Former Uber Security Chief Sentenced to Probation for Covering Up Cyber-Attack

Former Uber Security Chief Sentenced to Probation for Covering Up Cyber-Attack
Former Uber security chief Joseph Sullivan sentenced to probation, fined $50k, and community service for covering up a cyber-attack.


Former Uber Security Chief Sentenced to Probation for Covering Up Cyber-Attack



Table Of Content


  • The Crime
  • The Hack
  • Conclusion

The Crime


Joseph Sullivan, the former chief security officer of Uber, has been sentenced to three years probation for hiding a cyber-attack from authorities. He was found guilty of paying hackers $100,000 to keep quiet after they accessed 57 million records of Uber customers, including their names and phone numbers.

Sullivan must also pay a fine of $50,000 and serve 200 hours of community service. Prosecutors had originally asked for a 15-month prison sentence. Sullivan was also found guilty of obstructing an investigation from the Federal Trade Commission.


The Hack


Sullivan became Uber's chief security officer in 2015. In November 2016, the hackers who targeted Uber emailed Sullivan and told him they had stolen a large amount of data, which they would delete in return for a ransom. Staff working for Sullivan confirmed that data, including records of 57 million Uber users and 600,000 driving license numbers, had been stolen.

According to the US Department of Justice (DOJ), Sullivan arranged for the hackers to be paid $100,000 in exchange for them signing non-disclosure agreements to not reveal the hack to anyone. The hackers were paid in December 2016, disguised as a bug bounty - a reward used to pay cyber-security researchers who disclose vulnerabilities so they can be fixed. The hackers subsequently faced conspiracy charges in 2019 and pleaded guilty.

According to the Wall Street Journal, Judge William Orrick said he was showing Sullivan leniency partly because this was the first case of its kind, but also because of his character. However, he warned that anyone else who commits a similar crime should expect to spend time in custody, regardless of anything. It is important to remember that cyber-attacks are illegal and can have serious consequences. It is always better to report any suspicious activity to the authorities rather than trying to cover it up.


Conclusion


Joseph Sullivan, the former chief security officer of Uber, has been sentenced to three years of probation, a $50,000 fine, and 200 hours of community service for concealing a cyber-attack that exposed 57 million records of Uber customers, including their names and phone numbers. Sullivan had paid the hackers $100,000 in exchange for signing non-disclosure agreements to not reveal the hack to anyone. The payment was disguised as a bug bounty, which is a reward given to cybersecurity researchers who report vulnerabilities so they can be fixed. Sullivan was also found guilty of obstructing an investigation from the Federal Trade Commission.

The hackers subsequently faced conspiracy charges in 2019 and pleaded guilty. Judge William Orrick showed leniency to Sullivan due to his character and because this was the first case of its kind. However, he warned that anyone who commits a similar crime should expect to spend time in custody. It is crucial to report any suspicious activity to the authorities rather than trying to cover it up as cyber-attacks are illegal and can have serious consequences.


cyber security hacking hacker typer hacker news hacker prank simulator hacker simulator hack the box ethical hacking instagram hack hacker prank hacksplaining hack facebook account ceh facebook hack google dorks feebhax free fire id hack hack wifi password hacker dark vip hacking websites pranx com hacker anonymous hacker computer security hack wifi wifi hack white hat hacker facebook id hack instahack thegramhacker com it security onlyfans hack black hat hacker google hacking database instahaxor hack instagram account the hacker news instaripper nptel ethical hacking lulzsec wifi password hacker online hacking tools google hacking threat intelligence geek prank hacker uber hack hacker typer prank online hacker simulator snapchat hack instahax0r free fire hacker whatsapp hack kaise kare instagram id hack mobile hack fb hack link hacksplaining com siczine thegramar hacker com ighack cyber security companies hack facebook online id hack grey hat hacker solarwinds hack facebook hacker cup the gram hacker com mega hack v7 hacksplanning com hacktivism cyber threat intelligence phreaking best hacker in the world security hacker patreon hack hacking the art of exploitation cyber threats siczine com hack hack instagram and get verified hacker net digital security kali linux tools findmyfbid in hack hacker typer 2 hack account hack fb account only fans hack noob hacker facebook password sniper twitter hack national cyber security centre hack gmail instagram hacking link hack me instagram password cracker red hat hacker phone hack python site drive google com ethical hacking instagram password finder hack com hack chat white hacker pwn2own hacking link wifi cracker wifiphisher rafay baloch hackme hack fb online wifi hacker online hacker site nvidia hack hacking site drive google com ff id hack cybersecurity and infrastructure security agency the gram hacker hacker house social engineering the art of human hacking fern wifi cracker paypal hack facebook hack com panel hack free fire spom hack pegasus 2 spyware mega hack opensea hack insta id hack hacker png ceh v11 cyber security threats whazzak whatsapp hacker cyber essentials plus discord hack sp0m hack hack facebook password learn hacking thegramhack com whatsapp hack karne ka tarika hacker typer unblocked indishell whatsapp whazzak hacker forum hack onlyfans wps wifi hacker web hacker prank com hacker technical meer mobile hacking hacker online hack prank simulator hacking websites for free fb id hack icloud hack gray hat hacker okta hack hacking device my facebook account hack hacker gta 6 top cybersecurity companies pranx hacker youtube hack best hack net phishing hackers hacker typer net vulnerability in cyber security rockstar hacker hacker io shell shockers aimbot cmd hack cyber intelligence thegramhack computer hacking hackingvision instagram hacker com hacker typer com lapsus hackers hack account me wifi password cracker internet threats blue hat hacker black hacker cisco cybersecurity free fire uid hack prank hacker simulator ss7 attack the hack wifi password hacker for pc ceh exam hack facebook messenger cyberseek ninjalitics hack hack instagram account online 2022 telegram hack hacker typer simulator geek hacker cyber hacking thegramar hack com hacker fb instagram hacking tool famous hackers unlock snapchat account hack hacker simulator prank google hack news hack a phone in 20 seconds instagram hack online social engineering the science of human hacking learn ethical hacking hack facebook account online guided hacking wormhole hack hacker web hack it unlock onlyfans real time hacking attacks cyber security monitoring whatsapp hack kaise karte hain password hacker instagram account hack online the gramhacker com hack gmail account hacker facebook password prank call hack cyber security information hacker dot net cryptography in cyber security hack free free fire id hack online website cyber security month hackthetech free fire account to garena hack thegraph hack com hack snapchat account hack messenger rituraj google hack cyber security expert the web application hacker's handbook hack facebook github ceh v12 fbwand dot com hack wifi password online android cybersecurity essentials penetration testing a hands on introduction to hacking hacker 101 cybersecurity agency t mobile hack hackersploit bluetooth hacking arab hacker google chrome hack learn hacking online id hack free fire uid link android hack instaleak net find my hacker 2022 cyber threats mega hack v6 the only facebook account hacker with 75 success rate hayy hardware hacking real hacker typer best hacking websites instagram hacking website hack wizard page top internet security 2022 ot cyber security social hacking internet security company green hat hacker hack box hacking for dummies best network security companies cyber security attacks yopmail com hack samsung hack hacker sim whatsapp hack trick 2021 facebook hack link cyber protection cyber security management instagramhackor com hack the tech deloitte cyber security cyber security strategy youtube premium hack car hacking udemy cyber security hackfbaccountlive dot com hacker prank simulator 2 nist cybersecurity ibm cyber security coursera cybersecurity top hackers in the world sony hack thegramhacker panel hack hacker program mega hack v7 free mspy hack confidentiality in cyber security hacking apis geektyper hacker hamza hacker get your instagram hack hkr 3 facebook hack hacking websites prank phone phreaking hacking tools github termux hacking tools github hacker cup python hacking web application hacker's handbook uber hackers facebook hacking tool fsociety github imo hack youtube premium free hack best cyber security companies cyber security services cyber security upsc cybersecurity for beginners ec council ceh zoom hack cyber security audit last pass hack uber cyber attack capture the flag hacking heking com ima hacker cyber hack id cybersecurity summit termux hack hacking gadgets chrome hack microsoft cybersecurity hackmod stripchat hack hack facebook account free hack instagram followers free internet hack camera hack free fire hack account snapchat hack tool confirm your identity facebook hack free fire account hack hack whatsapp messages prank online network security companies iot hacking free fire hack id ceh price thegraham hacker com hacker online simulator github hack free fire hack use learn ethical hacking from scratch world no 1 hacker lapsus nvidia green hacker data hack system hacking free fire id hack link ethical hacking drive google com hack keyboard network hacking axie hack ceh exam cost professional hacker whatsapp hack website infosecawareness darkode availability in cyber security certified in cybersecurity termux instagram tools trick htb certified ethical hacker ceh astra hacker cyber network security facebook hacker com hack ml network and information security p4x hacker cyber security services company cyber security fundamentals instagram hack id iot cybersecurity cyber services cyber security degrees singcert cyber it talon cyber security computer cyber security network information security ciso as a service comptia cybersecurity google cyber security need of cyber security managed cyber security service national cyber security biggest cybersecurity companies sans cyber security acsc essential 8 cyber security assessment kpmg cyber security ctf cyber security network security and cyber security blockchain cybersecurity industrial cyber security top 10 cyber security threats cyber security network security cyber security solution providers cyber security javatpoint mitre d3fend cybersecurity best practices cloud cyber security forensic cyber security aws cyber security cyber security professional cyber security business cyber security firms iso cyber security artificial intelligence in cyber security cyber crime and security cisco cybersecurity essentials cloning cyber security cip cyber security spooling cyber security safeguard cyber cyber security near me national cyber strategy palo alto cyber security maritime cyber security information security audit government cyber security cyber expert cyber centre information security services cyber security it companies small business cyber security mssp cyber security cyber fusion center cyber security challenges critical infrastructure cybersecurity splunk cyber security ey cybersecurity computer security companies lapsus ransomware filtering cyber security cyber investigation cyber safety and security digital forensics in cyber security cybersec 2022 cyber s cyber security breaches best computer security simplilearn cyber security best cyber security national cybersecurity authority cyber forensics and information security defense in depth cybersecurity national cyber security strategy cyber security intelligence tenable cyber cybersecurity 101 cse cyber security cyber security website nids cyber security mandiant threat intelligence ransomware in cyber security learning cyber security cyber security solution cyber strategy cybersecurity as a service d3fend accenture cyber security largest cybersecurity companies threat intelligence services utm cyber security coro cyber security infosec company security services in information security fundamentals of cyber security cyber security protection cyber crime and cyber security cyber crime security ine cybersecurity cybersecurity service provider cyber company cyber security managed services cyber security online msp cyber security pam cybersecurity iso iec 27032 top 10 cyber security companies cyber security companies near me stephane nappo fda cybersecurity cyber security organizations gartner cyber security essential 8 cyber security mdm cyber security cyber crime upsc mitre cyber security cyber security in banking rsa cybersecurity ncsc cyber essentials information and computer security cyberrisk isac cyber security sap cyber security craw cyber security networking and cyber security national cyber security center information security strategy enterprise cybersecurity scada cyber security information and cyber security cyber fusion amazon cyber security wiz cybersecurity hids cyber security need of information security cis cyber edx cybersecurity data security companies nsa cyber security sentinel cyber security cyber security institute dana tran cybersecurity zero trust cyber security cyber security analysis pretexting cyber security nmap in cyber security cybersecurity breaches ey cyber security cyber threat analysis bulletproof cyber security cybersecurity essentials cisco cyber security month 2022 cyber audit pci dss cyber security cyber threat management cyber security png blackberry cyber security cyber security coding ndr cybersecurity threat intelligence in cyber security cyber security tutorialspoint information security and cyber security cyber threat actors bcp cyber security aup cyber security sme cyber security hips cyber security sandbox cyber security saas cyber security cis cyber security areas of cyber security quantum cyber security cyber security specialists 10 steps to cyber security swg cyber security cisco cybervision smb cybersecurity enisa cybersecurity msc cyber forensics and information security cyber ireland leonardo cyber security computer security and forensics top cybersecurity companies 2022 digital forensics and cyber security artificial intelligence and cybersecurity national cyber security agency mcafee cyber security crest cyber security rmf cybersecurity cyber security centre cybersecurity month 2022 cyberskills mttr cyber security mandiant cyber security apple cyber security pci cyber security fde cyber security ankit singh cyber security cyber security w3schools infosecawareness in cyberaware cyber security infrastructure azure cyber security claranet cyber security mitigate cyber springboard cybersecurity sed cyber security cyber security summit 2022 national cyber cybersecurity asset management cyberspace security basic cyber security national cyber coordination centre cyber security platform allsafe cybersecurity sophos cyber security threat actors cyber security fastest growing cybersecurity companies international cybersecurity institute stride cyber security global cyber pwc cybersecurity government cyber security strategy managed cyber security fortinet cyber security nips cyber security cyber essentials questionnaire cyber monitoring cyber physical security thales cyber security blockchain and cyber security cybersecurity technologies cyber security data nist cyber snort in cyber security ais cybersecurity ict cyber security csr cyber security issa cybersecurity beaconing cyber security oscp cyber security cybrary cissp cyber security vendors physical security cybersecurity bia cyber security cyber uk 2022 blockchain in cyber security current cyber security threats top 5 cyber security threats cyber security words cyber threat assessment hipaa cyber security cyber defense center cyber security threat intelligence cyber security and forensics current cyber threats atos cyber security internet attacks isaca cybersecurity fundamentals spf cyber security best network security overview of cyber security vulnerability management in cyber security cyber security slideshare corporate cyber security cyber security nordic dell cyber security tiktok cyber security cyber security 1 c0c0n recent cyber security breaches top cybersecurity threats 2022 threat intelligence companies top cybersecurity threats security threats in cyber security cmmc cybersecurity cyber security help riskrecon mastercard physical security in cyber security mosse cybersecurity institute cyber security usa sans cyber bcit cyber security cyber security threats 2022 cyber threats and security common cyber security threats be cyber security information security in cyber security recent cybersecurity attacks bt cyber security coro cybersecurity 5g cybersecurity cyber security overview cyber insecurity vdi cyber security latest cyber threats cyber security in banking sector gchq cyber security isaca cybersecurity crl cyber security csam cybersecurity cyber crime in cyber security lockheed martin cyber security tcs cyber security cyber security is cyber threats 2022 international cyber security cyber security providers cybersecurity 202 ot cyber codecademy cybersecurity vapt in cyber security cyber business fim cyber security aerospace and defense cyber security cyberspace in cyber security cyber threats to national security csc cyber security upgrad cyber security cyber essential carbon black cyber security norton cyber security mwr cybersec pivoting cybersecurity ccna cybersecurity cyber security google network security in cyber security internet of things cybersecurity cisa exploited vulnerabilities isso cyber security pwc cyber kpmg cyber cyber vulnerabilities it and cyber security ale cyber security siemens cyber security quantum computing cyber security computer forensics in cyber security top cybersecurity companies in usa cyber security protocols kaspersky industrial cybersecurity cisa ransomware cloud vulnerability management defence in depth cyber security common cyber threats israeli cyber security companies rise cyber security great learning cyber security ncsc cisp iot and cybersecurity top 10 cyber security threats 2021 certified cyber security csp cyber security infosec cyber security cyber essentials certified security audit in cyber security forbes cybersecurity cyber threat intelligence platform black hat cybersecurity noc cyber security cyber security com cyber security assessment services metasploit in cyber security ciso cyber security owasp cyber security gpo cyber security online cyber strategic threat intelligence javatpoint cyber security atp cyber security cyber security practices sso cyber security forensics in cyber security iso 27001 cyber security udacity cybersecurity nist csf assessment nptel cyber security drawbridge cybersecurity sdn cyber security computer cyber cyber security in cloud computing certified in cybersecurity cc cyber security attacks 2022 cssp cyber security cyber essentials cost best way to get into cyber security thrivedx saas global cyber security security services in cryptography and network security cloud computing and cyber security cyber security threats and vulnerabilities okta cyber security recon cyber security security attacks in cryptography and network security cloud security in cyber security vulnerability management cyber security dac cyber security cyber security today computer security cyber security information security and digital forensics operational threat intelligence vulnerability assessment in cyber security caasm gartner nmap cyber security threat intelligence vendors information security companies pam in cyber security autopsy cyber security huntress cyber security top 10 cyber security threats 2022 c2 cyber security cirt cyber security wireshark in cyber security pivoting in cyber security cit cyber security mckinsey cyber security cuckoo cyber security it security strategy drp cyber security edureka cyber security cyber management cisa cyber cyber response cyber essentials plus cost salesforce cyber security cyber security areas cybersecurity playbook ncc cyber security sans cyber threat intelligence cyber security defense barracuda cyber security fintech cybersecurity iocs cyber security spearfishing cyber security leading cyber security companies cyber security details mou cyber security retail cybersecurity csf cybersecurity cybersecurity week threat intelligence management cyber security week 2022 ctf in cyber security security forensics top cyber threats threat intelligence providers optiv cyber security fireeye cyber security top cyber threats 2022 cybersecurity infrastructure security agency cyber information dark web cyber security nic cyber security ueba cyber security cyber threats in cryptography poc cyber security fireeye threat intelligence cissp cyber security saml cyber security cyber security concerns oracle cyber security ecc cyber security certified cyber security professional security degrees capgemini cyber security cybersecurity discord ups cyber security iit cyber security snort cybersecurity

Post a Comment

0 Comments