We Will Ensure What Happened with Uber in 2022 Won't Happen to You
Mine2 Team4 min read
PRIVILEGED ACCESS SECURITY#uber#pam-security#lapsus

We Will Ensure What Happened with Uber in 2022 Won't Happen to You

Uber's 2022 breach via hardcoded PAM credentials resulted in total infrastructure takeover. Learn how Mine2's honeytokens and breach traps can detect secrets sprawl and prevent privileged access compromise.

Share:

In September 2022, Uber suffered a total internal takeover. A single compromised contractor account—purchased on the dark web—led to domain admin access across AWS, GCP, VMware, Slack, SentinelOne, and Uber's HackerOne console. The linchpin? A hardcoded admin credential in a PowerShell script that unlocked Thycotic, Uber's Privileged Access Management (PAM) system. From there, the attacker, affiliated with LAPSUS$, held the master key to every door.

Uber

This wasn't a zero-day or a sophisticated exploit. It was a secrets sprawl disaster—three breaches in eight years, all tied to leaked credentials. Uber paid millions in recovery, lost trust, and still can't be sure the attacker didn't leave backdoors.

But it was preventable. And with the right deception layer, it won't happen to you.

The Uber Breach: A Masterclass in Secrets Failure

Here's how it unfolded:

  1. Social Engineering → VPN Access An external contractor fell for a phishing campaign. Their credentials were sold on a criminal marketplace.

  2. PowerShell Script → PAM Admin Inside Uber's network, the attacker found a script with hardcoded domain admin credentials for Thycotic. One line of code = full PAM takeover.

  3. PAM = Keys to the Kingdom Thycotic stored credentials for AWS, GCP, GSuite, Slack, SentinelOne, and more. The attacker enumerated and extracted them at will.

  4. Lateral Movement & Persistence

    • Reconfigured AWS IAM roles
    • Accessed VMware vSphere hypervisors
    • Disabled alerts in SentinelOne
    • Posted taunts in Slack and HackerOne

"Finding admin credentials to a PAM system is like finding a master key to every room and alarm system, in every building, in every country." — Mackenzie Jackson, GitGuardian

Uber's 2014 and 2016 breaches? Same root cause: leaked secrets in public repos and poor password hygiene. History repeated—only louder.

Why Traditional Tools Failed Uber

  • Secrets Scanners? Too late—credentials were already in production.
  • MFA? Bypassed via stolen session tokens.
  • SIEM? No alerts on "legitimate" admin logins from a new IP.
  • PAM? Compromised because it was the single source of truth.

The attacker never needed to exploit a vulnerability. They just used what was already there.

Deception: Your Early-Warning PAM Shield

This is where cyber deception—specifically Mine2.io—changes everything. Instead of hoping secrets stay hidden, we weaponize the attacker's curiosity.

How Mine2 Would Have Stopped Uber Cold

Attack Phase Mine2 Deception Countermeasure
Phished Contractor Login Canary Tokens in VPN Logs – Fake session IDs trigger silent alerts on first use.
PowerShell Script Discovery Honeytoken Credentials – Bogus Thycotic admin creds planted in scripts. Any use → instant detection.
PAM Access Attempt Decoy PAM Vault – A fully functional fake Thycotic instance. Attacker logs in, extracts fake keys, wastes hours.
Lateral Movement Breach Traps – Decoy AWS consoles, Slack bots, and SentinelOne dashboards divert and log every move.

Zero false positives. Real-time alerts. Automated containment.

Even if the real Thycotic was compromised, the first touch of a honeytoken would have triggered:

  • Session termination
  • Credential rotation
  • IR playbook execution …before the attacker reached AWS or Slack.

Build Your "Uber-Proof" Defense Today

You don't need to replace your PAM, MFA, or EDR. You need to layer deception on top.

Immediate Actions with Mine2.io:

  1. Seed Honeytokens in Scripts & Configs – 5 minutes to deploy fake PAM, AWS, and GCP keys.
  2. Deploy Decoy Admin Accounts – Lure attackers into monitored traps.
  3. Monitor with Zero Noise – Only malicious behavior triggers alerts.
  4. Integrate with SOAR – Auto-kill sessions on deception trigger.

Uber's breach wasn't bad luck. It was predictable exposure without early detection.

We guarantee: With Mine2.io active, no attacker touches a real secret without you knowing—on day one.

Don't wait for your own "Uber moment."

M2

Mine2 Team

The MINE2 team consists of cybersecurity experts, researchers, and engineers dedicated to advancing threat detection and cyber deception technologies.

Share this article

Secure Your Network Today

Ready to implement advanced cyber deception in your organization? See how MINE2 can transform your threat detection capabilities.