Uber Pays Hackers $100,000 to Conceal Breach Affecting 57 Million Users and Drivers

Bloomberg
Uber Pays Hackers $100,000 to Conceal Breach Affecting 57 Million Users and Drivers
Image: Wikimedia Commons

What happened

Hackers accessed Uber's GitHub repository, found AWS credentials in code, and downloaded data for 57 million riders and drivers in late 2016. Uber's security team paid the attackers $100,000 through its bug bounty program to delete the data and stay silent, concealing the breach from regulators and the public for a year.[1]

What went wrong

AWS credentials were committed to a private GitHub repository and never rotated. Uber's security leadership then made the deliberate decision to pay the attackers as a "bug bounty" rather than disclose the breach — a decision that resulted in criminal charges against its CSO.[1]

Lesson learned

Secrets must never be stored in source code, even in private repositories. Breach disclosure is a legal obligation in most jurisdictions; concealment compounds the original failure into a criminal matter. Cover-ups cost far more than the breach itself.

Est. value burned ~$148M $148M state AG settlement

Sources

  1. [1] Bloomberg Uber Pays Hackers $100,000 to Conceal Breach Affecting 57 Million Users and Drivers