Uber Data Leaked Following Breach at Third-Party Vendor By Orbit Brain December 13, 2022 0 313 views Dwelling › Incident ResponseUber Knowledge Leaked Following Breach at Third-Celebration VendorBy Eduard Kovacs on December 13, 2022TweetData apparently belonging to ride-hailing large Uber has been leaked on-line and the supply of the information is probably going a third-party IT vendor.Over the weekend, a consumer with the moniker ‘UberLeak’ made public on a hacker discussion board a 600 Mb archive file allegedly containing 20 million data of information coming from Uber techniques.An evaluation of the recordsdata performed by SecurityWeek exhibits supply code, inner job administration info, encryption keys, and over a dozen paperwork every containing tons of or 1000’s of Uber e mail addresses.One spreadsheet named ‘report’ comprises what seems to be an inventory of greater than 16,000 worker names and e mail addresses. One other spreadsheet named ‘customers’ comprises the names, e mail addresses and worker IDs for over 5,000 individuals.A really small archive file allegedly related to the Uber Eats meals supply platform was additionally leaked by the identical consumer, nevertheless it solely seems to include take a look at information.Uber confirmed in September {that a} hacker had accessed inner instruments after an exterior contractor’s account was compromised.Nonetheless, in an announcement to RestorePrivacy, Uber mentioned the brand new leak shouldn’t be associated to the September incident. As an alternative, it seems the information originates from IT asset administration software program supplier Teqtivity.It’s value noting that the identical hacker additionally leaked 18 Mb and 25 Mb archive recordsdata allegedly containing information related to Teqtivity and journey administration firm TripActions. These archives seem to include software supply code.Teqtivity printed an announcement on Monday, confirming that buyer information was compromised after a “malicious third occasion” gained entry to its techniques.“The third occasion was in a position to achieve entry to our Teqtivity AWS backup server that housed Teqtivity code and information recordsdata associated to Teqtivity prospects,” the corporate mentioned.Based on Teqtivity, the investigation is ongoing, however up to now it has confirmed that the uncovered recordsdata embrace gadget info akin to serial quantity, make and mannequin, and technical specification, in addition to consumer info, together with first and final identify, work e mail handle, and work location particulars. The agency mentioned it doesn’t acquire private info akin to dwelling addresses, authorities identification numbers or banking info.Uber continues to be investigating the incident, nevertheless it mentioned the supply code doesn’t appear to belong to the corporate.Associated: Critical Breach at Uber Spotlights Hacker Social DeceptionAssociated: Former Uber CISO Joe Sullivan Discovered Responsible Over Breach Cowl-UpGet the Each day Briefing Most CurrentMost LearnMapping Menace Intelligence to the NIST Compliance FrameworkNSA Outs Chinese language Hackers Exploiting Citrix Zero-DaySnyk Raises $196.5 Million at $7.four Billion ValuationPasskeys Now Absolutely Supported in Google ChromeRansomware Group Threatens to Publish Knowledge Stolen From California Division of FinanceNew Python-Based mostly Backdoor Focusing on VMware ESXi ServersTwitter Responds to Current Knowledge Leak ExperiencesUber Knowledge Leaked Following Breach at Third-Celebration VendorFortinet Ships Emergency Patch for Already-Exploited VPN FlawProofpoint Buys Deception Tech Startup Illusive NetworksSearching for Malware in All of the Fallacious Locations?First Step For The Web’s subsequent 25 years: Including Safety to the DNSTattle Story: What Your Laptop Says About YouBe in a Place to Act By means of Cyber Situational ConsciousnessReport Reveals Closely Regulated Industries Letting Social Networking Apps Run Rampant2010, A Nice 12 months To Be a Scammer.Do not Let DNS be Your Single Level of FailureThe way to Establish Malware in a BlinkDefining and Debating Cyber WarfareThe 5 A’s that Make Cybercrime so EngagingThe way to Defend Towards DDoS AssaultsSafety Budgets Not in Line with ThreatsAnycast – Three Causes Why Your DNS Community Ought to Use ItThe Evolution of the Prolonged Enterprise: Safety Methods for Ahead Pondering OrganizationsUtilizing DNS Throughout the Prolonged Enterprise: It’s Dangerous EnterpriseShare this:FacebookXPrintEmailLinkedInRedditTwitterTumblrPinterestTelegramWhatsApp breach data leak Teqtivity Uber Orbit Brainhttps://orbitbrain.com/ Orbit Brain is the senior science writer and technology expert. Our aim provides the best information about technology and web development designing SEO graphics designing video animation tutorials and how to use software easy waysand much more. Like Best Service Latest Technology, Information Technology, Personal Tech Blogs, Technology Blog Topics, Technology Blogs For Students, Futurism Blog.
Using the Defense Readiness Index to Improve Security Team SkillsIntroducing the Cyber Security News Using the Defense Readiness Index to Improve Security Team Skills.... June 16, 2022 Cyber Security News
Label Giant Multi-Color Corporation Discloses Data BreachIntroducing the Cyber Security News Label Giant Multi-Color Corporation Discloses Data Breach.... October 31, 2022 Cyber Security News
Privilege Escalation Flaw Haunts VMware ToolsIntroducing the Cyber Security News Privilege Escalation Flaw Haunts VMware Tools.... August 24, 2022 Cyber Security News
Chinese Cyberespionage Group ‘Billbug’ Targets Certificate AuthorityIntroducing the Cyber Security News Chinese Cyberespionage Group ‘Billbug’ Targets Certificate Authority.... November 16, 2022 Cyber Security News
Vulnerability in Acer Laptops Allows Attackers to Disable Secure BootIntroducing the Cyber Security News Vulnerability in Acer Laptops Allows Attackers to Disable Secure Boot.... November 29, 2022 Cyber Security News
Microsoft Raises Alert for Under-Attack Windows FlawIntroducing the Cyber Security News Microsoft Raises Alert for Under-Attack Windows Flaw.... September 14, 2022 Cyber Security News
Ethereum Blockchain Now Has A Modernized Version of Bitcoin (BTC) But With A Much Lower SupplyMarch 9, 2024 72
Bitcoin ETF Netflows May Experience Rebound If This Price Is Attained, Analyst ExplainsMarch 23, 2024 71
Solana Memecoin Presale Gone Wrong: Creator Accidentally Burns $10M, Whale Makes Huge ProfitMarch 18, 2024 70