In September 2022, Uber suffered a total internal takeover. A single compromised contractor account—purchased on the dark web—led to domain admin access across AWS, GCP, VMware, Slack, SentinelOne, and Uber's HackerOne console. The linchpin? A hardcoded admin credential in a PowerShell script that unlocked Thycotic, Uber's Privileged Access Management (PAM) system. From there, the attacker, affiliated with LAPSUS$, held the master key to every door.

This wasn't a zero-day or a sophisticated exploit. It was a secrets sprawl disaster—three breaches in eight years, all tied to leaked credentials. Uber paid millions in recovery, lost trust, and still can't be sure the attacker didn't leave backdoors.
But it was preventable. And with the right deception layer, it won't happen to you.
The Uber Breach: A Masterclass in Secrets Failure
Here's how it unfolded:
-
Social Engineering → VPN Access An external contractor fell for a phishing campaign. Their credentials were sold on a criminal marketplace.
-
PowerShell Script → PAM Admin Inside Uber's network, the attacker found a script with hardcoded domain admin credentials for Thycotic. One line of code = full PAM takeover.
-
PAM = Keys to the Kingdom Thycotic stored credentials for AWS, GCP, GSuite, Slack, SentinelOne, and more. The attacker enumerated and extracted them at will.
-
Lateral Movement & Persistence
- Reconfigured AWS IAM roles
- Accessed VMware vSphere hypervisors
- Disabled alerts in SentinelOne
- Posted taunts in Slack and HackerOne
"Finding admin credentials to a PAM system is like finding a master key to every room and alarm system, in every building, in every country." — Mackenzie Jackson, GitGuardian
Uber's 2014 and 2016 breaches? Same root cause: leaked secrets in public repos and poor password hygiene. History repeated—only louder.
Why Traditional Tools Failed Uber
- Secrets Scanners? Too late—credentials were already in production.
- MFA? Bypassed via stolen session tokens.
- SIEM? No alerts on "legitimate" admin logins from a new IP.
- PAM? Compromised because it was the single source of truth.
The attacker never needed to exploit a vulnerability. They just used what was already there.
Deception: Your Early-Warning PAM Shield
This is where cyber deception—specifically Mine2.io—changes everything. Instead of hoping secrets stay hidden, we weaponize the attacker's curiosity.
How Mine2 Would Have Stopped Uber Cold
| Attack Phase | Mine2 Deception Countermeasure |
|---|---|
| Phished Contractor Login | Canary Tokens in VPN Logs – Fake session IDs trigger silent alerts on first use. |
| PowerShell Script Discovery | Honeytoken Credentials – Bogus Thycotic admin creds planted in scripts. Any use → instant detection. |
| PAM Access Attempt | Decoy PAM Vault – A fully functional fake Thycotic instance. Attacker logs in, extracts fake keys, wastes hours. |
| Lateral Movement | Breach Traps – Decoy AWS consoles, Slack bots, and SentinelOne dashboards divert and log every move. |
Zero false positives. Real-time alerts. Automated containment.
Even if the real Thycotic was compromised, the first touch of a honeytoken would have triggered:
- Session termination
- Credential rotation
- IR playbook execution …before the attacker reached AWS or Slack.
Build Your "Uber-Proof" Defense Today
You don't need to replace your PAM, MFA, or EDR. You need to layer deception on top.
Immediate Actions with Mine2.io:
- Seed Honeytokens in Scripts & Configs – 5 minutes to deploy fake PAM, AWS, and GCP keys.
- Deploy Decoy Admin Accounts – Lure attackers into monitored traps.
- Monitor with Zero Noise – Only malicious behavior triggers alerts.
- Integrate with SOAR – Auto-kill sessions on deception trigger.
Uber's breach wasn't bad luck. It was predictable exposure without early detection.
We guarantee: With Mine2.io active, no attacker touches a real secret without you knowing—on day one.
Don't wait for your own "Uber moment."
Mine2 Team
The MINE2 team consists of cybersecurity experts, researchers, and engineers dedicated to advancing threat detection and cyber deception technologies.
Recent Articles
Customer Success: SaaS Company Prevents $2.4M Breach with Mine2 Honeytokens
When Your PAM Becomes the Attack Vector: How BeyondTrust's Exploitation Exposed Every Privileged Credential
AI Is Supercharging Credential Theft — Here's Why Honeytokens Are Your Best Early Warning
Need Security Help?
Protect your organization with MINE2's cyber deception platform.
