Categories: Technology

Uber Conducting Probe After Vendor Hit With Cyberattack – HT Tech

Copyright © HT Media Limited
All rights reserved.
Uber Technologies Inc. said it’s investigating the hack of a third-party vendor that reportedly resulted in the leak of data from the ride-hailing company, including employee email addresses.
The vendor, Teqtivity, which helps manage and track information technology equipment such as phones and computers, on Monday confirmed the cyberattack.
More than 77,000 Uber employees’ email addresses and other data, including alleged source code associated with mobile device management platforms used by Uber and Uber Eats, have been leaked as part of the recent hack, according to a report from Bleeping Computer, which covers information security and technology news.
“We believe these files are related to an incident at a third-party vendor and are unrelated to our security incident in September,” said Carissa Simons, the Uber spokesperson. “Based on our initial review of the information available, the code is not owned by Uber; however, we are continuing to look into this matter.”
Teqtivity said in a statement it doesn’t collect or store sensitive information such as bank account details or government identification numbers. The exposed data includes device information such as serial number, make and model as well as user information such as full name, work email address and location.
Teqtivity said customer data was compromised due to unauthorized access to its systems by a malicious third party. The hacker was was able to gain access to the Teqtivity AWS backup server that houses the company’s code and data files related to its customers, according to the company.
Teqtivity has notified law enforcement officials and hired a forensics firm to investigate all logs and server configuration.
The leak is the latest breach to affect Uber. Uber said the attackers (or attacker) responsible for a September breach were affiliated with the notorious extortion group called Lapsus$ and had likely infected a contractor’s personal device with malware and then bought that person’s password on the dark web.
In that instance, the intruders were able to get into several employee accounts and had security permissions for Uber’s G-Suite and Slack, among other internal tools.
In October, former Uber security chief Joe Sullivan was found guilty of hiding a massive 2016 data breach from federal regulators.
Follow HT Tech for the latest tech news and reviews , also keep up with us on Twitter, Facebook, Google News, and Instagram. For our latest videos, subscribe to our YouTube channel.
71670922806636

source

InfoLair

Our primary beliefs and values include giving our readers quality material, disseminating information to encourage informed thinking, and supporting policies and ideas. We frequently curate or extract content from reliable online sources in order to uphold those ideals.

Recent Posts

Homebase in administration: What went wrong and what next? – Retail Gazette

To read the full article click below: Homebase in administration: What went wrong and what… Read More

9 hours ago

Ukraine war latest: Kyiv's army 'in trouble' – with Putin's forces in 'ascendancy' – Sky News

Ukraine war latest: Kyiv's army 'in trouble' - with Putin's forces in 'ascendancy'  Sky News Source Read More

4 days ago

Princess Anne makes significant change for the first time in 50 years – GB News

Princess Anne makes significant change for the first time in 50 years  GB NewsPrincess Anne changes… Read More

5 days ago

Glowy Glam Spring Makeup Tutorial – MSN

Glowy Glam Spring Makeup Tutorial  MSN Source Read More

6 days ago

How To Use Audience Segmentation To Diversify Your Marketing (2024) – Shopify

To read the full article click below: How To Use Audience Segmentation To Diversify Your… Read More

1 week ago

‘I want to take care of me’: Why more American women are moving abroad for a better life – USA TODAY

To read the full article click below: 'I want to take care of me': Why… Read More

1 week ago

This website uses cookies.