venturebeat.com Open in urlscan Pro
192.0.66.2  Public Scan

URL: https://venturebeat.com/security/what-ubers-data-breach-reveals-about-social-engineering/
Submission: On September 19 via api from CA — Scanned from CA

Form analysis 2 forms found in the DOM

GET https://venturebeat.com/

<form method="get" action="https://venturebeat.com/" class="Search">
  <input id="search-input" class="Search__input GlobalNav__text" type="text" placeholder="Search" name="s" aria-label="Search" required="">
  <button type="submit" class="Search__submit" aria-label="Search submit button">
    <svg width="24" height="24" viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg">
      <g>
        <path fill-rule="evenodd" clip-rule="evenodd"
          d="M14.965 14.255H15.755L20.745 19.255L19.255 20.745L14.255 15.755V14.965L13.985 14.685C12.845 15.665 11.365 16.255 9.755 16.255C6.16504 16.255 3.255 13.345 3.255 9.755C3.255 6.16501 6.16504 3.255 9.755 3.255C13.345 3.255 16.255 6.16501 16.255 9.755C16.255 11.365 15.665 12.845 14.6851 13.985L14.965 14.255ZM5.255 9.755C5.255 12.245 7.26501 14.255 9.755 14.255C12.245 14.255 14.255 12.245 14.255 9.755C14.255 7.26501 12.245 5.255 9.755 5.255C7.26501 5.255 5.255 7.26501 5.255 9.755Z">
        </path>
      </g>
    </svg>
  </button>
</form>

GET https://venturebeat.com/

<form method="get" action="https://venturebeat.com/" class="Search Search--mobile Nav__section--active">
  <input id="mobile-search-input" class="Search__input GlobalNav__text" type="text" placeholder="Search" name="s" aria-label="Search" required="">
  <button type="submit" class="Search__submit">
    <svg width="24" height="24" viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg">
      <g>
        <path fill-rule="evenodd" clip-rule="evenodd"
          d="M14.965 14.255H15.755L20.745 19.255L19.255 20.745L14.255 15.755V14.965L13.985 14.685C12.845 15.665 11.365 16.255 9.755 16.255C6.16504 16.255 3.255 13.345 3.255 9.755C3.255 6.16501 6.16504 3.255 9.755 3.255C13.345 3.255 16.255 6.16501 16.255 9.755C16.255 11.365 15.665 12.845 14.6851 13.985L14.965 14.255ZM5.255 9.755C5.255 12.245 7.26501 14.255 9.755 14.255C12.245 14.255 14.255 12.245 14.255 9.755C14.255 7.26501 12.245 5.255 9.755 5.255C7.26501 5.255 5.255 7.26501 5.255 9.755Z">
        </path>
      </g>
    </svg>
  </button>
</form>

Text Content

Skip to main content
VentureBeat Homepage
 * Events
 * GamesBeat

 * Data Pipeline
 * The MetaBeat Event

 * Account Settings
 * Log Out

 * Become a Member
 * Sign In

VentureBeat Homepage

 * 
 * 

VENTUREBEAT

 * AR/VR
 * Big Data
 * Cloud
 * Commerce
 * DataDecisionMakers
 * Dev
 * Enterprise
 * Entrepreneur
 * Marketing
 * Media
 * Mobile
 * Security
 * Social
 * Transportation

FOLLOW

follow us on Twitter follow us on Facebook follow us on LinkedIn Follow us on
RSS

THE MACHINE

 * AI
 * Machine Learning
 * Computer Vision
 * Natural Language Processing
 * Robotic Process Automation

FOLLOW

Follow us on RSS

GAMESBEAT

 * Games
 * Esports
 * PC Gaming

FOLLOW

follow us on Twitter Follow us on RSS

EVENTS

 * Upcoming
 * Media Partner
 * Webinars

GENERAL

 * Briefings
 * Got a news tip?
 * Advertise
 * Press Releases
 * Guest Posts
 * Contribute to DataDecisionMakers
 * Deals
 * Data Pipeline
 * Jobs
 * VB Lab
 * About
 * Contact
 * Privacy Policy

×


JOIN THE VENTUREBEAT COMMUNITY


FREE: JOIN THE VENTUREBEAT COMMUNITY FOR ACCESS TO 3 PREMIUM POSTS AND UNLIMITED
VIDEOS PER MONTH.

Learn More


SIGN UP WITH YOUR BUSINESS E-MAIL TO CONTINUE WITH TICKET PURCHASE

Please wait...


SHARE

 * Share on Facebook
 * Share on Twitter
 * Share on LinkedIn

 * VentureBeat Homepage
 * Social Links
 * Briefings
 * Events
 * Profile


WHAT UBER’S DATA BREACH REVEALS ABOUT SOCIAL ENGINEERING

Tim Keary
September 16, 2022 3:20 PM
 * Share on Facebook
 * Share on Twitter
 * Share on LinkedIn

Image Credit: Mateusz Slodkowski/SOPA Images/LightRocket via Getty Images

Were you unable to attend Transform 2022? Check out all of the summit sessions
in our on-demand library now! Watch here.

--------------------------------------------------------------------------------



Few techniques are as popular among cybercriminals as social engineering.
Research shows that IT staff receive an average of 40 targeted phishing attacks
a year, and many organizations are struggling to intercept them before it’s too
late. 

Just yesterday, Uber was added to the long list of companies defeated by social
engineering after an attacker managed to gain access to the organization’s
internal IT systems, email dashboard, Slack server, endpoints, Windows domain
and Amazon Web Services console. 

1
/
9
The evolving impact of graph analytics_
Read More

454.7K
4



Video Player is loading.
Play Video
Unmute

Duration 0:00
/
Current Time 0:00
Playback Speed Settings
1x
Loaded: 0%

0:00

Remaining Time -0:00
 
FullscreenPlayUp Next

This is a modal window.



Beginning of dialog window. Escape will cancel and close the window.

TextColorWhiteBlackRedGreenBlueYellowMagentaCyanTransparencyOpaqueSemi-TransparentBackgroundColorBlackWhiteRedGreenBlueYellowMagentaCyanTransparencyOpaqueSemi-TransparentTransparentWindowColorBlackWhiteRedGreenBlueYellowMagentaCyanTransparencyTransparentSemi-TransparentOpaque
Font Size50%75%100%125%150%175%200%300%400%Text Edge
StyleNoneRaisedDepressedUniformDropshadowFont FamilyProportional
Sans-SerifMonospace Sans-SerifProportional SerifMonospace SerifCasualScriptSmall
Caps
Reset restore all settings to the default valuesDone
Close Modal Dialog

End of dialog window.

Playback Speed

0.25x
0.5x
1x Normal
1.5x
2x
Replay the list
 * Powered by AnyClip
 * Privacy Policy


TOP ARTICLES







The evolving impact of graph analytics_


The New York Times [subscription required] reported that an 18-year-old hacker
sent an SMS message to an Uber employee impersonating support staff to trick
them into handing over their password. The hacker then used it to take control
of the individual’s Slack account, before later gaining access to other critical
systems. 

The data breach sheds light on the effectiveness of social engineering
techniques and suggests that enterprises should reevaluate reliance on
multifactor authentication (MFA) to secure their employees’ online accounts. 


EVENT

MetaBeat 2022

MetaBeat will bring together thought leaders to give guidance on how metaverse
technology will transform the way all industries communicate and do business on
October 4 in San Francisco, CA.

Register Here


SOCIAL ENGINEERING: THE LOW-BARRIER WAY TO HACK  

In many ways, the Uber data breach further illustrates the problem of relying on
password-based authentication to control access to online accounts. Passwords
are easy to steal with brute-force hacks and social engineering scams, and they
provide a convenient entry point for attackers to exploit. 

advertisement


At the same time, no matter how good a company’s defenses are, if they’re
relying on passwords to secure online accounts, it only takes one employee to
share their login credentials for a breach to take place. 

“Uber is the latest in a string of social engineering attack victims. Employees
are only human, and eventually, mistakes with dire consequences will be made,”
said Arti Raman, CEO and founder of Titaniam. “As this incident proved, despite
security protocols in place, information can be accessed using privileged
credentials, allowing hackers to steal underlying data and share them with the
world.”

While measures like turning on multifactor authentication can help to reduce the
likelihood of account takeover attempts — they won’t fully prevent them.


RETHINKING ACCOUNT SECURITY 

Generally, user awareness is an organization’s best defense against social
engineering threats. Using security awareness training to teach employees how to
detect manipulation attempts in the form of phishing emails or SMS messages can
reduce the likelihood of them being tricked into handing over sensitive
information. 

advertisement


“General cybersecurity awareness training, penetration testing and antiphishing
education are powerful deterrents to such attacks,” said Neil Jones, director of
cybersecurity evangelism at Egnyte. 

Organizations simply cannot afford to make the mistake of thinking that
multifactor authentication is enough to prevent unauthorized access to online
accounts. Instead, company leaders need to assess the level of risk based on the
authentication options supported by the account provider and implement
additional controls accordingly. 

“Not all MFA factors are created equal. Factors such as push, one-time-passcodes
(OTPs), and voice calls are more vulnerable and are easier to bypass via social
engineering,” said Josh Yavor, CISO at Tessian. 

Instead of relying on these, Yavor recommends implementing security-key
technology based on modern MFA protocols like FIDO2 that have phishing
resilience built into their designs. These can then be augmented with
secure-access controls to enforce device-based requirements before providing
users access to online resources.  

advertisement


VentureBeat's mission is to be a digital town square for technical
decision-makers to gain knowledge about transformative enterprise technology and
transact. Discover our Briefings.




METABEAT 2022

Join metaverse thought leaders in San Francisco on October 4 to learn how
metaverse technology will transform the way all industries communicate and do
business.

Register Here




TRANSFORM 2022 ON-DEMAND

Did you miss a session from Transform 2022? Head over to the on-demand library
for all of our featured sessions.

Watch Now


JOIN FORCES WITH VENTUREBEAT AT OUR UPCOMING AI & DATA EVENTS

Sponsor VB Events
 * VentureBeat Homepage
 * Follow us on Facebook
 * Follow us on Twitter
 * Follow us on LinkedIn
 * Follow us on RSS

 * VB Lab
 * Briefings
 * Events
 * Special Issue
 * Product Comparisons
 * Jobs

 * About
 * Contact
 * Careers
 * Privacy Policy
 * Terms of Service
 * Do Not Sell My Personal Information

© 2022 VentureBeat. All rights reserved.

×

We may collect cookies and other personal information from your interaction with
our website. For more information on the categories of personal information we
collect and the purposes we use them for, please view our Notice at Collection.