• Latest
  • Trending
18-year-old hacks, steals sensitive information from Uber

18-year-old hacks and steals sensitive information from Uber

September 23, 2022
African startups raised $141.7 million in September 2025

African startups raised $141.7 million in September 2025

October 17, 2025
Pre-seed funding round fuels Tunisian startup PAYDAY with $3 million

Pre-seed funding round fuels Tunisian startup PAYDAY with $3 million

October 17, 2025
YouTube updates its user interface across all devices

YouTube updates its user interface across all devices

October 17, 2025
Tech companies dominate Interbrand’s 2025 Best Global Brands

Tech companies dominate Interbrand’s 2025 Best Global Brands

October 17, 2025
Innoson, Nigerian automaker, unveils plan to establish CNG assembly plant

Innoson, Nigerian automaker, unveils plan to establish CNG assembly plant

October 16, 2025
Spotify testing ‘SongDNA’ to show everyone behind your songs

Spotify testing ‘SongDNA’ to show everyone behind your songs

October 16, 2025
$395mn submarine cable project, Medusa, begins deployment to link Europe to Africa

$395mn submarine cable project, Medusa, begins deployment to link Europe to Africa

October 16, 2025
Chari raises $12M, gets Morocco’s first VC-backed payment license

Chari raises $12M, gets Morocco’s first VC-backed payment license

October 16, 2025
NCBA unveils ConnectPlus to improve businesses in Kenya

NCBA unveils ConnectPlus to improve businesses in Kenya

October 16, 2025
Slack supercharges Slackbot with smarter AI capabilities

Slack supercharges Slackbot with smarter AI capabilities

October 16, 2025
Gemini AI now handles your Google Calendar meeting scheduling

Gemini AI now handles your Google Calendar meeting scheduling

October 16, 2025
Sun King, REA partner to boost access to clean energy

Sun King, REA partner to boost access to clean energy

October 16, 2025
Techpression
Advertisement
  • Tech News
    • Africa Tech
    • Global Tech
    • Tech with Pelumy
    • Tech Careers
    • Tech TV
    • General News
    • How To
    • Reviews
  • Cryptocurrency
  • Fintech
  • Startups
  • Ai
Saturday, October 18, 2025
No Result
View All Result
  • Tech News
    • Africa Tech
    • Global Tech
    • Tech with Pelumy
    • Tech Careers
    • Tech TV
    • General News
    • How To
    • Reviews
  • Cryptocurrency
  • Fintech
  • Startups
  • Ai
No Result
View All Result
Techpression
No Result
View All Result
Home Tech News Africa Tech News

18-year-old hacks and steals sensitive information from Uber

Staff Writer by Staff Writer
September 23, 2022
in Africa Tech News, Business, Business Strategy, Cybercrime, Data, Editors Pick, Tech News, Technology
149 1
0
18-year-old hacks, steals sensitive information from Uber
465
SHARES
Share on FacebookShare on TwitterWhatsAppTelegram

On Thursday, Uber employees learned that a hacker had gained access to extensive portions of the company’s internal network and boasted about it on the official Slack channel. According to the news source that broke the story, the intruder showed The New York Times and security researchers screenshots of the breach and was unusually open about how it happened and how far it went.

Findings show that the intruder most likely used WhatsApp to contact an Uber employee to get first access.

The hacker gained access to the user’s account by stealing the password and convincing the user to approve a push notification for multi-factor authentication. Finally, the invader found administrator credentials that granted access to some of Uber’s most prized network assets. Uber shut down parts of its internal network while it looked into how big the problem was.

Read also: Lapsus$ Group Attacks Microsoft and Okta in Cyber Hack

RelatedPosts

Uber exits Côte d’Ivoire, rival Yango expands

Uber exits Côte d’Ivoire, rival Yango expands

September 30, 2025
In Ghana, Uber Raises Minimum Fare for Rides

Uber-Mastercard partnership to deliver faster payouts, perks for users

July 27, 2025

WeRide, Uber expand self-driving vehicle partnership to 15 cities worldwide

May 9, 2025

SimpliRide offers Nigerian drivers N500 daily fee, dismantling Uber and Bolt’s 25% commission model

March 11, 2025
Load More

What information the hacker accessed or what else the hacker did is still unclear. Uber kept a lot of information that could have been accessed, like people’s private addresses and where they were every hour.

Who is responsible for the Uber hack?

The hacker socially engineered the Uber employee after discovering the employee’s WhatsApp number; the hacker messaged the employee directly and told them to go to a phoney Uber site, which then captured their credentials in real-time and used them to access the accurate Uber site.

Multi-factor authentication, or MFA, was in place at Uber as a mobile app requiring users to enter a code displayed on their smartphone before gaining access. The hacker repeatedly typed the credentials into the simple site to get around this security. The worker, who appeared to be dazed or exhausted, pressed the button. The attacker was successfully warded off after that.

After digging around, the attacker found several Powershell scripts an administrator had saved that would automatically log them into various secure network compartments. The required login information was already included in the scripts.

To brag about his victory, the assailant allegedly sent texts to all of Uber’s employees through the company’s Slack channels.

One message reportedly claimed, “I announce I am a hacker, and Uber has suffered a data breach.” Screenshots showed that the person had access to Uber’s Amazon Web Services and G Suite accounts and its code repositories.

It is yet unknown what other information the hacker gained access to or if any of it was copied or leaked. As of Friday, Uber’s disclosure website now reads, “We have no evidence that the incident involved access to sensitive user data (like trip history).”

The outcome of the hack

Not much. The individual, who claims to be 18, posted to Uber driver support forums on Slack to express dissatisfaction with pay. Because of this, and because the invader made no effort to hide the breach, it’s safe to assume that the motivation behind the attack was not financial gain via ransomware, extortion, or espionage. Until now, nobody knew who this person was.

The business has admitted to the security breach and is now looking into it.

Was it possible that a teenager, only 18 years old, gained access to the most secret information of a multinational corporation? How is that even possible?

Read also: Cybercrime in Nigeria: Increasingly Sophisticated Crimes Part 2

While it’s too early to tell, this situation seems possible, if not likely. Still, phishing is a highly successful method of network penetration. Why use a zero-day exploit when there are more straightforward and cheaper ways to get in?

Furthermore, phishing assaults have become more sophisticated in recent months. The recent hack of Twilio is just one example of a widespread attack that has affected various businesses. The attackers used Telegram; the phishing page sent the user’s credentials to the attackers, who then used them to access the legitimate website. The attackers matched the user’s entry of a one-time password provided by an authenticator software. Even if an employee used a security tool like Duo to keep unauthorised users out of their account, the hackers would still be able to access it as soon as the employee consent.

If a user’s password is stolen in a database hack, this multi-factor authentication system will keep them safe. However, it has been shown that they are entirely ineffective against phishing attempts. Phishing-resistant multi-factor authentication (MFA) is now only available in FIDO2-compliant forms. There is no better MFA programme than this one.

Read More: Get latest update on Africa Tech News 

The widespread misconception that people in modern societies are too savvy to fall for phishing campaigns continues to plague many institutions and communities. They find authenticator apps more practical than FIDO2 multi-factor authentication methods, which include carrying a phone or a physical key. Until that way of thinking changes, breaches of this kind will always be a part of life.

On Friday, Uber’s stock price fell by over 4% because of a widespread sell-off that pushed down the prices of shares in many other companies. Indicators on the Dow Jones Industrial Average were down 1%. The S& P 500 fell 1.2 per cent, and the Nasdaq Composite fell 1.6 per cent, respectively. Why Uber’s stock is down and what role the breach has had in that decline remains unclear.

Tags: HackHackersUber
Staff Writer

Staff Writer

Quick Links

  • Tech News
  • Cryptocurrency
  • Fintech
  • Startups
  • Business
  • Home
  • About
  • Contact Us
  • Advert Rate
  • Terms & Conditions
  • Privacy Policy
  • SiteMap

© 2025 Techpression

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

We are using cookies to give you the best experience on our website.

You can find out more about which cookies we are using or switch them off in .

No Result
View All Result
  • Home
  • Tech News
    • Africa Tech
    • Global Tech
    • Tech with Pelumy
    • Tech Careers
    • Reviews
    • How To
    • General News
  • Cryptocurrency
  • Business
  • Fintech
  • Startups
  • Featured
  • Ai
  • Tech TV

© 2025 Techpression

techpression.com
Powered by  GDPR Cookie Compliance
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

3rd Party Cookies

This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.

Keeping this cookie enabled helps us to improve our website.