Cyber Security

Dropbox Sign Hacked: Attackers Stolen API Keys, MFA, & Hashed Passwords

Dropbox disclosed a significant security breach affecting its electronic signature service, Dropbox Sign (formerly known as HelloSign).

The incident, which came to light on April 24, involved unauthorized access to the Dropbox Sign production environment, exposing sensitive customer information.

Dropbox’s security team was alerted to the breach on April 24 after detecting unauthorized access to the Dropbox Sign production environment.

A thorough investigation revealed that a threat actor had infiltrated the system and gained access to a wealth of customer data.

Security Breach

The breach was traced back to a compromised service account within Dropbox Sign’s backend, a critical component used for executing applications and running automated services.

Document

Integrate ANY.RUN in Your Company for Effective Malware Analysis

Are you from SOC, Threat Research, or DFIR departments? If so, you can join an online community of 400,000 independent security researchers:

  • Real-time Detection
  • Interactive Malware Analysis
  • Easy to Learn by New Security Team members
  • Get detailed reports with maximum data
  • Set Up Virtual Machine in Linux & all Windows OS Versions
  • Interact with Malware Safely

If you want to test all these features now with completely free access to the sandbox:

In response to the breach, Dropbox has taken swift action to mitigate the impact on its users.

The company’s security measures included resetting passwords, logging users out of all connected devices, and initiating the rotation of all API keys and OAuth tokens.

These steps are part of Dropbox’s broader effort to secure its systems and protect user data from further unauthorized access.

The breach has significantly impacted Dropbox Sign users, with the threat actor gaining access to names, email addresses, and other sensitive information.

For users who interacted with Dropbox Sign without creating an account, their names and email addresses were exposed.

However, Dropbox has assured its users that there was no evidence of unauthorized access to the contents of their accounts, such as documents or agreements, nor was there any compromise of payment information.

Dropbox is actively reaching out to all affected users, providing them with step-by-step instructions on how to secure their data further.

The company has also emphasized that users who signed up for Dropbox Sign or HelloSign using external services like Google did not have passwords stored or exposed, as no password was set up directly with Dropbox.

In the wake of the incident, Dropbox has underscored its commitment to user security, detailing the extensive measures taken to address the breach.

The company’s security team coordinates closely with law enforcement and cybersecurity experts to prevent future incidents.

As Dropbox continues to navigate the aftermath of this security incident, the company is focused on reinforcing its security infrastructure to safeguard against similar breaches.

Users are encouraged to follow the guidance provided by Dropbox and to remain vigilant in monitoring their accounts for any unusual activity.

Combat Email Threats with Easy-to-Launch Phishing Simulations: Email Security Awareness Training -> Try Free Demo 

Guru Baran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Top 10 Best Managed Service Providers (MSP) for CISO, CTO & IT Managers – 2024

MSP or managed service providers, is an application designed to streamline the delivery and management…

7 hours ago

PoC Exploit Released for Ivanti EPMM MobileIron Core

A newly disclosed vulnerability, CVE-2024-22026, has been found in Ivanti Endpoint Manager Mobile (EPMM), formerly…

9 hours ago

Hackers Exploiting Microsoft’s Quick Assist Tool To Deliver Ransomware

Hackers often target remote assist tools because they create a direct channel to access desired…

10 hours ago

Earth Hundun Hacker Group Employs Advanced Tactics to Evade Detection

Earth Hundun, a notable Asia-Pacific malware organization, uses Waterbear and Deuterbear. We first encountered Deuterbear…

11 hours ago

Palo Alto Networks Buys IBM’s QRadar

Palo Alto Networks has made a significant decision to enhance its cloud security services by…

12 hours ago

Apple Safari Zero-Day Flaw Exploited At Pwn2Own : Patch Now

Apple has released security updates to address a zero-day vulnerability in its Safari web browser…

13 hours ago