Skip to content
  • Products & Services
  • Security Operations
  • Threat Research
  • AI Research
  • Sophos Life
  • Products & Services
  • Security Operations
  • Threat Research
  • AI Research
  • Sophos Life
Uber car. Image courtesy of mikedotta / Shutterstock.
Naked Security Naked Security

Uber users are paying for fraudsters to take rides in China

Uber users are findiing themselves - or, rather, their accounts - magically whisked around the world to ride through the city streets of China.
Written by Lisa Vaas
September 25, 2015
Naked Security account hijacking china cracked password reuse Passwords Uber

Uber car. Image courtesy of mikedotta / Shutterstock.

Uber users this week have found themselves – or, at any rate, their accounts – magically whisked around the world to ride through the city streets of China.

Below are a few tweets from those who’ve found that Chinese fraudsters had used the hacked accounts to take free trips.

Kirby Bittner was one such:

@Uber I had a great ride in China this morning! Except, weird, I wasn't in China this morning. #UberAccountHacked pic.twitter.com/f25IOYFxr9

— Kirby Bittner (@kirbybitt) September 21, 2015

Valerie Bolanos was another:

@Uber_Support my account got hacked and used in China. What do I do?

— Valerie Bolanos (@churruquitaa) September 22, 2015

Jess suffered a similar fate:

I have emailed @Uber_Support to complain about a hack and a charge from China and no one has yet to follow up.

— Jess (@jmejia_08) September 23, 2015

The tweets were brought to Motherboard’s attention by a poster on the UberPeople.net forum – a Twitter user who goes by the handle Just Aguy and who describes himself as a professional Chicago cabbie.

As you might recall, it was Motherboard that, back in March 2015, found thousands of cracked Uber accounts selling for as little as $1 on the dark web – a price that tumbled to 40 cents in August, presumably after Uber started experimenting with multifactor authentication.

Those sales involved reportedly valid email/password logins for Uber accounts.

The root cause of the accounts being broken into appears to have been login reuse: i.e., the same email/password combination used on multiple online services.

Hackers can pick up stolen email/password combinations from data dumps that circulate on the dark web. They can then use an account-cracking program to cycle through all of the login credentials, trying each out in an attempt to log into Uber – or any other online account – in the hope that those credentials have been re-used.

It’s not even fair, really, to refer to this as “hacking,” given that it amounts to little more than an efficiently programmed manner of taking advantage of somebody else having cracked accounts and then dumped the logins online.

Uber has been guilty of plenty of missteps when it comes to handling data.

The latest misstep to add to the mix: earlier this month, data related to more than three dozen “shared” Uber trips were found to have leaked into Google search results, including exact address data, be it that of a home or work address.

Anybody could have accessed the cached data – which described trips in the US, UK, Russia, Indonesia, India and the Philippines that dated back as far as 2013 – by simply running a search on the string “trip.uber.com”.

But data missteps aside, the onus for avoiding password reuse lies squarely with users when it comes to picking a strong, unique password for their Uber accounts.

If you’ve used your Uber password elsewhere on the web, change it! Ditto for any other email/password combination used anywhere else

It amounts to following the simple rule of one site, one (unique, difficult to guess) password.

Image of Uber car courtesy of mikedotta / Shutterstock.

Share this:

  • Click to share on Mastodon (Opens in new window) Mastodon
  • Click to share on Bluesky (Opens in new window) Bluesky
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • More
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to print (Opens in new window) Print
  • Click to email a link to a friend (Opens in new window) Email
  • Share on Facebook
  • Share on X
  • Share on LinkedIn
About the Author

Lisa Vaas

Read Similar Articles

May 24, 2021

What to expect when you’ve been hit with Avaddon ransomware

May 19, 2021

What’s New in Sophos EDR 4.0

May 19, 2021

Sophos XDR: Driven by data

Subscribe to get the latest updates in your inbox.
Which categories are you interested in?
Change Region
  • América Latina
  • Brasil
  • Deutschland
  • English
  • France
  • Iberia
  • Italia
  • Japan
Terms Privacy
  • Privacy Notice
  • Cookies
Legal
  • General
  • Modern Slavery Statement
  • Speak Out
© 1997 - 2025 Sophos Ltd. All rights reserved