• Skip to primary navigation
  • Skip to main content
  • Skip to footer
Logo of Agilient Security Consultants, Australia

Agilient Security Consultants Australia

The Best Security Consultants

Menu
  • Industries
      • Aviation and Airport Security Consultants Australia
      • Defence Industry Security Consulting
      • Government Security Consulting
      • Healthcare & Hospitals Security Consulting
      • Corrections and Detention
      • Maritime Security Consultant
      • Aged Care Facilities
      • Mining, Oil & Gas
      • Public Venues & Events
      • Rail
      • School and Education Security Consultant
      • Telecommunications Security Consultant
      • Utilities
      • Places of Faith and Worship
    • advice-colleagues-communication-newIndustries
  • Services
      • Cybersecurity Consultants
      • Protective Security
      • Business Resilience
      • Building Security Consultants
      • Security Audits
      • Cyber Audits
      • Data
      • Pandemic Planning
      • Azure
      • Electronic Security
      • IT Disaster Recovery Planning
      • Business Continuity Consultants
      • Identity Theft Consultant​
      • Security Consultants
      • Security Camera and CCTV Consultant
      • ISO
      • Duress Alarms
      • Cloud
      • AWS
      • Awareness Training
      • Penetration Testing
      • Security Risk Assessment Consultants
      • Managed Security Service Provider
      • Protection against Vehicles as a Weapon
    • training-1Services
  • Locations
    • Security Consultant Melbourne
    • Security Consultant Sydney
    • Security Consultant Brisbane
    • Security Consultant Adelaide
    • Security Consultant Canberra
    • Security Consultant Perth
  • Resources
    • menumanagers-dealing-customer-agreTraining
    • working-together-newJoin The Tribe
    • Webinars_3-1.jpgUpcoming and Past Events
    • hacking-detected-shutterstock_newResources
  • Articles
  • About
    • About Us
      We are an Australian owned and operated security company specialising in risk, cybersecurity, protective security, crisis and business continuity management services.
    • frequently-asked-questions-smallFAQ’s
    • bg-menu-government-institutionsConsultant Registration
  • Contact Us
Contact Us

Uber Hack Uses Slack Server To Taunt Employees

You are here: Home / Security News / Uber Hack Uses Slack Server To Taunt Employees

Stolen credentials were used by an 18 year-old hacker who bypassed Multi-Factor Authentification (MFA) protocols to access Uber’s Slack server and taunt Uber employees.

The attack, which occurred in October 2022, combined stolen credentials, an MFA attack, and social engineering (posing as tech support), to breach the system. The hacker demanded higher wages for Uber drivers, and essentially made it impossible for Uber drivers to complete their jobs while the incident was occurring.

Uber has released statements that advise that no customer data was compromised, all services are now fully operational, and internal software (Slack) is now back online.

Social engineering attacks exploit the trust of people working for a company in order to obtain passwords, screen names and other information required to gain user access to a network. This can be done using the following:

  • Phishing – this involves drafting an email that looks credible and using it to obtain information from a user
  • Watering Hole Attacks – the hacker finds websites where employees spend time, and will then try to engage in conversation with the employee and glean access information
  • Business Email Compromise (BEC) –  an attacker will usually use or pretend to use a manager or superior’s email, and request information
  • Physical social engineering – old-fashioned theft, usually involving rifling through drawers or distracting staff while they steal logins, etc.
  • USB Fraud – simple theft of a USB stick, or swapping one out for one with malware on it

The Uber attack shows just how sophisticated hackers have become when it comes to exploiting weaknesses through social engineering, particularly phishing.

It’s important that your MFA procedure is truly multi-factor, and not just two factor. It’s also a good idea to require different types of verification methods, include biometrics, to really ensure security.

If you have concerns about your business, and whether it is truly secure, contact us here at Agilient.

Tweet
Share

Security News

Looking for a security partner? Get in touch with Agilient.

Looking for practical and cost-effective security and risk solutions for your government department, agency or company? Speak with Australia’s leading senior security, risk and resilience experts.


Looking for a pandemic planning partner? Get in touch with Agilient.

Looking for practical and cost-effective risk management solutions for your government department, agency or company? Speak with Australia’s leading senior risk and emergency management experts.



Footer

Agilient is a proud member of

Ai Group Defence Council
Australian Industry & Defence Network
Australian Security Industry Association
Sydney Aerospace & Defence Interest Group

Company and Licensing Details:

ABN: 37 157 911 441
NSW Security Master Licence # 410783087
ACT Security Master Licence # 17502184
Vic Security Registration # 878-460-40S
Qld Security Firm Licence # 3834422

Join The Tribe

Sign up to receive our regular Agilient newsletter including the latest security, risk and resilience updates

Sign up now

Copyright © 2025 Agilient – Level 14, 275 Alfred St, North Sydney NSW 2060 Australia – 1300 341 692

Our Services

Security Consultant

Security Consultant Sydney

Security Consultant Melbourne

Security Consultant Canberra
Security Consultant Perth

Security Consultant Adelaide

Security Consultant Brisbane