Uber’s computer network was breached Thursday, leading the ride-hailing giant to take several internal communications and engineering systems offline as it investigated the hack, as reported earlier by The New York Times.
Uber said its investigation is ongoing as of Friday at 10:30 a.m. PT, but said there’s “no evidence that the incident involved access to sensitive user data.”
Uber, Uber Eats, Uber Freight and Uber Drive were all up and running on Friday, and Uber is now bringing back online its internal software tools.
Uber had said in an earlier statement that it is investigating a cybersecurity incident and is in contact with law enforcement officials. The FBI is reportedly helping Uber investigate the incident. Uber didn’t immediately respond to a request for comment on this.
On Thursday, the company had instructed employees not to use workplace messaging app Slack, the report said, citing two employees. Other internal systems were also inaccessible, the Times reported.
According to the Times, shortly before Slack was taken offline Thursday afternoon, Uber employees received a message on the app that read: “I announce I am a hacker and Uber has suffered a data breach.” The message also listed several internal databases that the hacker claimed had been compromised, the Times reported.
The hacker, who said he was 18 years old, said he was motivated by what he called weak security and provided screenshots of internal Uber systems to prove his access, the Times reported.
The hacker sent the message through the app after compromising a worker’s account, Uber told the Times. The hacker apparently was also able to gain access to other internal systems, posting an explicit photo on an internal information page for employees, the newspaper reported.
Uber has been hacked before. In 2018, it agreed to a $148 million settlement over a 2016 data breach the ride-hailing service failed to disclose. Hackers were able to steal data on 57 million drivers and riders, including personal information such as names, email addresses and driver’s license numbers.
Rather than publicly disclosing the hack, which companies are required to do within a certain number of days in states like California, Uber paid the hackers $100,000 to delete the information and had them sign a nondisclosure agreement.
Joe Sullivan, who served as Uber’s security chief from April 2015 to November 2017, was indicted in 2020 for allegedly covering up the breach. Sullivan described the payment as a bug bounty reward, which companies often pay to researchers who discover security flaws, but prosecutors said the payment was more of a cover-up than a bounty reward.