{
	"id": "0097cc28-100a-41a4-9ca8-c5c78ca6e048",
	"created_at": "2026-04-06T00:07:07.340155Z",
	"updated_at": "2026-04-10T03:20:46.569075Z",
	"deleted_at": null,
	"sha1_hash": "416ae841c33926f007d86bc005ce48aa2fa91630",
	"title": "FORK ME! Uber hauls GitHub into court to find who hacked database of 50,000 drivers",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 37271,
	"plain_text": "FORK ME! Uber hauls GitHub into court to find who hacked\r\ndatabase of 50,000 drivers\r\nBy Kieren McCarthy\r\nPublished: 2015-02-28 · Archived: 2026-04-05 18:04:51 UTC\r\nUber has subpoenaed GitHub to unmask netizens suspected of hacking its database of thousands of taxi drivers.\r\nThe ride-booking app vendor is trying to force GitHub [PDF] to hand over the IP addresses of anyone who visited\r\na particular gist post between March and September 2014.\r\nThat gist is believed to have contained a login key used by a hacker to access an internal Uber database of 50,000\r\ndrivers. Github declined to voluntarily hand over its gist access logs, leading to Friday's subpoena filing.\r\nUber has also launched a John Doe lawsuit [PDF] in the district court of northern California against the mystery\r\nhacker. Uber and GitHub are both headquartered in San Francisco, California.\r\n\"On or around May 12, 2014, from an IP address not associated with an Uber employee and otherwise unknown to\r\nUber, John Doe used the unique security key to download Uber database files containing confidential and\r\nproprietary information from Uber’s protected computers,\" the lawsuit's paperwork reads.\r\nIn a blog post on Friday, Uber admitted the database of driver names and license plates was accessed by the\r\nhacker way back in May, but the startup only spotted it in September.\r\nUber's security team knows the public IP address used by the database invader, and wants to link that number\r\nagainst the IP addresses and usernames of anyone who looked at the GitHub-hosted gist in question – ID 9556255\r\n– which we note today no longer exists.\r\nIt's possible the gist contained a leaked login key, or internal source code that contained a key that should not have\r\nbeen made public. We won't speculate further. Uber's also on a hiding to nothing if the IP address it's tracking\r\ndown is a proxy, Tor exit relay, or similar – but again, we'd hate to speculate.\r\nUber wants GitHub to provide ...\r\nall records, including but not limited to transactional or other logs, from March 14, 2014 to September\r\n17, 2014, identifying the IP addresses or subscribers that viewed, accessed, or modified these posts and\r\nthe date/time of access, viewing, or modification, as well as any records or metadata relating to the\r\nbrowser (i.e., logged HTTP headers, including cookies) or device that viewed, accessed, or modified the\r\nposts.\r\nIn other words, Uber hopes it will find an online breadcrumb trail from the gist to whoever hacked its systems.\r\nQuite why Uber has waited more than five months to subpoena GitHub is unclear, and the taxi-booking biz has\r\nrefused to explain the delay.\r\nhttps://www.theregister.com/2015/02/28/uber_subpoenas_github_for_hacker_details/\r\nPage 1 of 2\n\nIn its statement, Uber's Managing Counsel of Data Privacy Katherine Tassi said the breach covered \"current and\r\nformer Uber driver partner names and driver’s license numbers,\" and is offering a year of credit monitoring for\r\nfree to those whose details were leaked.\r\nIn keeping with its image as a gas tank of ethics running on empty, Uber does not provide an explanation for why\r\nit did not inform its drivers their details had been swiped until it decided to file a lawsuit five months later.\r\nThe post noted that the company had \"not received any reports of actual misuse of information as a result of this\r\nincident.\" ®\r\nSource: https://www.theregister.com/2015/02/28/uber_subpoenas_github_for_hacker_details/\r\nhttps://www.theregister.com/2015/02/28/uber_subpoenas_github_for_hacker_details/\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"references": [
		"https://www.theregister.com/2015/02/28/uber_subpoenas_github_for_hacker_details/"
	],
	"report_names": [
		"uber_subpoenas_github_for_hacker_details"
	],
	"threat_actors": [],
	"ts_created_at": 1775434027,
	"ts_updated_at": 1775791246,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/416ae841c33926f007d86bc005ce48aa2fa91630.pdf",
		"text": "https://archive.orkl.eu/416ae841c33926f007d86bc005ce48aa2fa91630.txt",
		"img": "https://archive.orkl.eu/416ae841c33926f007d86bc005ce48aa2fa91630.jpg"
	}
}