Il Messaggiere - Young hacker tricks way into Uber's system: reports

NYSE - LSE
CMSC -0.2% 24.52 $
BTI 0.61% 37.94 $
BP 0.58% 29.13 $
NGG 0.79% 63.33 $
GSK 0.9% 34.33 $
AZN 1.25% 67.2 $
RBGPF 1.61% 62 $
SCS -0.52% 13.47 $
RELX 0.51% 47.05 $
RIO 0.47% 62.32 $
BCC -1.37% 146.4 $
JRI 1.27% 13.41 $
RYCEF 1.59% 6.91 $
CMSD -0.29% 24.36 $
BCE 1.44% 27.02 $
VOD 1.23% 8.97 $
Young hacker tricks way into Uber's system: reports
Young hacker tricks way into Uber's system: reports / Photo: JUSTIN SULLIVAN - GETTY IMAGES NORTH AMERICA/AFP

Young hacker tricks way into Uber's system: reports

Uber said Friday it was investigating a "cybersecurity incident," declining to comment on reports a young hacker had gained access to the ride-hailing company's computer network.

Text size:

Uber put out word of the breach late Thursday in a tweet, and a hacker claiming to be 18 years old then posted screenshots taken from inside Uber computers.

"He says that he simply -- having already determined a valid username and password -- tricked an Uber staff member into granting him access to internal systems," independent cybersecurity analyst Graham Cluley said at his website.

Online comments purported to be by the hacker indicated he targeted an Uber employee with notifications for more than an hour, then reached out to the worker via WhatsApp claiming to be member of the company's tech support team.

"Many other companies are probably at risk of falling for a similar trick," Cluley said.

Uber said Friday that its services were all operational and that it had "no evidence that the incident involved access to sensitive data" such as users' trip history.

Employee software tools shut down as a precaution were being gradually restarted, the San Francisco based company added.

"There's a reason cybersecurity experts say that the human is often the weakest link," said Ray Kelly, a fellow at Synopsys Software Integrity Group in Silicon Valley.

"Whether it be phishing/SMS attacks or a simple phone call to get an employee to give up their credentials, 'social engineering' is going to be the easiest route for a malicious actor."

S.Rovigatti--IM