CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◍ Incident Response & DFIR Apr 15, 2026

Cybersecurity Incident Simulation @ Uber - Uber

Uber Archived Apr 15, 2026 ✓ Full text saved

Cybersecurity Incident Simulation @ Uber Uber

Full text archived locally
✦ AI Summary · Claude Sonnet


    May 11, 2023 Cybersecurity Incident Simulation @ Uber Hunter Blackmore Share this article All the best things come in threes: the Three Musketeers, the Three Stooges, and, of course, your favorite three-cheese pizza ordered via the UberEats app. Engineering Security (EngSec) at Uber agrees and we have formed our own trio for how we simulate cybersecurity incidents at Uber to exercise our ability to act decisively should an incident occur. This three-pronged approach consists of tabletop exercises, red team operations, and atomic simulations. Importance of Cybersecurity Incident Simulations While having strong preventative measures in place is vitally important, it is essential that key people and functions are well prepared to both act, and importantly act together, should an incident occur.   Multiple approaches can help reap the full benefits of cybersecurity incident simulations, and each approach can have different benefits and limitations. For example, a simulation requiring a large amount of planning can result in more sophistication and realism, but the preparation time can limit how frequently this type of simulation can be conducted. When combined, our trio of simulations provide an array of options for cybersecurity incident response readiness. Architecture of Our Approach Each of our three different simulation methods has its own unique focus: Tabletop Exercises (TTX) These exercises simulate a security incident over a multi-hour event. TTXs complement more technical simulations by focusing on processes, roles, and equipping leaders to make decisions. The following objectives are ones that we have identified as being broadly applicable to all of our TTXs and we reflect on these post-TTX to determine the success of the exercise: Exercise Uber’s capabilities to respond to large-scale cybersecurity incidents and improve collaboration across teams Facilitate executive leadership team (ELT) cybersecurity awareness and familiarity Exercise leadership team (LT) decision-making processes Identify strengths and areas of improvements to enhance Uber’s cybersecurity response capabilities   Improving the incident response team’s understanding of a technical area and gain a general understanding of incident handling in that area At Uber, we have moved away from the more traditional, highly scripted TTX format and reimagined our TTXs with the goal of each participant playing themselves as realistically as possible. Our execution looks something like this: A finding or experience is forwarded to the virtual Security Operations Center (vSOC) by someone who has “discovered” it The vSOC receives the report, triages, investigates, and escalates the issue to appropriate personnel for additional investigation and coordination per SOP An “inject” is given to the partially assembled Cyber Incident Response Team (CIRT) Additional CIRT members are brought in and work streams are activated Additional inject is given to the assembled CIRT Executive leadership joins for a scheduled brief by the CIRT team, focusing on asking the CIRT team questions as if this was a real-world scenario Additional work streams are activated, injects are given, and leadership briefs conducted until the conclusion of the TTX For our TTXs, injects are pieces of additional information the “game-master” provides to keep the simulation moving forward for the team. These could be anything from investigative findings, to questions from external stakeholders, to anything else those designing the simulation identify as beneficial to drill. These injects are given at intervals that allow CIRT members to exercise their process and solve problems between each inject. TTXs are valuable in bringing together a range of cross-functional teams with a scenario playing out in close to real time, which subsequently provides more valuable findings for us to address post-exercise. Red Team Operations Uber’s Red Team operations are high overhead when compared to a TTX or Atomic Simulation. These operations take a large amount of research and planning but are very beneficial and can match the complexity of real-world attacks. Uber’s Red Team operations aim to mimic real-world threat actor activity from the point of intrusion through either action on objective or their eviction from the network. Uber Cyber Defense also puts on an annual capture the flag event, where we bring together teams from across the company to respond and solve problems collaboratively. The simulations mimic attack chains that are seen (or realistically could be seen) in the wild. These allow us to test our detection, response, and investigative capabilities in a realistic way. The operations help us to respond to sophisticated attacks occurring in many possible environments. These simulations are unannounced and treated as real incidents as the response team usually does not determine they are Red Team until later stages of the investigation. Uber also runs an annual Red vs. Blue event that forms an unofficial capstone to our simulation program. This pre-announced simulation comes with buy-in and participation from key stakeholders. Teams from around Uber get together for a pre-planned two weeks of responding to the Red Team and working together to track and evict them from our environment. This event is a fun culmination of all the simulation work and practice done in the past year, flexing the lessons learned, and concludes with multiple read-outs to further drive cybersecurity at Uber forward. Atomic Simulations Atomic simulations are the much smaller and less complex side-kick to Red Team operations. These simulations focus on testing detections, SOPs, small pieces of real world incidents, and details from our threat intelligence briefs. They are low overhead and repeatable, allowing us to test improvements near real time. Using these atomic simulations, we can identify areas where improvements can be made, and then quickly retest to gauge the effectiveness of the changes we implemented.  We usually execute our Atomic Simulations as a chain of 5 or 6 tactics, techniques, and procedures (TTPs) that when brought together form a likely path that a threat actor would follow. As opposed to a Red Team operation, Atomic Simulations are more straightforward to plan and execute, with a basic scenario looking something like this: Simulation team places a remote access trojan (RAT) on an employee’s host in the ~/Downloads folder RAT is run connecting to a command and control (C2) server Simulation team then tries to run the following commands: Downloads and runs Nmap to discover hosts on the network Views and copies known hosts and SSH keys from the .ssh directory and dumps the host keychain Laterally moves to different hosts/environments using the data found cURLs down additional tools such as ngrok or ADfind Conducts additional reconnaissance and persistence TTPs Finally, sends the data collected to the C2 via DNS Response team conducts an after-action, Post-Incident Review discussing identified gaps and improvements to be made We can plan, stage, and run this type of simulation over the course of about two days. Responding to these smaller scale incidents gives the response teams a great way to test their response to low frequency, high impact detections that may fire in response to the simulation. We also use atomic simulations to help integrate new team members. Their flexibility and ease of use allow new members to leverage their new knowledge of our incident response process and technologies. By threading a simulation through a few environments at Uber with multiple IOCs, we are able to give new members of the team a great opportunity to pivot through our different tools and SOPs. Figure 1 Bringing It All Together Our three-pronged approach to cybersecurity incident simulations offers a broad way to test our security posture. We track our coverage not only by environment (such as corp, prod, cloud, etc.) but also by utilizing the MITRE ATT&CK® navigator. This framework enables us to map our simulations to TTPs and quickly determine how many we have simulated in the past year. The ATT&CK map is also combined with our threat hunting program to give a comprehensive view of the TTPs we have covered thanks to a few of our proactive security programs. Figure 2: Fictional example ATT&CK Matrix showing TTPs that have been simulated © 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation. Conclusion We utilize these simulations to keep up with the ever-evolving threat landscape and help prepare our cybersecurity teams to respond to the latest threats. We stand for safety and our approach to cybersecurity incident simulations is just one of the ways that we work to protect our riders, earners, eaters, and employees. Header Image Attribution: The “Poseidon rising” image is covered by a CC BY 2.0 license and is credited tojanoma.cl. Category EngineeringBackendSecurity Written by Hunter Blackmore Hunter Blackmore is a Staff Security Engineer and Tech Lead on the Cyber Defense team. He is passionate about security and taking the best practices from other industries such as aviation and applying them to his work at Uber. Related Articles 6 articles Data / ML Engineering Uber AI Evolution and Scale of Uber’s Delivery Search Platform April 14, 2026 Engineering Uber AI Open Source and In-House: How Uber Optimizes LLM Training April 14, 2026 Engineering Uber AI Innovative Recommendation Applications Using Two Tower Embeddings at Uber April 14, 2026 Backend Engineering Accelerating Search and Ingestion with High-Performance gRPC™ in OpenSearch™ April 14, 2026 Data / ML Engineering Under the Hood: Scaling Responsible AI at Uber April 13, 2026 Data / ML Engineering Accelerating Deep Learning: How Uber Optimized Petastorm for High-Throughput and Reproducible GPU Training April 9, 2026 Select your preferred language English Products Advertising Learn more about advertising on Uber. Reach consumers as they go anywhere and get anything. Earn Resources for driving and delivering with Uber Ride Experiences and information for people on the move Eat Ordering meals for delivery is just the beginning with Uber Eats Merchants Putting stores within reach of a world of customers Business Transforming the way companies move and feed their people Health Moving care forward together with medical providers Higher Education Enhancing campus transportation Transit Expanding the reach of public transportation Company Engineering The technology behind Uber Engineering Community support Doing the right thing for cities and communities globally Newsroom Uber news and updates in your country Uber.com Product, how-to, and policy content—and more Help EN Select your preferred language English Ride Drive & deliver Uber Eats Business Drive & deliver Ride Uber Eats Uber for Business Manage account Sign out
    💬 Team Notes
    Article Info
    Source
    Uber
    Category
    ◍ Incident Response & DFIR
    Published
    Apr 15, 2026
    Archived
    Apr 15, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗