In the photos given by the hacker and obtained by BleepingComputer, many crucial Uber IT systems, including the business' Windows domain and security software, appear to have full access.
The hacker also gained access to the organization's Google Workspace email admin panel, VMware ESXi virtual machines, Amazon Web Services interface, and Slack server, where the hacker made posts.
Since then, Uber has confirmed the attack and tweeted that it is in contact with law enforcement and will share more details as they become available.
"We're dealing with a cybersecurity incident right now.
Law enforcement is in contact with us, and we'll update this page as soon as we have more information "the Uber Communications account tweeted.
The threat actor, who claimed responsibility for the breach to The New York Times after speaking with him, claimed that he infiltrated Uber through a social engineering attack on an employee and the theft of their password.
Using the stolen credentials, the threat actor subsequently got access to the company's internal systems.