A #CISOlife overview of the public information of the 2022 Uber Breach by Brian Haugli, CEO, SideChannel.
Brian presents an explanation and graphical review of how the supposed 18 year old attacker breached Uber. The info released so far shows a series of steps:
[2:00] Social Engineering of Employee
[2:30] MFA SMS Push Flood
[2:40] Pretends to be an IT Help Desk from Uber
[3:05] Log into VPN
[3:30] Internal scanning for more data
[4:00] Finds hardcoded password in Powershell script
[4:25] Access Privilege Access Management (PAM) - Thycotic
[5:00] Access to other services; AWS, GCP, Slack, SentinelOne, HackerOne, etc
[6:30] Breakdowns in controls and security that could lead to this breach
#cisolife
Follow us -
Website - [ Ссылка ]
Podcast - [ Ссылка ]
LinkedIn - [ Ссылка ]
Twitter / X - [ Ссылка ]
![](https://i.ytimg.com/vi/LtHRe5gB9l0/maxresdefault.jpg)