Updated: Sep 26, 2022
An unnamed teenager has been charged with two counts of breach of bail conditions and two counts of computer misuse which many tech sources are linking to recent hacking incidents involving Uber and Rockstar Games.
Cybersecurity experts from Hacker News believe the 17-year-old is thought to be behind the Uber and Rockstar Games hacks.
Detective Inspector Michael O'Sullivan, from the City of London Police's Cyber Crime Unit, said: "The City of London Police arrested a 17-year-old in Oxfordshire on Thursday 22 September on suspicion of hacking, as part of an investigation supported by the National Crime Agency's (NCA) National Cyber Crime Unit (NCCU). He has been charged in connection with this investigation and remains in police custody.
"The teenager has been charged with two counts of breach of bail conditions and two counts of computer misuse.
"He will appear at Highbury Corner Youth Court on Saturday 24 September 2022."
According to Uber sources a Uber EXT contractor had their account compromised by an attacker. It is likely that the attacker purchased the contractor’s Uber corporate password on the dark web, after the contractor’s personal device had been infected with malware, exposing those credentials.
The attacker then repeatedly tried to log in to the contractor’s Uber account. Each time, the contractor received a two-factor login approval request, which initially blocked access. Eventually, however, the contractor accepted one, and the attacker successfully logged in.
From there, the attacker accessed several other employee accounts which ultimately gave the attacker elevated permissions to a number of tools, including G-Suite and Slack. The attacker then posted a message to a company-wide Slack channel, which many of you saw, and reconfigured Uber’s OpenDNS to display a graphic image to employees on some internal sites.
An Uber spokesperson said in a statement: “Our existing security monitoring processes allowed our teams to quickly identify the issue and move to respond. Our top priorities were to make sure the attacker no longer had access to our systems; to ensure user data was secure and that Uber services were not affected; and then to investigate the scope and impact of the incident.”
The statement continued: “The attacker accessed several internal systems, and our investigation has focused on determining whether there was any material impact. While the investigation is still ongoing, we do have some details of our current findings that we can share.
“First and foremost, we’ve not seen that the attacker accessed the production (i.e. public-facing) systems that power our apps; any user accounts; or the databases we use to store sensitive user information, like credit card numbers, user bank account info, or trip history. We also encrypt credit card information and personal health data, offering a further layer of protection.
“We reviewed our codebase and have not found that the attacker made any changes. We also have not found that the attacker accessed any customer or user data stored by our cloud providers (e.g. AWS S3). It does appear that the attacker downloaded some internal Slack messages, as well as accessed or downloaded information from an internal tool our finance team uses to manage some invoices. We are currently analyzing those downloads.
“The attacker was able to access our dashboard at HackerOne, where security researchers report bugs and vulnerabilities. However, any bug reports the attacker was able to access have been remediated.
“Throughout, we were able to keep all of our public-facing Uber, Uber Eats, and Uber Freight services operational and running smoothly. Because we took down some internal tools, customer support operations were minimally impacted and are now back to normal.”