Blog

Grand Theft Data: Uber Announces Almost 60 Million Accounts Compromised in Data Breach

Katherine Rusk and Ruth E. Promislow
November 22, 2017
Social Media
Download
Download
Read Mode
Subscribe
Summarize

The CEO of the popular ride-sharing app, Uber, published a bombshell letter to the public yesterday, stating that two hackers had stolen information from almost 60 million driver and rider accounts in October 2016.

The compromised personal information includes names, email addresses, driver's license numbers, and mobile phone numbers. According to a statement from Dara Khosrowshahi, Uber's current CEO, the hackers did not gain access to credit card numbers, Social Security numbers, birth dates, or trip location information.

Anonymous sources speaking to Bloomberg and The New York Times said that the company's then Chief Executive Officer and Chief Security Officer brokered a deal with the hackers to pay $100,000 in ransom in exchange for the deletion of the data and a non-disclosure agreement, and that Uber hid the payouts. The New York Times reported that Uber has fired their CSO for this breach response.

Uber's revelation highlights two key issues for organizations in ensuring good cybersecurity hygiene.

The first issue is that third-party security is your security. The hackers' point of entry into Uber’s system was through a third-party cloud-based service. Using a third-party service to compromise a major corporation is frequent method of attack for hackers—as has been discovered lately by Orange Is The New Black, Target, Home Depot, Costco, and more.

Organizations using cloud-based service providers should understand the steps that the provider takes to maintain security. This is not only important for the purpose of preventing attacks, but it is also important for limiting exposure to claims arising as a result of the attack. Put more simply, your organization may be exposed for the failure by your third-party service provider to employ appropriate cybersecurity protocol.

The second issue highlighted by the Uber incident is that an organization may be exposed to liability not only for a breach itself, but for the way that it responds to the breach. The manner in which an organization handles a breach can give rise to claims—or can help reduce liability. The 2016 class action settlement for the Home Depot data breach shows how companies can mitigate their liability by taking proactive notification measures and by helping the impacted individuals alleviate any harm.

Regulators in the UK, Australia, the Philippines, and New York have already announced they will be looking into Uber's data breach.

Organizations must not only be proactive in seeking to prevent attacks but must also have a well-thought out plan already in place for responding to incidents.

Social Media
Download
Download
Subscribe
Republishing Requests

For permission to republish this or any other publication, contact Amrita Kochhar at kochhara@bennettjones.com.

For informational purposes only

This publication provides an overview of legal trends and updates for informational purposes only. For personalized legal advice, please contact the authors.

From the Same Authors

See All
Right to Have Your Information De-Listed
Blog

Right to Have Your Information De-Listed? The Federal Privacy Commissioner Issues Decision

August 28, 2025
Ruth E. PromislowCaroline PoirierSuzie Suliman
Ruth E. Promislow, Caroline Poirier & Suzie Suliman
23andMes Data Breach
Blog

23andMe's Data Breach: Key Takeaways

June 26, 2025
Stephen D. BurnsRuth E. PromislowJ. Sébastien A. Gittens
& 7 more