2022-09-19 Uber Technologies, Inc Cybersecurity Incident

Page last updated on September 25, 2025

Uber Technologies, Inc initially disclosed a cybersecurity incident in an SEC 8-K filing on 2022-09-19 17:19:55 EDT.

Incident Details

Material: Unknown
Is Breach: Yes
Records Compromised: Unknown
Data Types Impacted: Unspecified, Username, Password

Compromised Date: Unknown
Detected Date: Unknown
Disclosure Date: 2022-09-19
Contained Date: Unknown
Recovered Date: Unknown

Attack Goal: Unknown
Attack Tactics1: TA0001, TA0006, TA0008, TA0009, TA0010
Attack Techniques1: T1078, T1213, OTHER, T1204

Costs: No Costs Tracked (yet)

Filings

8-K filed on 2022-09-19

Uber Technologies, Inc filed an 8-K at 2022-09-19 17:19:55 EDT
Accession Number: 0001552781-22-000558

Item 7.01 Regulation FD Disclosure.

On September 19, 2022, Uber Technologies, Inc. (the "Company") provided an update on a recent cybersecurity incident. A copy of the update is furnished herewith as Exhibit 99.1 and is incorporated herein by reference. The Company intends to provide any updates regarding this incident in the Newsroom portion of its website (https://www.uber.com/newsroom).

The information set forth under this Item 7.01 and in the accompanying Exhibit 99.1 is being furnished and shall not be deemed "filed" for purposes of Section 18 of the Securities Exchange Act of 1934, as amended (the "Exchange Act") or otherwise subject to the liabilities of that section, nor shall it be deemed incorporated by reference in any filing under the Securities Act of 1933, as amended, or the Exchange Act, regardless of any general incorporation language in such filing, except as otherwise expressly stated in such filing.

Exhibit No. 99.1

Company Update, dated September 19, 2022.

September 19, 10:45am PT

While our investigation is still ongoing, we are providing an update on our response to last week's security incident.

What happened?

An Uber EXT contractor had their account compromised by an attacker. It is likely that the attacker purchased the contractor's Uber corporate password on the dark web, after the contractor's personal device had been infected with malware, exposing those credentials. The attacker then repeatedly tried to log in to the contractor's Uber account. Each time, the contractor received a two-factor login approval request, which initially blocked access. Eventually, however, the contractor accepted one, and the attacker successfully logged in.

From there, the attacker accessed several other employee accounts which ultimately gave the attacker elevated permissions to a number of tools, including G-Suite and Slack. The attacker then posted a message to a company-wide Slack channel, which many of you saw, and reconfigured Uber's OpenDNS to display a graphic image to employees on some internal sites.

How did we respond?

Our existing security monitoring processes allowed our teams to quickly identify the issue and move to respond. Our top priorities were to make sure the attacker no longer had access to our systems; to ensure user data was secure and that Uber services were not affected; and then to investigate the scope and impact of the incident.

Here are some of the key actions we took, and continue to take:

● We identified any employee accounts that were compromised or potentially compromised and either blocked their access to Uber systems or required a password reset. ● We disabled many affected or potentially affected internal tools. ● We rotated keys (effectively resetting access) to many of our internal services. ● We locked down our codebase, preventing any new code changes. ● When restoring access to internal tools, we required employees to re-authenticate. We are also further strengthening our multi-factor authentication (MFA) policies. ● We added additional monitoring of our internal environment to keep an even closer eye on any further suspicious activity.

What was the impact?

The attacker accessed several internal systems, and our investigation has focused on determining whether there was any material impact. While the investigation is still ongoing, we do have some details of our current findings that we can share.

First and foremost, we've not seen that the attacker accessed the production (i.e. public-facing) systems that power our apps; any user accounts; or the databases we use to store sensitive user information, like credit card numbers, user bank account info, or trip history. We also encrypt credit card information and personal health data, offering a further layer of protection.

We reviewed our codebase and have not found that the attacker made any changes. We also have not found that the attacker accessed any customer or user data stored by our cloud providers (e.g. AWS S3). It does appear that the attacker downloaded some internal Slack messages, as well as accessed or downloaded information from an internal tool our finance team uses to manage some invoices. We are currently analyzing those downloads.

The attacker was able to access our dashboard at HackerOne, where security researchers report bugs and vulnerabilities. However, any bug reports the attacker was able to access have been remediated.

Throughout, we were able to keep all of our public-facing Uber, Uber Eats, and Uber Freight services operational and running smoothly. Because we took down some internal tools, customer support operations were minimally impacted and are now back to normal.

Who is responsible?

We believe that this attacker (or attackers) are affiliated with a hacking group called Lapsus$, which has been increasingly active over the last year or so. This group typically uses similar techniques to target technology companies, and in 2022 alone has breached Microsoft, Cisco, Samsung, Nvidia and Okta, among others. There are also reports over the weekend that this same actor breached video game maker Rockstar Games. We are in close coordination with the FBI and US Department of Justice on this matter and will continue to support their efforts.

Where do we go from here?

We're working with several leading digital forensics firms as part of the investigation. We will also take this opportunity to continue to strengthen our policies, practices, and technology to further protect Uber against future attacks.


Company Information

NameUber Technologies, Inc
CIK0001543151
SIC DescriptionServices-Business Services, NEC
TickerUBER - NYSE
Website
CategoryLarge accelerated filer
Fiscal Year EndDecember 30

  1. MITRE ATT&CK® and ATT&CK® are registered trademarks of The MITRE Corporation. ↩︎ ↩︎