Uber hacked via basic smishing attack
The self-taught hacker impersonated an IT worker to gain an Uber employee's password, obtaining broad access to internal systems and posting taunting messages
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
You are now subscribed
Your newsletter sign-up was successful
A smishing attack on Thursday led to a wide range of Uber's internal systems being breached by a seemingly unaffiliated teenage hacker, it has been claimed.
A report first emerged in The New York Times that the ride-sharing company had been hacked, with the threat actor themselves getting in touch with the publication to allege that he had gained access to internal systems such as Uber’s internal email, cloud storage systems and code repositories through a simple social engineering attack. In a text message sent to an Uber employee, the hacker impersonated an IT worker and convinced them that it was necessary to share an internal password.
As a variant of phishing in which SMS is used to mine targets for sensitive information, smishing is often combined with social engineering tricks for increased effectiveness. Victims may be more easily persuaded to hand over credentials to a supposedly trustworthy source if the attacker makes the situation seem urgent or seems to be suitably authoritative, both of which may have prompted the hacker to claim to be a key IT worker. Two-factor authentication (2FA) is a recommended measure to dull the impact of smishing attacks, and prevent compromised credentials from being used by hackers effectively.
Smishing and social engineering were recently used in sophisticated attacks on Twilio and Marriott. A report from September 2021 revealed that in the first six months of the year, smishing attacks surged 700% more than in the preceding six months.
The hacker claims to be just 18 years old, with self-taught skills in cyber security, and explained that he performed the breach because Uber’s security was especially weak. On Thursday, Uber confirmed that it was subject to a cyber attack through its official Twitter channel, and also stated that it is in dialogue with law enforcement. The company has not offered an in-depth description of the attack.
As part of the breach, the hacker gained administrator control of Uber’s HackerOne account, which it uses to pay white hat hackers bug bounties. The attacker proceeded to leave comments on all active bounty tickets reading “UBER HAS BEEN HACKED (domain admin, aws admin, vsphere admin, gsuite SA) AND THIS HACKERONE ACCOUNT HAS BEEN ALSO”.
The attacker also used this access to send out an email via policy update - which sends an automatic alert to the inboxes of anyone following a particular bounty programme - including a screenshot of a Telegram exchange, providing more details on how the hacker allegedly compromised Uber's systems.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
In it, the hacker (identified in the conversation as 'Tea Pot') said that after he had gained access to the intranet, he obtained PowerShell scripts that "contained the username and password for a admin user in [privileged access management tool] Thycotic", which he said allowed him to "extract secrets for all services, [including] DA, DUO, Onelogin, AWS, [and] GSuite".
The New York Times also quoted two Uber employees, who wished to remain anonymous, who said the company had put out a warning to not engage with the company’s Slack channels while the attack was active, and shortly after all employees received a message reading “I announce that I am a hacker and Uber has suffered a data breach.”
There are concerns that younger people are increasingly turning to hacking as a hobby, driven by lack of opportunity amidst the cost of living crisis. A recent report by Censuswide, on behalf of International Cyber Expo, revealed growing concern among parents that hacking could become a pastime for young people.
RELATED RESOURCE
Cyber resiliency and end-user performance
Reduce risk and deliver greater business success with cyber-resilience capabilities
“With hacking tools becoming increasingly accessible and affordable on the internet, we have witnessed a rise in ‘script kiddies’; inexperienced hackers who carry out cyber attacks,” stated Simon Newman, CEO of Cyber Resilience Centre for London and International Cyber Expo Advisory Council member.
“While ‘kiddies’ do not necessarily refer to the hacker’s age so much as their experience, many have been found to be teenagers. In fact, in the UK the average age of a referral to the National Cyber Crime Unit is just 15 years old.”
“Although law enforcement agencies are working hard to take down the websites and forums that promote hacking, the results of this survey also demonstrate a need for parents/guardians to take an active interest in what their children are doing online to prevent them from falling on the wrong side of the law.”
Uber has a history of hacking, having been very publicly compromised in a 2016 attack that resulted in the exposed information of 57 million users of its app and resulted in reputational damage for the firm. In June, a judge decided that the company’s former chief security officer (CSO) Joseph Sullivan would face wire fraud charges for his role in an attempted cover-up of the attack.
Uber declined to provide further comment to IT Pro.

Rory Bathgate is Features and Multimedia Editor at ITPro, overseeing all in-depth content and case studies. He can also be found co-hosting the ITPro Podcast with Jane McCallion, swapping a keyboard for a microphone to discuss the latest learnings with thought leaders from across the tech sector.
In his free time, Rory enjoys photography, video editing, and good science fiction. After graduating from the University of Kent with a BA in English and American Literature, Rory undertook an MA in Eighteenth-Century Studies at King’s College London. He joined ITPro in 2022 as a graduate, following four years in student journalism. You can contact Rory at rory.bathgate@futurenet.com or on LinkedIn.
-
Huntress extends global partner program access to resellers in small business driveNews The expansion will allow resellers to deliver enterprise-grade security to smaller organizations facing increasing cyber threats
-
How resellers can win with smarter Multi-Factor Authentication (MFA)Industry Insights Enhanced and phishing-resistant MFA prevents MFA bombing and fatigue
-
Is your new hire an AI clone? Microsoft says North Korean hackers are using AI to impersonate job seekers and steal company secretsNews The groups are increasingly using face-changing or voice-changing software to make their fake identities more plausible
-
Google issues warning over ShinyHunters-branded vishing campaignsNews Related groups are stealing data through voice phishing and fake credential harvesting websites
-
Thousands of Microsoft Teams users are being targeted in a new phishing campaignNews Microsoft Teams users should be on the alert, according to researchers at Check Point
-
Microsoft warns of rising AitM phishing attacks on energy sectorNews The campaign abused SharePoint file sharing services to deliver phishing payloads and altered inbox rules to maintain persistence
-
Warning issued as surge in OAuth device code phishing leads to M365 account takeoversNews Successful attacks enable full M365 account access, opening the door to data theft, lateral movement, and persistent compromise
-
Amazon CSO Stephen Schmidt says the company has rejected more than 1,800 fake North Korean job applicants in 18 months – but one managed to slip through the netNews Analysis from Amazon highlights the growing scale of North Korean-backed "fake IT worker" campaigns
-
Complacent Gen Z and Millennial workers are more likely to be duped by social engineering attacksNews Overconfidence and a lack of security training are putting organizations at risk
-
Hackers are abusing ConnectWise ScreenConnect, againNews A new spear phishing campaign has targeted more than 900 organizations with fake invitations from platforms like Zoom and Microsoft Teams.