Security Market Segment LS
Thursday, 23 November 2017 10:10

Uber contributing to growth of cyber crime: claim Featured

By

Security companies have reacted to the Uber hack that revealed the details of 57 million users with a mixture of anger and advice.

The angriest reaction came from Raj Samani, the chief scientist and Fellow at US firm McAfee, who said that as a regular Uber customer, the news made him incredibly angry.

"Uber has treated its customers with a complete lack of respect," Samani said. "Millions of people will now be worrying over what has happened to their personal data over the past 12 months, and Uber is directly responsible for this.

"In opting to not only cover up the breach, but actually pay the hackers, Uber has directly contributed to the growth of cyber crime and the company needs to be held accountable for this.”

As iTWire reported on Wednesday, Uber was hacked in October 2016 and, after discovering the hack a month later, decided to pay the attackers US$100,000 to keep quiet about the breach.

McAfee vice-president Vincent Weafer said bribing hackers to keep quiet about a data theft was not a common tactic.

"It’s likely under-reported as organisations aren't going to tell the world that they're doing it," he opined.

"But, if we look at ransomware, a more common example of people paying criminals to decrypt their data, we know from multiple research reports that there's a high percentage of cases where paying does not result in data being restored correctly. You're essentially relying on the integrity of criminals, and the wisdom or value of that is obviously debatable."

He likened the Uber breach to those that have taken place at Yahoo! and Equifax. "This is yet another example of a fairly significant data breach, following on the heels of similar breaches at Yahoo and Equifax."

Weafer said it was not certain whether the data was still in the wild and exploitable or whether Uber had been effective in mitigating the risk by paying the hackers.

"This is a good example of why organisations need to be very careful of how credentials are used and managed. We know attackers have been trying to track down administrator credentials — the keys to the kingdom — that allow them to move around within an organisation with ease," he said.

"Keeping those credentials separate and different for various repositories, as well as managing them in a secure manner should be treated as a core principal of security info management."

Webroot threat research director David Kennerley said given the current climate around data security and breaches it was astonishing that Uber paid off the hackers and kept this breach under wraps for a year.

"The fact is there is absolutely no guarantee the hackers didn't create multiple copies of the stolen data for future extortion or to sell on further down the line. A security breach of this size will potentially damage any business’ reputation, but how a company behaves following a breach is vital," he said.

"Potential victims deserve to be informed as soon as possible, so they can better protect themselves going forward - from changing passwords, and being aware they are now prime phishing targets. Being open and transparent and keeping customers informed is key, you can’t simply sweep these things under the carpet."

Udi Mokady, the chairman and chief executive of Israel-based security company CyberArk, said the Uber breach put the spotlight on the critical security vulnerabilities created by privileged credentials that are often left unmanaged and unprotected – "especially at companies that are using DevOps and the cloud to bring new applications to market at high velocity".

"Analyst firm Forrester estimates that 80% of security breaches involve privileged credentials. Despite this, according to a recent CyberArk survey, 75% of organisations report no strategy to manage and secure DevOps secrets, with 99% of respondents failing to identify all places where privileged accounts or secrets exist," he said.

Mokady said this lack of visibility and control created a massive opportunity for attackers. "It also underscores the need for secrets management solutions," he added.


Subscribe to Newsletter here

NEW OFFER - ITWIRE LAUNCHES PROMOTIONAL NEWS & CONTENT

Recently iTWire remodelled and relaunched how we approach "Sponsored Content" and this is now referred to as "Promotional News and Content”.

This repositioning of our promotional stories has come about due to customer focus groups and their feedback from PR firms, bloggers and advertising firms.

Your Promotional story will be prominently displayed on the Home Page.

We will also provide you with a second post that will be displayed on every page on the right hand side for at least 6 weeks and also it will appear for 4 weeks in the newsletter every day that goes to 75,000 readers twice daily.

POST YOUR NEWS ON ITWIRE NOW!

PROMOTE YOUR WEBINAR ON ITWIRE

It's all about Webinars.

These days our customers Advertising & Marketing campaigns are mainly focussed on Webinars.

If you wish to promote a Webinar we recommend at least a 2 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site itwire.com and prominent Newsletter promotion https://www.itwire.com/itwire-update.html and Promotional News & Editorial.

For covid-19 assistance we have extended terms, a Webinar Business Booster Pack and other supportive programs.

We look forward to discussing your campaign goals with you. Please click the button below.

MORE INFO HERE!

BACK TO HOME PAGE
Sam Varghese

website statistics

Sam Varghese has been writing for iTWire since 2006, a year after the site came into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.

BACK TO HOME PAGE

ZOOM WEBINARS & ONLINE EVENTS

GUEST ARTICLES

VENDOR NEWS

Guest Opinion

Guest Interviews

Guest Research & Case Studies

Channel News

Comments