Uber Company Cyber Security Posture

uber.com

We are Uber. The go-getters. The kind of people who are relentless about our mission to help people go anywhere and get anything and earn their way. Movement is what we power. Itโ€™s our lifeblood. It runs through our veins. Itโ€™s what gets us out of bed each morning. It pushes us to constantly reimagine how we can move better. For you. For all the places you want to go. For all the things you want to get. For all the ways you want to earn. Across the entire world. In real time. At the incredible speed of now. The idea for Uber was born on a snowy night in Paris in 2008, and ever since then our DNA of reimagination and reinvention carries on. Weโ€™ve grown into a global platform powering flexible earnings and the movement of people and things in ever expanding ways. Weโ€™ve gone from connecting rides on 4 wheels to 2 wheels to 18-wheel freight deliveries. From takeout meals to daily essentials to prescription drugs to just about anything you need at any time and earning your way. From drivers with background checks to real-time verification, safety is a top priority every single day. At Uber, the pursuit of reimagination is never finished, never stops, and is always just beginning.

Uber Company Details

Linkedin ID:

uber-com

Employees number:

123983 employees

Number of followers:

3170015.0

NAICS:

425

Industry Type:

Internet Marketplace Platforms

Homepage:

uber.com

IP Addresses:

Scan still pending

Company ID:

UBE_1455109

Scan Status:

In-progress

AI scoreUber Risk Score (AI oriented)

Between 900 and 1000

This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

Ailogo

Uber Company Scoring based on AI Models

Model NameDateDescriptionCurrent Score DifferenceScore
AVERAGE-Industry03-12-2025

This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers.

N/A

Between 900 and 1000

Uber Company Cyber Security News & History

Past Incidents
8
Attack Types
3
EntityTypeSeverityImpactSeenUrl IDDetailsView
UberBreach100512/2022UBE2233131222Link
Rankiteo Explanation :
Attack threatening the organization's existence

Description: A threat actor named โ€˜UberLeaksโ€™ recently leaked data that wasย stolen from Uber and Uber Eats on a hacking forum known for publishing data breaches. The leaked data included numerous archives claiming to be source code associated with mobile device management platforms (MDM) used by Uber and Uber Eats and third-party vendor services. The leaked data is related to a security breach on a third-party vendor.

UberBreach60312/2017UBE74122323Link
Rankiteo Explanation :
Attack with significant impact with internal employee data leaks

Description: A cybercriminal has admitted to hacking businesses like Uber, Sainsbury's, and Groupon to sell customers' personal information on the dark web. The other targets included Nectar, T-Mobile, Asda, Ladbrokes, Coral, and Argos. The data comprised all the information required to complete an online purchase and was then promoted and sold to clients through his dark website. The firm is thought to have lost more than ยฃ200,000 due to the theft, although no financial data was collected. West pleaded guilty to two counts of conspiring to defraud, one count of hacking a computer, four counts of possessing and supplying marijuana, two counts of having criminal property, and one crime of money laundering Bitcoins. The leaked data is related to a security breach on a third-party vendor.

UberBreach100504/2023UBE23210723Link
Rankiteo Explanation :
Attack threatening the organizationโ€™s existence

Description: A threat actor named โ€˜UberLeaksโ€™ recently leaked data that was stolen from Uber and app's drivers on a hacking forum known for publishing data breaches. The leaked data included name and Social Security number and/or Tax Identification number. The leaked data is related to a security breach on a third-party vendor.

UberBreach100411/2017UBE229181223Link
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: Uber CEO Dara Khosrowshahi revealed that hackers had gained access to the personal information of 57 million of the firm's users by breaking into the company database. About 600,000 drivers in the US have had their identities and driver's licence numbers compromised by the attackers. In an attempt to coerce Uber, the hackers sought $100,000 in return for not disclosing the stolen information. The CEO clarified that because Uber built its company on the security and confidence of its clients, incidents of this nature won't occur again.

Uber Technologies, Inc.Breach60310/2016UBE1009072525Link
Rankiteo Explanation :
Attack with significant impact with internal employee data leaks

Description: The Washington State Office of the Attorney General reported a data breach involving Uber Technologies, Inc. on November 21, 2017. The breach occurred between October 13, 2016, and November 15, 2016, affecting the names and driver's license numbers of approximately 10,888 drivers in Washington State. Uber took remedial actions including providing credit monitoring services for the affected individuals.

Uber Technologies, Inc.Breach6035/2014UBE401072925Link
Rankiteo Explanation :
Attack with significant impact with internal employee data leaks

Description: The Washington Attorney General's Office reported a data breach involving Uber Technologies, Inc. on June 16, 2016. The breach, which occurred on May 13, 2014, involved unauthorized access to a database affecting 1,355 Washington residents, compromising their names and driver's license numbers.

UberCyber Attack100609/2022UBE1417922Link
Rankiteo Explanation :
Attack threatening the economy of a geographical region

Description: Uber was targeted by a cyber attack, and hackers gained access to security vulnerability information. The alleged hacker compromised an employee's Slack account before taking over Uber's internal systems. The hacker used social engineering instead of complex hacking methods. In order to access company accounts and sensitive data, thieves take advantage of people's credulity and lack of experience in this situation. They are still investigating the incident.

UberData Leak85302/2017UBE634191123Link
Rankiteo Explanation :
Attack with significant impact with internal employee data leaks

Description: Cloudflare was disclosing a lot of private data, including login passwords and authentication cookies. Uber, Fitbit, 1Password, and OKCupid are just a few of the big names affected by the Cloudbleed security flaw in Cloudflare servers. Because mobile apps are created with the same backends as browsers for HTTPS (SSL/TLS) termination and content delivery, they are likewise impacted by Cloudbleed. The fact that Cloudflare directed Ormandy to the company's bug bounty programme and offered the expert a t-shirt as payment in lieu of cash is highly unusual.

Uber Company Subsidiaries

SubsidiaryImage

We are Uber. The go-getters. The kind of people who are relentless about our mission to help people go anywhere and get anything and earn their way. Movement is what we power. Itโ€™s our lifeblood. It runs through our veins. Itโ€™s what gets us out of bed each morning. It pushes us to constantly reimagine how we can move better. For you. For all the places you want to go. For all the things you want to get. For all the ways you want to earn. Across the entire world. In real time. At the incredible speed of now. The idea for Uber was born on a snowy night in Paris in 2008, and ever since then our DNA of reimagination and reinvention carries on. Weโ€™ve grown into a global platform powering flexible earnings and the movement of people and things in ever expanding ways. Weโ€™ve gone from connecting rides on 4 wheels to 2 wheels to 18-wheel freight deliveries. From takeout meals to daily essentials to prescription drugs to just about anything you need at any time and earning your way. From drivers with background checks to real-time verification, safety is a top priority every single day. At Uber, the pursuit of reimagination is never finished, never stops, and is always just beginning.

Loading...

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=uber-com' -H 'apikey: YOUR_API_KEY_HERE'
newsone

Uber Cyber Security News

2024-11-15T08:00:00.000Z
Researchers Uncover Uber and Lyft Data Leak to Meta and TikTok

David Choffnes is one of several researchers who uncovered security issues with tracking pixels, tools that follow users around the web.

2025-05-29T07:00:00.000Z
The Uber of the underworld

Criminals who might once have committed crimes themselves are now becoming service providers in a vast underground marketplace.

2023-05-11T07:00:00.000Z
Cybersecurity Incident Simulation @ Uber

We have formed our own trio for how we simulate cybersecurity incidents at Uber to exercise our ability to act decisively should an incident occur.

2024-08-26T07:00:00.000Z
Uber fined $324 million by Netherlands data protection agency over transfer of drivers' personal details

Uber says it will appeal a $324 million fine imposed by the Dutch Data Protection Authority over the company's handling of drivers' personalย ...

2024-10-08T07:00:00.000Z
Ex-Uber CISO Requests a New, 'Fair' Trial

Former Uber CISO Joseph Sullivan, convicted in 2023 of trying to cover up a data breach, is seeking a new trial, citing procedures omissionsย ...

2024-09-27T07:00:00.000Z
Notorious โ€œ888โ€ Actor Selling Uber Customer Data on Hacking Forums

An infamous hacker known as โ€œ888โ€ has claimed to have obtained a vast database containing sensitive information about Uber Eats customers. Thisย ...

2024-11-12T08:00:00.000Z
The Hidden Dangers of Rideshare Apps: A Decade Later, Lobbying and Inaction Continue to Threaten Our Safety

Over a decade after my initial warning about them, various dangers posed by Uber, Lyft, and other rideshare apps remain unaddressed.

2024-10-09T07:00:00.000Z
Former Uber Security Chief Appeals Conviction in โ€˜Bug-Bountyโ€™ Case

Lawyers for Uber Technologies' former security chief Joseph Sullivan appeared in federal court, seeking to reverse his convictions in a caseย ...

2024-08-27T07:00:00.000Z
Data Transfer: Why is GDPR Rule Still Tripping Up Companies?

Uber is the latest casualty to be hit by the GDPR law surrounding data transfers, but why after six years is it still tripping up so manyย ...

similarCompanies

Uber Similar Companies

foodpanda

At foodpanda, we're on a mission to redefine how food, people, culture and tech are connected. Our panda family consists of problem solvers, designers and thinkers, working around the clock to make foodpanda the most powerful online tool for food convenience in the universe- and weโ€™re just getting s

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Uber CyberSecurity History Information

How many cyber incidents has Uber faced?

Total Incidents: According to Rankiteo, Uber has faced 8 incidents in the past.

What types of cybersecurity incidents have occurred at Uber?

Incident Types: The types of cybersecurity incidents that have occurred incidents .

Additional Questions

What Do We Measure?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge