Uber Account Hacked, What to Know About the Data Breach

  • By David Lukic
  • Published: Dec 23, 2020
  • Last Updated: Mar 18, 2022

Uber account hacked! the popular drive share company, experienced a data breach that affected 57 million customers and drivers. Along with the names and driver license numbers of 600,000 Uber drivers, personal information like names, email addresses, and mobile phone numbers were also stolen from customers. The cybersecurity company that investigated the Uber hack, assured customers that they could not find any evidence that any dates of birth, credit card numbers, location or trip history, bank account information, or social security numbers were breached. 

The most shocking part of this story is that Uber discovered the breach but did not report it (which is against federal law) until a year later. Additionally, they actually paid the hackers $100,000 to cover up the incident. Former CEO of Uber, Travis Kalanick, was at the helm during this time and resigned amongst the scuttlebutt over the incident and other unethical practices.

uber account hacked

When Was The Uber Account Hacked?

The Uber hack took place in 2016 but was not reported until 2017.  As part of the cover-up, hackers assured Uber that the stolen data was deleted. The FBI and third-party security experts found and apprehended the two hackers, Vasile Mereacre, from Canada and Brandon Glover from Florida. The two were also caught and indicted for stealing from the learning platform Lynda.

How to Check if Your Victim of Uber Data Breach

Uber has set up a website to help victims of the data breach discover if their data was among those affected. Although no financial information was taken, personal details were stolen, and users are urged to keep their eyes open for phishing emails or other scams related to the event.

What to Do if Your Data Was Breached

Security experts advise that anyone who was affected should change their online passwords for Uber accounts and credit cards linked to Uber accounts. Monitor your credit card and bank statements to look for any suspicious activity and watch out for Uber-related scams.

uber hack

Are There Any Lawsuits on Uber Technologies Inc.?

There is a major class-action lawsuit in which Uber has agreed to pay victims a total of $148 million. You can make a claim for damages incurred because of this event. The main focus of this lawsuit is more than just exposing customer data to hackers; it is also about the cover-up factor. 

Can My Stolen Uber Information be Used for Identity Theft?

The information that was taken in the Uber security breach was minimal but enough for hackers to use in exploitive phishing scams and identity theft. When perpetrators get a list of customers, they can use that to design a real-looking email and then trick recipients into clicking a link or downloading some attachment, which then infects their computer with a virus or malware. The software then gives the hacker control of that person’s machine, and from there, the sky is the limit as to what they can steal.

uber hacking

What to Do to Protect Yourself Against Future Hacks

The best way to protect yourself against hacks and data breaches is control who gets your information. Some other tips would be:

  • Never share logins or passwords with anyone.
  • Change your passwords frequently and make them stronger by using complex combinations of letters, numbers, and symbols.
  • Invest in a credit monitoring service like IDStrong.com and check your credit report often to look for any discrepancies. 
  • Review bank and credit card statements every month to check for suspicious activity.
  • Always keep your antivirus software updated and run weekly scans.


About the Author
IDStrong Logo

Related Articles

What is Data Leak and How to Prevent Accidental Data Leakage

Data breaches take many forms, and one of them is through data leak and accidental web exposure. M ... Read More

The Saga of T-Mobile Data Breach: 2013, 2015, 2021 and 2023 Hacks

T-Mobile has experienced a number of data breaches in the past decade. The first case occurred som ... Read More

Anthem Data Breach Exposed 78 Million Records

In the Anthem Data Breach of 2015, hackers were able to steal 78.8 million member’s records. ... Read More

Everything You Need to Know About Insider Data Breach

Data breaches are on the news frequently, but the average person doesn’t really know that much a ... Read More

The NSA Hack, How Did it Happen?

The National Security Agency (NSA) was the main attraction in a major data breach involving three ... Read More

Latest Articles

Google Voice Scams: What They Are and How to Stay Safe

Google Voice Scams: What They Are and How to Stay Safe

Google Voice scams continue to pose a risk for users of this service. Scammers continuously attempt to lure users into divulging their verification PIN code.

What Are Pretexting Attacks: Scam Types and Security Tips?

What Are Pretexting Attacks: Scam Types and Security Tips?

Have you ever received a text from someone you do not know? Did you become alarmed by the message? Did the message contain information about you and the people you know?

What is a Time-based One-time Password (TOTP)?

What is a Time-based One-time Password (TOTP)?

Authentication is the process that verifies the user's identity to control access to resources, prevent unauthorized users from gaining access to the system, and record user activities (to hold them accountable for their activities).

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home.

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk.

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving.

Notice

By proceeding with this scan, you agree to let IDStrong run a Free Scan of supplied parameters of your personal information and provide free preliminary findings in compliance with our Terms of Use and Privacy Notice. You consent to us using your provided information to complete the Free Scan and compare it against our records and breach databases or sources to provide your Free preliminary findings report.

Rest assured: IDStrong will not share your information with third parties or store your information beyond what is required to perform your scan and share your results.

Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close