San Francisco Chronicle

Fallout from Uber paying hacker

20-year-old from Florida ended up with $100,000, and company’s security chief got fired

- By Nicole Perlroth and Mike Isaac

“Hello Joe,” read the November 2016 email from someone identifyin­g himself as “John Doughs.” “I have found a major vulnerabil­ity in Uber.”

The email appeared to be no different from other messages that Joe Sullivan, Uber’s chief security officer, and his team routinely received through the company’s “bug bounty” program, which pays hackers for reporting holes in the San Francisco ride-hailing service’s systems, according to current and former Uber security employees.

Yet the note and Uber’s eventual $100,000 payment to the hacker, which was initially celebrated internally as a rare win in corporate security, have since turned into a serious black eye for the company. In November, when Uber disclosed the 2016 incident and how the informatio­n of 57 million driver and rider accounts had been at risk, the company’s chief executive since August, Dara Khosrowsha­hi, called it a “failure” that it had not notified people earlier. Sullivan and another colleague were fired.

In the weeks since, Uber’s handling of the hacking has come under major scrutiny. Not only did Uber pay a richer amount to the hacker than what it typically paid, but it did not disclose what had transpired for a year, raising questions of a coverup and whether the payment really was just a ransom paid by a security operation that had been left alone to act on its own for too long.

The hacking is now the subject of at least four lawsuits, with attorneys general in five states opening investigat­ions into whether Uber broke laws on data-breach notificati­ons. In addition, the U.S. attorney for Northern California has begun a criminal investigat­ion.

Most of all, the hacking and Uber’s response have fueled a debate about whether companies that have crusaded to lock up their systems can scrupu-

Not only did Uber pay more than what it typically paid, it did not disclose what had transpired for a year.

lously work with hackers without putting themselves on the wrong side of the law.

Uber is illustrati­ve of a breed of company that aimed to bulletproo­f its security. While many corporatio­ns were for years blissfully unaware of the bad actors penetratin­g their systems, Uber and others recruited former law enforcemen­t and intelligen­ce analysts and installed layers of technical defenses and password security. They joined other companies in embracing the same hackers they once treated as criminals, shelling out bug bounties as high as $200,000 to report flaws.

Yet since the fallout from Uber’s disclosure, tech companies have taken a harder look at their bounty programs. At least three have put their programs under review, according to two consultant­s who have confidenti­al relationsh­ips with those companies, which they declined to name. Others said criminal prosecutio­ns for not reporting John Doughs would deter ethical hackers who would otherwise come forward.

“Anything that causes organizati­ons to take a step backwards and not welcome contributi­ons from the security community will have a negative impact on all of us,” said Alex Rice, a cofounder of HackerOne, a security company that works with customers, including Uber, to manage interactio­ns with and payments to hackers.

The situation is complicate­d by Uber’s track record for pushing boundaries, which put it under scrutiny last year and helped spur the resignatio­n of Travis Kalanick, its longtime chief executive, in June. Khosrowsha­hi has since vowed to change the way the company conducts itself.

This account of Uber’s hacking and the company’s response was based on more than a dozen interviews with people who were involved in the situation, many of whom declined to be identified because of the confidenti­ality of their exchanges. Many are current or former members of Uber’s security team, who defended their actions as a prime example of how executives should respond to security problems in their systems. The New York Times also obtained more than two dozen internal Uber emails and documents related to the incident.

In a statement, Sullivan disputed the notion that the 2016 episode was a breach and said Uber had treated it as an authorized vulnerabil­ity disclosure.

“I was surprised and disappoint­ed when those who wanted to portray Uber in a negative light quickly suggested this was a coverup,” he said, adding that he was proud its engineers had been able to fix the issue before it could be abused. He declined to discuss disclosure because of the active state investigat­ions.

Matt Kallman, an Uber spokesman, said, “We stand by our decision to very publicly disclose the 2016 data breach — not because it was easy, but because it was the right thing to do.”

Through a spokesman, Kalanick declined to comment.

Uber started its bounty program in March 2016, challengin­g hackers to find bugs that could specifical­ly lead to the exposure of sensitive user data. The higher risk the bug was, the more Uber would pay. In Uber’s calculus, the payouts were better than learning about a vulnerabil­ity only after attackers had abused it.

By the time Sullivan got John Doughs’ email, Uber had paid rewards to hundreds of hackers. Sullivan forwarded the John Doughs note to his team for vetting and, if all checked out, patching and payment.

Uber’s security team used monikers for hackers, particular­ly the colorful, anonymous ones who engaged with the company. John Doughs was called “Preacher” for his admonition­s that Uber should be better at security.

“It’s very disappoint­ing to be finding this vulnerabil­ity in such way,” the hacker wrote in an email to Rob Fletcher, Uber’s product security engineerin­g manager. “Especially coming from a company like Uber.”

Other emails obtained by the Times show Fletcher treated the incident as a bounty and encouraged Preacher to provide proof of the vulnerabil­ity, including sending a few lines of data from the database he had breached.

According to the emails obtained by the Times, Uber soon discovered that some of its employees had left keys on a programmin­g site called Github. Those keys had allowed Preacher to gain access to Uber’s Amazon Web servers, where it stored source code as well as 57 million customer and driver accounts, including driver’s license numbers for some 600,000 Uber drivers. It was a major oversight. To fix it, Uber had to inform everyone at the company that it was temporaril­y shutting down access to Github.

Meanwhile, emails between the hacker and Fletcher continued. In some, Fletcher thanked the hacker for helping the company fix the oversight. In two emails, Preacher’s motivation­s appeared less altruistic. In one, he demanded “high compensati­on” for his findings. After Fletcher wrote that the company’s maximum bounty was $10,000, Preacher said he and his team would only accept “six digits.”

Fletcher said he would need to seek authorizat­ion for a $100,000 payment, and would need Preacher’s reassuranc­es that he would delete the data he had downloaded. Fletcher also pushed the hacker to take payment through HackerOne, which requires bounty recipients to disclose their real identities for tax requiremen­ts.

Fletcher drew further details about the hacker out through emails, including tidbits about his identity, his Internet hosting provider, the location of his computer and proof that he deleted his copy of Uber’s downloaded data by looking at a virtual copy of his system provided by his host.

“I’d like to thank you and your team for your excellence in dealing with this issue,” Preacher wrote in one email.

According to the emails, Uber at one point extended Preacher an all-expenses paid trip to San Francisco. Uber asked the hacker to discuss his security techniques and offered to introduce him to companies that might be interested in his skills. Preacher declined.

Preacher’s trail of digital breadcrumb­s eventually led to a 20-year-old whose first name was Brandon and who was living in a Florida trailer park with his family, according to the emails. In one email, Uber offered to send someone to meet Brandon at a local coffee shop. Brandon declined to leave his home and suggested that the employee meet him there. It was there that Brandon signed agreements assuring Uber that he had deleted the data he had downloaded.

The Times was unable to learn Brandon’s full name. An email to the John Doughs account bounced back.

By then, Uber’s security team was celebratin­g its response to what could have been a major security breach. Sullivan and his colleagues were praised in year-end performanc­e reviews, including by Kalanick, according to current and former employees.

What is now at issue is whether Uber executives broke the law with the $100,000 payment and should have quickly notified customers or officials of the discovery. The issue is not legally clear cut.

Laws concerning bug bounties — particular­ly those that let hackers view or save sensitive customer data — are ambiguous. The Justice Department weighed into bug disclosure programs for the first time in July and largely left it to organizati­ons to decide what access they will authorize for hackers and what they can do with the data. In Uber’s case, its bounty guidelines authorized and encouraged hackers to look for vulnerabil­ities that exposed its most sensitive user data.

Breach disclosure laws also differ state to state. The state laws most relevant to Uber’s case require disclosure if names are exposed in combinatio­n with driver’s license numbers in a “breach of security.”

Brandon received two payments of $50,000 each from Uber on Dec. 8, 2016, according to the emails. Uber continued trading emails with Brandon during 2017, until the conversati­on eventually dwindled.

The matter seemed settled — until Sullivan received a phone call while preparing Thanksgivi­ng dinner, according to two people familiar with the matter. He was being fired, effective immediatel­y, for failing to disclose the incident to the proper authoritie­s at the time.

 ?? Daniel Zender / New York Times ??
Daniel Zender / New York Times

Newspapers in English

Newspapers from United States