Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Breaches

Hackers Compromised Dropbox eSignature Service

Dropbox says hackers breached its Sign production environment and accessed customer email addresses and hashed passwords. 

Dropbox data breach

Dropbox on Wednesday disclosed a data breach impacting customers of Sign, the company’s electronic signature service.

Dropbox Sign, formerly known as HelloSign, enables users to send, receive and manage legally binding e-signatures. 

According to Dropbox, a threat actor gained access to the Sign production environment and accessed customer information, including email addresses, usernames, phone numbers, hashed passwords, data on general account settings, and authentication data such as API keys, OAuth tokens and multi-factor authentication. 

Even users who only received or signed a document through Sign without creating an account had names and email addresses compromised. However, there is no indication that payment information or customers’ files (signed documents and agreements) were accessed.

The intrusion was discovered on April 24. The investigation is ongoing, but to date there is no evidence that other Dropbox products were impacted. 

The company has determined that the hacker gained access to an automated system configuration tool.

Advertisement. Scroll to continue reading.

“The actor compromised a service account that was part of Sign’s back-end, which is a type of non-human account used to execute applications and run automated services. As such, this account had privileges to take a variety of actions within Sign’s production environment. The threat actor then used this access to the production environment to access our customer database,” Dropbox explained

In response to the incident, the company is notifying impacted users, logging them out of the Sign service, and resetting their passwords. In addition, API keys and OAuth tokens are being rotated. 

Dropbox is also advising customers who use an authenticator app for MFA to reset it, and to change passwords on other online services where their Sign password is reused. 

In November 2022, Dropbox announced that a threat actor had gained access to source code and personal information belonging to customers and employees following a phishing attack. 

Related: Kaiser Permanente Data Breach Impacts 13.4 Million Patients

Related: Collection Agency FBCS Says Data Breach Exposed Nearly 2 million People

Related: 180k Impacted by Data Breach at Michigan Healthcare Organization

Written By

Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Malwarebytes has named Chung Ip as Chief Financial Officer.

Semperis has appointed John Podboy as Chief Information Security Officer.

Randy Menon has become Chief Product and Marketing Officer at One Identity.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.