Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Incidents

DropBox Sign Breach Exposes Sensitive Data

May 2, 2024
Reading Time: 3 mins read
in Incidents
DropBox Sign Breach Exposes Sensitive Data

DropBox recently disclosed a significant security breach impacting its DropBox Sign eSignature platform, formerly known as HelloSign. The breach, which was detected on April 24, involved unauthorized access to DropBox Sign’s production systems. Hackers managed to exploit an automated system configuration tool within the platform’s backend services, allowing them to execute applications and automated services with elevated privileges. This breach resulted in the exposure of sensitive authentication data, including MFA keys, hashed passwords, and authentication tokens.

The attackers accessed a wide array of customer information through the compromised configuration tool. Exposed data includes email addresses, usernames, phone numbers, and general account settings, along with specific authentication information such as API keys, OAuth tokens, and multi-factor authentication (MFA) keys. For users who interacted with the DropBox Sign platform without registering an account, their names and email addresses were also exposed. However, DropBox has confirmed that there was no evidence of access to customers’ documents or agreements and that other DropBox services were not affected by this breach.

In response to the breach, DropBox took several immediate security measures to contain the incident and prevent further unauthorized access. This included resetting passwords for all DropBox Sign users, logging out all sessions associated with DropBox Sign, and implementing restrictions on how API keys can be used until customers rotate them. DropBox has also provided detailed guidance in their security advisory on how to rotate API keys and reconfigure MFA with a new key to regain full privileges.

DropBox is actively reaching out to all affected customers and advising them to be vigilant against potential phishing campaigns that may exploit the breached data to collect more sensitive information. Customers are urged to directly visit the DropBox Sign website to reset their passwords, rather than clicking through links in emails, which could be malicious. This incident follows a previous security breach in 2022, where DropBox’s GitHub accounts were compromised, leading to the theft of 130 code repositories. This pattern underscores the ongoing cybersecurity challenges DropBox faces, highlighting the need for continual enhancement of their security measures.

Reference:
  • DropBox Sign Hack Exposes User Data and Authentication Keys

Tags: cyber incidentsCyber Incidents 2024Cyber RiskCyberattacksDropboxeSignatureHelloSignMay 2024
ADVERTISEMENT

Related Posts

Lovesac Confirms Breach After Attack

Plex Users Told To Reset Passwords

September 9, 2025
Lovesac Confirms Breach After Attack

Hackers Steal Secrets In GitHub Attack

September 9, 2025
Lovesac Confirms Breach After Attack

Lovesac Confirms Breach After Attack

September 9, 2025
Tenable Confirms Breach Of Customer Data

Azure Cloud Hit By Red Sea Cable Cuts

September 9, 2025
Tenable Confirms Breach Of Customer Data

US Probes Malicious Email On China Talks

September 9, 2025
Tenable Confirms Breach Of Customer Data

Tenable Confirms Breach Of Customer Data

September 9, 2025

Latest Alerts

Windows Defender Flaw Enables Hijack

Npm Packages Compromised In Attack

GPUGate Abuse of Google Ads and GitHub

iCloud Calendar Used For Phishing Emails

Czech Cyber Agency Warns On Chinese Tech

Atomic Stealer Masquerades As Cracked App

Subscribe to our newsletter

    Latest Incidents

    Hackers Steal Secrets In GitHub Attack

    Plex Users Told To Reset Passwords

    Lovesac Confirms Breach After Attack

    Azure Cloud Hit By Red Sea Cable Cuts

    Tenable Confirms Breach Of Customer Data

    US Probes Malicious Email On China Talks

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial