Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Incidents

DropBox Sign Breach Exposes Sensitive Data

May 2, 2024
Reading Time: 3 mins read
in Incidents
DropBox Sign Breach Exposes Sensitive Data

DropBox recently disclosed a significant security breach impacting its DropBox Sign eSignature platform, formerly known as HelloSign. The breach, which was detected on April 24, involved unauthorized access to DropBox Sign’s production systems. Hackers managed to exploit an automated system configuration tool within the platform’s backend services, allowing them to execute applications and automated services with elevated privileges. This breach resulted in the exposure of sensitive authentication data, including MFA keys, hashed passwords, and authentication tokens.

The attackers accessed a wide array of customer information through the compromised configuration tool. Exposed data includes email addresses, usernames, phone numbers, and general account settings, along with specific authentication information such as API keys, OAuth tokens, and multi-factor authentication (MFA) keys. For users who interacted with the DropBox Sign platform without registering an account, their names and email addresses were also exposed. However, DropBox has confirmed that there was no evidence of access to customers’ documents or agreements and that other DropBox services were not affected by this breach.

In response to the breach, DropBox took several immediate security measures to contain the incident and prevent further unauthorized access. This included resetting passwords for all DropBox Sign users, logging out all sessions associated with DropBox Sign, and implementing restrictions on how API keys can be used until customers rotate them. DropBox has also provided detailed guidance in their security advisory on how to rotate API keys and reconfigure MFA with a new key to regain full privileges.

DropBox is actively reaching out to all affected customers and advising them to be vigilant against potential phishing campaigns that may exploit the breached data to collect more sensitive information. Customers are urged to directly visit the DropBox Sign website to reset their passwords, rather than clicking through links in emails, which could be malicious. This incident follows a previous security breach in 2022, where DropBox’s GitHub accounts were compromised, leading to the theft of 130 code repositories. This pattern underscores the ongoing cybersecurity challenges DropBox faces, highlighting the need for continual enhancement of their security measures.

Reference:
  • DropBox Sign Hack Exposes User Data and Authentication Keys

Tags: cyber incidentsCyber Incidents 2024Cyber RiskCyberattacksDropboxeSignatureHelloSignMay 2024
ADVERTISEMENT

Related Posts

German Dealer Leymann Hacked Closes Stores

Massive Leak Exposes 16 Billion Credentials

June 20, 2025
German Dealer Leymann Hacked Closes Stores

Chinese Spies Target Satellite Giant Viasat

June 20, 2025
German Dealer Leymann Hacked Closes Stores

Tonga Health System Down After Ransomware

June 20, 2025
German Dealer Leymann Hacked Closes Stores

German Dealer Leymann Hacked Closes Stores

June 20, 2025
UBS and Pictet Hit By Vendor Data Breach

Hacker Mints $27M From Meta Pool Gets 132K

June 19, 2025
UBS and Pictet Hit By Vendor Data Breach

UBS and Pictet Hit By Vendor Data Breach

June 19, 2025

Latest Alerts

Winos 4.0 Malware Hits Taiwan Via Tax Phish

New Amatera Stealer Delivered By ClearFake

New Godfather Trojan Hijacks Banking Apps

Fake Minecraft Mods On GitHub Spread Malware

Fake Invoices Deliver Sorillus RAT In Europe

Russian Phishing Scam Bypasses Google 2FA

Subscribe to our newsletter

    Latest Incidents

    Massive Leak Exposes 16 Billion Credentials

    Tonga Health System Down After Ransomware

    Chinese Spies Target Satellite Giant Viasat

    German Dealer Leymann Hacked Closes Stores

    Hacker Mints $27M From Meta Pool Gets 132K

    UBS and Pictet Hit By Vendor Data Breach

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial