential, Tim.
Look, I’ve been in this industry a long time. So have you. Tim, do you feel completely immune to social engineering? I don’t.

