fbpx

Uber Kept Secret Data Breach Affected 57 Million Customers

Uber covered a hack that affected 57 million clients and drivers, the organization has confirmed.

The 2016 breach was covered up by the ride-sharing firm Uber which paid hackers $100,000 (£75,000) to erase the information.

The organization’s previous CEO Travis Kalanick thought about the rupture over a year back, as indicated by Bloomberg, which initially broke the news.

The hackers discovered 57 million names, email locations and cell phone numbers, Uber said.

Inside that number, 600,000 drivers had their names and permit subtle elements uncovered. An resource page for those influenced has been set up.

Drivers have been offered free credit observing insurance, yet as indicated by Uber’s announcement, influenced clients won’t be given the same.

“While we have not seen evidence of fraud or misuse tied to the incident, we are monitoring the affected accounts and have flagged them for additional fraud protection,” Uber’s chief executive Dara Khosrowshahi said.

“None of this should have happened, and I will not make excuses for it,” he added.
“While I can’t erase the past, I can commit on behalf of every Uber employee that we will learn from our mistakes.”

In the wake of the news, Uber’s chief security officer Joe Sullivan has left the company.

Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...