Uber Accounts Hacked and Sold on Dark Web, Leaving Users Frustrated

TLDR Alex Bloomberg's Uber account was hacked while on vacation, leading to unauthorized rides in Russia and unhelpful customer service from Uber. The hack was part of a larger trend of Uber accounts being accessed and sold on the dark web, with theories suggesting the use of stolen login information from other websites.

Timestamped Summary

00:00 Alex Bloomberg's Uber account was hacked while he was on vacation in the Bahamas, resulting in charges for rides in Russia and the inability to access his account.
04:23 Alex's attempts to contact Uber about his hacked account were met with automated responses and unhelpful customer service, leaving him frustrated and unable to resolve the issue.
07:57 Uber accounts were being hacked and sold on the dark web, leading to unauthorized rides being taken in various locations around the world.
11:18 Uber accounts were being accessed and sold on the dark web, but Uber denied having a data breach, leading to the theory that hackers were using a technique called credential stuffing, where they use stolen login information from other websites to gain access to Uber accounts.
15:03 Troy Hunt, an internet security researcher, created a website called HaveIbeenPwned.com where people can check if their personal information has been leaked on the internet, and it was revealed that the host's email address had been compromised on two different sites.
19:11 Uber believes that not only was the host's Uber account hacked, but his Gmail account was also hacked, and the hacker had access to his email account and was deleting the notifications from Uber before he saw them.
23:10 The host brings in a security researcher named Dave Mainer to help determine if his Gmail account has been hacked, and Dave explains that it is possible and common for Gmail accounts to be hacked, and suggests looking at the access logs for any suspicious activity.
27:20 The host and Richard discuss the possibility of his Gmail account being hacked and the suspicion that the tablet may have been compromised, but a scan with Windows Defender found no threats, leaving the source of the breach still unknown.
32:18 The host concludes that Richard's tablet is likely the source of the hack, but invites listeners to provide alternative theories via email.

Browse more Society & Culture