Skip to content

All Dropbox Sign users, whether they have accounts or not, victimized in a cyber assault

Unauthorized access breach on electronic signature platform's live system, revealing a wealth of user information such as OAuth tokens.

Unwary Dropbox Sign users, regardless of account status, fall victim to cyberattack
Unwary Dropbox Sign users, regardless of account status, fall victim to cyberattack

All Dropbox Sign users, whether they have accounts or not, victimized in a cyber assault

Dropbox, the popular cloud storage service, has confirmed a data breach affecting its Dropbox Sign service. In a filing with the Securities and Exchange Commission, the company announced that an unauthorized party gained access to user data, including email addresses, phone numbers, hashed passwords, and multi-factor authentication details [1].

The breach, which occurred on April 24, 2023, did not affect other Dropbox cloud storage customers. The attacker compromised a service account that was part of Dropbox Sign's backend, a non-human account used to execute applications and run automated services [2].

According to Ray Kelly, a fellow at Synopsys Software Integrity Group, the breach is significant due to the compromise of API keys and OAuth tokens [3]. When API keys are compromised, a malicious actor can gain access to potentially sensitive or costly services.

Dropbox responded to the incident by seeking assistance from third-party forensic experts to investigate, contain, and remediate the intrusion. The company's security team has also reset users' passwords [4]. Dropbox does not expect the attack to have a material impact on its business operations, but this assessment is based on its current understanding of the attack and its presumed containment to Dropbox Sign infrastructure [5].

It's important to note that the breach method specifics for Dropbox Sign are not fully detailed. However, a broader contextual understanding of recent related attacks shows that sophisticated threat actors often use highly evasive malware, such as the Python-based PXA Stealer, to compromise services by delivering malicious DLLs alongside legitimate applications [1].

This breach is not the first time Dropbox has been targeted. In November 2022, Dropbox experienced a phishing attack where API credentials and GitHub repositories were compromised by attackers tricking employees into providing credentials via a fake login page. However, Dropbox stated no user content, passwords, or payment information were accessed during that event, which was quickly resolved [5].

Dropbox acquired Dropbox Sign (formerly HelloSign) for $230 million in early 2019 [6]. The company's blog post confirmed the incident and provided additional details about the attack and the response [7].

The attack impacted individuals who never created an account but received or signed a document through the platform, exposing their email addresses and names [5]. Dropbox is rotating all API keys and OAuth tokens to further secure its services [8].

In summary, the Dropbox Sign data breach exposed sensitive user data, but not other Dropbox cloud customer data. The breach method specifics are not fully detailed, but align with evolving cybercriminal tactics involving malware and credential theft on legitimate platforms. Dropbox experienced a previous phishing attack in November 2022, highlighting the ongoing threat landscape affecting the company.

  1. In light of the recent Dropbox Sign data breach, it's crucial to heighten the focus on cybersecurity, especially in the areas of finance and technology, as API keys and OAuth tokens, which grant access to potentially sensitive services, were compromised.
  2. Despite the breach not affecting other Dropbox cloud storage customers directly, it underscores the need for robust cybersecurity measures, as threat actors have demonstrated an ability to compromise services by delivering malicious software and stealing credentials on legitimate platforms.

Read also:

    Latest