Friday, April 11, 2025
HomeCyber Security NewsUber to Pay $148 Million as a Settlement for Data Breach Cover

Uber to Pay $148 Million as a Settlement for Data Breach Cover

Published on

SIEM as a Service

Follow Us on Google News

Uber Agreed to Pay $148 Million as a Settlement for 2016 Uber data breach which impacts 57 million Uber users around the world and 600,000 drivers names including their license numbers were stolen.

The breach took place in October 2016 and the leaked data includes names, email addresses and mobile phone numbers that related to Uber accounts.

The case was filed against Uber for violating Pennsylvania’s data breach notification law. More than 13,500 Pennsylvania Uber drivers were affected by the breach.

- Advertisement - Google News

“Uber violated Pennsylvania law by failing to put our residents on timely notice of this data breach,” Attorney General Josh Shapiro said. Uber tried to hide the incident by paying to hacker instead of notifying to the customer about the incident.

“The Pennsylvania Attorney General’s case against Uber was settled as part of the national settlement announced today, which will require to pay $148 million to the 51 participating Attorneys General and Uber drivers.” reads the press release.

In addition to the settlement agreed to take precautions to protect any user data, strong password policies, to deploy overall data security policy, third-party to asses Uber’s data security efforts and to implement corporate integrity program.

Things Need to follow post-Data Breach

If you are a customer of an organization, that has suffered a data breach, you would need to know the steps to mitigate the effect of the data breach and do it quickly.

These steps will differ, based on the situation surrounding the breach and the vulnerability of the stolen information. Importantly, consider the current situation:

  • Verify that the breach has taken place, affecting your data
  • What kind of data breach has taken place?
  • Was your data or credentials affected in the data breach?
  • Has any data concerning your personal information been stolen, or is the breach more constrained?
  • Do you have proof that the cybercriminals have done anything with your personal data, such as used it to carry out identity theft?

Related Read

Cyber Attack Hits SHEIN Fashion Retailer, More Than Affected 6.42 Million Customers

Best ways to Lock Down the Highly Sensitive Data From the Massive Breaches

Hackers Uploaded 42M Record that Contains Email Address and Credit Card Data to Free Anonymous Hosting Service

Huge E-marketing Database that Contains 11 Million Sensitive Personal Records Exposed Online

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

TROX Stealer Harvests Sensitive Data Including Stored Credit Cards and Browser Credentials

Cybersecurity experts at Sublime have uncovered a complex malware campaign revolving around TROX Stealer,...

Chinese eCrime Group Targets Users in 120+ Countries to Steal Banking Credentials

Smishing Triad, a Chinese eCrime group, has launched an extensive operation targeting users across...

Calix Devices Vulnerable to Pre-Auth RCE on Port 6998, Root Access Possible

A severe security flaw enabling unauthenticated remote code execution (RCE) with root privileges has...

Microsoft Boosts Exchange and SharePoint Security with Updated Antimalware Scan

Microsoft has fortified its Exchange Server and SharePoint Server security by integrating advanced Antimalware...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

TROX Stealer Harvests Sensitive Data Including Stored Credit Cards and Browser Credentials

Cybersecurity experts at Sublime have uncovered a complex malware campaign revolving around TROX Stealer,...

Chinese eCrime Group Targets Users in 120+ Countries to Steal Banking Credentials

Smishing Triad, a Chinese eCrime group, has launched an extensive operation targeting users across...

Calix Devices Vulnerable to Pre-Auth RCE on Port 6998, Root Access Possible

A severe security flaw enabling unauthenticated remote code execution (RCE) with root privileges has...