Uber CISO: There was no justification for hiding data breach

Senators slam taxi firm for cover-up of hack affecting 57 million people

Uber's CISO yesterday admitted that there was "no justification" for covering up a huge data breach affecting millions of customers and drivers.

The breach, which was first reported in November last year, exposed the personal information of 57 million users, including 2.7 million in the UK, as well as the license numbers of roughly 600,000 drivers.

Uber's John Flynn told US lawmakers at a Senate hearing yesterday that the company made an error in not disclosing the intrusion to the authorities and to its customers, saying: "We made a misstep in not reporting to consumers, and I think we made a misstep in not reporting to law enforcement."

Rather than report the breach, Uber paid one of the two hackers responsible $100,000 to keep the breach under wraps and to not leak the stolen data.

Senators also noted that while Uber was covering this breach up, it was in the midst of negotiations with the Federal Trade Commission over a settlement for an earlier data breach.

The money was delivered through a bug bounty programme - a framework usually used to reward ethical hackers for reporting flaws to companies rather than exploiting them. Flynn acknowledged in his testimony that this use of the bug bounty programme was 'inappropriate'.

"We recognise that the bug bounty programme is not an appropriate vehicle for dealing with intruders who seek to extort funds from the company," he said. "The approach that these intruders took was separate and distinct from those of the researchers in the security community for whom bug bounty programs are designed."

Legislators slammed Uber over its conduct, calling its actions "morally wrong and legally reprehensible".

"There ought to be no question here that Uber's payment of this blackmail without notifying consumers who were greatly at risk was morally wrong and legally reprehensible and violated not only the law but the norm of what should be expected," said Democratic senator Richard Blumenthal.

"The fact that the company took approximately a year to notify impacted users raises red flags within this committee as to what systemic issues prevented such time-sensitive information from being made available to those left vulnerable," added Republican and Senate panel chairman senator Jerry Moran.

Featured Resources

Shining light on new 'cool' cloud technologies and their drawbacks

IONOS Cloud Up! Summit, Cloud Technology Session with Russell Barley

Watch now

Build mobile and web apps faster

Three proven tips to accelerate modern app development

Free download

Reduce the carbon footprint of IT operations up to 88%

A carbon reduction opportunity

Free Download

Comparing serverless and server-based technologies

Determining the total cost of ownership

Free download

Recommended

Senate report slams agencies for poor cyber security
cyber security

Senate report slams agencies for poor cyber security

3 Aug 2021
Most employees put their workplace at risk by taking cyber security shortcuts
cyber security

Most employees put their workplace at risk by taking cyber security shortcuts

27 Jul 2021
61% of organizations say improving security a top priority for 2021
cyber security

61% of organizations say improving security a top priority for 2021

29 Jun 2021
ProtectedBy.AI’s CodeLock blocks malware at source code level
software as a service (SaaS)

ProtectedBy.AI’s CodeLock blocks malware at source code level

9 Jun 2021

Most Popular

What should you really be asking about your remote access software?
Sponsored

What should you really be asking about your remote access software?

17 Nov 2021
Jack Dorsey resigns as Twitter CEO
business management

Jack Dorsey resigns as Twitter CEO

29 Nov 2021
Nike to take customers into the metaverse with 'NIKELAND'
virtualisation

Nike to take customers into the metaverse with 'NIKELAND'

19 Nov 2021