Dropbox Data Breach Impacts Customer Information

Share This Post

Dropbox on Wednesday disclosed a data breach impacting customers of Sign, the company’s electronic signature service.

Dropbox Sign, formerly known as HelloSign, enables users to send, receive and manage legally binding e-signatures. 

According to Dropbox, a threat actor gained access to the Sign production environment and accessed customer information, including email addresses, usernames, phone numbers, hashed passwords, data on general account settings, and authentication data such as API keys, OAuth tokens and multi-factor authentication. 

Even users who only received or signed a document through Sign without creating an account had names and email addresses compromised. However, there is no indication that payment information or customers’ files (signed documents and agreements) were accessed.

The intrusion was discovered on April 24. The investigation is ongoing, but to date there is no evidence that other Dropbox products were impacted. 

The company has determined that the hacker gained access to an automated system configuration tool.

“The actor compromised a service account that was part of Sign’s back-end, which is a type of non-human account used to execute applications and run automated services. As such, this account had privileges to take a variety of actions within Sign’s production environment. The threat actor then used this access to the production environment to access our customer database,” Dropbox explained

In response to the incident, the company is notifying impacted users, logging them out of the Sign service, and resetting their passwords. In addition, API keys and OAuth tokens are being rotated. 

Advertisement. Scroll to continue reading.

Dropbox is also advising customers who use an authenticator app for MFA to reset it, and to change passwords on other online services where their Sign password is reused. 

In November 2022, Dropbox announced that a threat actor had gained access to source code and personal information belonging to customers and employees following a phishing attack. 

Related: Kaiser Permanente Data Breach Impacts 13.4 Million Patients

Related: Collection Agency FBCS Says Data Breach Exposed Nearly 2 million People

Related: 180k Impacted by Data Breach at Michigan Healthcare Organization

This post was originally published on this site

More Articles

Article

Navigating SEC Regulations In Cybersecurity And Incident Response

Free video resource for cybersecurity professionals. As 2024 approaches, we all know how vital it is to keep up to date with regulatory changes that affect our work. We get it – it’s a lot to juggle, especially when you’re in the trenches working on an investigation, handling, and responding to incidents.

Article

BFU – Seeing is Believing

Oh no, the device is in BFU. This is the common reaction; a device needs extracting, and you find it in a BFU state. Often, there’s an assumption that a BFU extraction will only acquire basic information, but that isn’t always the case.