
- LINKEDIN DATA BREACH 2016 DRIVERS
- LINKEDIN DATA BREACH 2016 DRIVER
- LINKEDIN DATA BREACH 2016 LICENSE
Sullivan is charged with three counts of wire fraud, obstruction of justice, and misprision of a felony. “We allege Sullivan falsified documents to avoid the obligation to notify victims and hid the severity of a serious data breach from the FTC, all to enrich his company,” Hinds added. The indictment alleges that Sullivan failed to do either. “Federal law also requires truthful answers to official government inquiries. “When hacks like this occur, state law requires notice to victims,” acting US attorney Stephanie Hinds said in a US Department of Justice statement on the latest development of the closely-watched case. In addition, Sullivan sent an email to Uber’s then recently appointed chief executive that characterized the affair as a routine “security incident” rather than a (more serious) data breach.
LINKEDIN DATA BREACH 2016 DRIVERS
The allegations of wire fraud arise form Sullivan’s alleged attempt to defraud Uber’s drivers by failing to disclose the 2016 breach.Īccording to prosecutors, the non-disclosure agreements falsely stated that the hackers had neither taken nor stored Uber’s data. Read more of the latest US information security newsĬalifornian law requires businesses operating in the state to notify residents about data breaches. Sullivan allegedly complied with an extortionate demand for payment while disguising it as a bug bounty payment and getting the hackers to make false statements as part of fraudulent non-disclosure agreements.Īs the US Department of Justice points out, bug bounties exist to spur the legitimate discovery and reporting of security issues rather than to cover the exchange of compromised data. The two individuals involved were subsequently identified, arrested, charged, and convicted over attacks on LinkedIn and Uber.

The sensitive data was downloaded from a third-party cloud provider’s storage bucket and accessed by abusing credentials an Uber engineer had inadvertently posted on a code-sharing website.Īccording to prosecutors, Sullivan made a deal with criminal hackers to keep quiet about the breach and delete the purloined data they held in exchange for a payment of $100,000 in bitcoin to individuals who refused to offer their true name.

LINKEDIN DATA BREACH 2016 LICENSE
Unauthorized attackers obtained access to the personal details of 57 million Uber users and the driving license information of around 600,000 drivers in October 2016.īACKGROUND Uber security exec charged over 2016 data breach ‘cover-up’ The latest charges – handed down in a superseding indictment returned by a federal grand jury – add to previous charges of obstruction of justice and ‘misprision of a felony’.

LINKEDIN DATA BREACH 2016 DRIVER
Wire fraud has joined the list of charges pending against Joseph Sullivan, 52, of Palo Alto, California over his alleged concealment of a 2016 attack that exposed 57 million user and 600,000 driver records. Alleged misuse of bug bounty and failure to disclose breach leads to criminal chargesĪdditional charges have been added to the indictment against a former Uber chief security officer over his alleged involvement in the cover-up of a hack against the ride-hailing app in 2016.
