Close Menu
  • Briefing
    • Cover Story
    • Latest News
    • Counties
  • Politics
    • Society
  • Special Reports
    • Companies
    • Enterprise
    • Money
    • Technology
  • Columns
  • Dispatches from China
  • Member Content
    • Shop
  • Contact Us
    • About us
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram LinkedIn
Nairobi Business Monthly
Subscribe
  • Briefing
    • Cover Story
    • Latest News
    • Counties
  • Politics
    • Society
  • Special Reports
    • Companies
    • Enterprise
    • Money
    • Technology
  • Columns
  • Dispatches from China
  • Member Content
    • Shop
  • Contact Us
    • About us
Nairobi Business Monthly
Home»Briefing»Uber cyber-attack – expert’s take
Briefing

Uber cyber-attack – expert’s take

NBM CORRESPONDENTBy NBM CORRESPONDENT8th December 2017Updated:23rd September 2019No Comments3 Mins Read
Facebook Twitter WhatsApp Telegram Email
Share
Facebook Twitter WhatsApp Telegram Email

BY JAMES CHAPPELL

News that the darling of the disruptive digital age, taxi app company Uber, was hacked in 2016 with statements confirming that 57 million customers and 600,000 drivers’ personal details were compromised and potentially stolen should not really come as a surprise.

While you could be surprised at such an effective architect of the digital world would not be fully prepared for such an event, it does show that even the most tech savvy businesses are open to the menace of data breaches and cyberattacks.

The Nairobi Law Monthly September Edition

We don’t yet know the full picture of what happened at Uber, but their statement says that hackers accessed a ‘private’ area of GitHub, a Web-based data hosting service used by the app developers. That likely means one of two things; that the ‘private area’ should have been private, but was not for some reason, or it could mean that ‘private area’ is behind the GitHub login pages and some sort of compromise of GitHub must have occurred, most likely by credential stuffing or keylogging.

But what is absolutely certain is that this sort of attack should have been spotted sooner and ideally before significant data had been extracted.  If basic login details were stolen, this is something Uber could have been monitoring for and prevented.  The storage of sensitive IT system logins should not have been in that website in the first place.   It appears in Uber’s case they found out about it when the hackers came asking for money to delete the stolen data – $100,000 (£75,000). Of course, there is little honour amongst thieves and whether paying the ransom had the effect of deleting the data as expected, only time will tell. Security firms often advise not to pay ransoms, as organisations can make themselves a more attractive target should their willingness to pay emerge.

Visibility for a business’s digital risks – the shadow they leave on the Internet through their business activities across the surface, deep and dark web – is a critical way to monitor for digital risk and the ability to recognize and respond quickly when something is wrong.

Knowing you have a problem is the first step in dealing with it. Cyberattacks are an all too common reality for business today – especially for those at the frontline in the digital revolution. 

What is most concerning about this incident is the steps taken by Uber to notify people about the issue and describe what they have done to deal with it.  A long period has elapsed since they were aware.   Again, we don’t know the full details from Uber, but it is beholden on all businesses who have suffered a data breach to notify their staff, customers, suppliers and in some cases the regulator their data might be exposed, and it doesn’t seem like this happened until now some months after the event.

Bottom-line, no matter what your business is like – in the vanguard of the digital revolution, or a more traditional one, you need to have the ability to monitor both your own use of digital technologies, and manage your digital footprint even and especially across third party sites like GitHub and others. Knowing your digital risk exposure is the only way you can monitor your digital risk itself, and be on top of incidents like this quickly and efficiently.”

Writer is CTO and co-founder, Digital Shadows

The Nairobi Law Monthly September Edition
Follow on Facebook Follow on X (Twitter) Follow on WhatsApp
Share. Facebook Twitter WhatsApp Telegram
NBM CORRESPONDENT

Related Posts

Plan unveiled to shield Kenyans from financial risks

26th June 2025

CAK bans exclusive ISP deals in housing estates

24th June 2025

Visa applicants warned over early appointment scams

24th June 2025

16 million non-filers spark tax crackdown by KRA

23rd June 2025
Add A Comment

Leave A Reply Cancel Reply

The Nairobi Law Monthly September Edition
Latest Posts

Plan unveiled to shield Kenyans from financial risks

26th June 2025

CAK bans exclusive ISP deals in housing estates

24th June 2025

Visa applicants warned over early appointment scams

24th June 2025

Entrepreneurship can build better tomorrow

23rd June 2025

16 million non-filers spark tax crackdown by KRA

23rd June 2025
The Nairobi Law Monthly September Edition
Nairobi Business Monthly
Facebook X (Twitter) Instagram LinkedIn
  • About Us
  • Member Content
  • Download Magazine
  • Contact Us
  • Privacy policy
© 2025 NairobiBusinessMonthly. Designed by Okii

Type above and press Enter to search. Press Esc to cancel.