Uber and LinkedIn Hackers Plead Guilty to Conspiracy to Commit Extortion - Binary Defense

Threat Watch

Share on facebook
Share on twitter
Share on linkedin

Uber and LinkedIn Hackers Plead Guilty to Conspiracy to Commit Extortion

In the second half of 2016, LinkedIn’s Lynda.com and Uber were breached and then contacted by the hackers for payment to keep the breach quiet. Two men, Brandon Glover (26) from Florida and Vasile Mereacre (23) from Toronto were identified as the perpetrators when they plead guilty yesterday in a San Jose Courthouse. Amazon Web Services logins were used by the pair to access the Uber and Lynda.com servers and steal private customer information. The companies were contacted by the men, but each chose to handle the situation very differently.  LinkedIn, instead of paying out the demand, chose to notify their customers of the breach and engaged in investigations to attempt to identify the attackers. On the other hand, Uber paid out over $100,000 dollars to the hackers and made them sign an NDA in an effort to hide the breach. Uber’s decision to keep the breach secret came to light eventually and gave rise to an FTC investigation in which Uber was ordered to pay $148 million in fines and agree to 20 years of privacy audits.

ANALYST NOTES

The two men responsible used seemingly untraceable identities to attempt to blackmail these companies, but authorities were eventually able to track the criminals down. That is why it is important to establish trusted contacts within law enforcement and learn the processes involved in investigations so instances like this can be recognized and reported accordingly. Companies should also have proper technical, legal, and PR responses in place for when situations like this occur, as Uber’s decision to hide the breach proved to be quite costly.

Contact Support

Please complete the form below and a member of our support team will respond as quickly as possible.