2 May 2024

Dropbox says hackers breached its Sign eSignature platform and stole sensitive data


Dropbox says hackers breached its Sign eSignature platform and stole sensitive data

Cloud storage firm DropBox disclosed a security incident, where hackers compromised its DropBox Sign eSignature environment and made off with authentication tokens, MFA keys, hashed passwords, and customer information.

The company said in a SEC filing that it became aware of the breach on April 24, 2024, and immediately activated its cybersecurity incident response process.

“Upon further investigation, we discovered that the threat actor had accessed data related to all users of Dropbox Sign, such as emails and usernames, in addition to general account settings. For subsets of users, the threat actor also accessed phone numbers, hashed passwords, and certain authentication information such as API keys, OAuth tokens, and multi-factor authentication,” the company said. “Based on what we know as of the date of this filing, there is no evidence that the threat actor accessed the contents of users’ accounts, such as their agreements or templates, or their payment information.”

According to the company, the attacker gained access to a Dropbox Sign automated system configuration tool and hacked into a service account that was part of Sign’s back-end and had privileges to take a variety of actions within Sign’s production environment. The threat actor then used this access to the production environment to access the customer database.

In response, DrpBox’s security team reset users’ passwords, logged users out of any devices they had connected to Dropbox Sign, and initiated the rotation of all API keys and OAuth tokens.

DropBox said it believes that the incident is limited to the Dropbox Sign (formerly HelloSign) platform and has not affected any other products.


Back to the list

Latest Posts

BreachForums seized in law enforcement op, admin reportedly arrested

BreachForums seized in law enforcement op, admin reportedly arrested

Authorities have yet to make official statement regarding the shutdown.
16 May 2024
Google fixes yet another Chrome zero-day

Google fixes yet another Chrome zero-day

This is a third zero-day flaw patched by Google within two weeks.
16 May 2024
Russian cyberspies Turla target European MFA with new backdoors

Russian cyberspies Turla target European MFA with new backdoors

Both backdoors implement a loader that decrypts payloads using DNS domain names, as well as the ability to execute Lua scripts.
15 May 2024