Sunday, February 23, 2025
HomeCyber Security NewsUber to Pay $148 Million as a Settlement for Data Breach Cover

Uber to Pay $148 Million as a Settlement for Data Breach Cover

Published on

SIEM as a Service

Follow Us on Google News

Uber Agreed to Pay $148 Million as a Settlement for 2016 Uber data breach which impacts 57 million Uber users around the world and 600,000 drivers names including their license numbers were stolen.

The breach took place in October 2016 and the leaked data includes names, email addresses and mobile phone numbers that related to Uber accounts.

The case was filed against Uber for violating Pennsylvania’s data breach notification law. More than 13,500 Pennsylvania Uber drivers were affected by the breach.

“Uber violated Pennsylvania law by failing to put our residents on timely notice of this data breach,” Attorney General Josh Shapiro said. Uber tried to hide the incident by paying to hacker instead of notifying to the customer about the incident.

“The Pennsylvania Attorney General’s case against Uber was settled as part of the national settlement announced today, which will require to pay $148 million to the 51 participating Attorneys General and Uber drivers.” reads the press release.

In addition to the settlement agreed to take precautions to protect any user data, strong password policies, to deploy overall data security policy, third-party to asses Uber’s data security efforts and to implement corporate integrity program.

Things Need to follow post-Data Breach

If you are a customer of an organization, that has suffered a data breach, you would need to know the steps to mitigate the effect of the data breach and do it quickly.

These steps will differ, based on the situation surrounding the breach and the vulnerability of the stolen information. Importantly, consider the current situation:

  • Verify that the breach has taken place, affecting your data
  • What kind of data breach has taken place?
  • Was your data or credentials affected in the data breach?
  • Has any data concerning your personal information been stolen, or is the breach more constrained?
  • Do you have proof that the cybercriminals have done anything with your personal data, such as used it to carry out identity theft?

Related Read

Cyber Attack Hits SHEIN Fashion Retailer, More Than Affected 6.42 Million Customers

Best ways to Lock Down the Highly Sensitive Data From the Massive Breaches

Hackers Uploaded 42M Record that Contains Email Address and Credit Card Data to Free Anonymous Hosting Service

Huge E-marketing Database that Contains 11 Million Sensitive Personal Records Exposed Online

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

New Zhong Stealer Malware Exploit Zendesk to Attack Fintech and Cryptocurrency

A newly identified malware, dubbed Zhong Stealer, has emerged as a significant threat to...

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

New Zhong Stealer Malware Exploit Zendesk to Attack Fintech and Cryptocurrency

A newly identified malware, dubbed Zhong Stealer, has emerged as a significant threat to...

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...