Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Incidents

DropBox Sign Breach Exposes Sensitive Data

May 2, 2024
Reading Time: 3 mins read
in Incidents
DropBox Sign Breach Exposes Sensitive Data

DropBox recently disclosed a significant security breach impacting its DropBox Sign eSignature platform, formerly known as HelloSign. The breach, which was detected on April 24, involved unauthorized access to DropBox Sign’s production systems. Hackers managed to exploit an automated system configuration tool within the platform’s backend services, allowing them to execute applications and automated services with elevated privileges. This breach resulted in the exposure of sensitive authentication data, including MFA keys, hashed passwords, and authentication tokens.

The attackers accessed a wide array of customer information through the compromised configuration tool. Exposed data includes email addresses, usernames, phone numbers, and general account settings, along with specific authentication information such as API keys, OAuth tokens, and multi-factor authentication (MFA) keys. For users who interacted with the DropBox Sign platform without registering an account, their names and email addresses were also exposed. However, DropBox has confirmed that there was no evidence of access to customers’ documents or agreements and that other DropBox services were not affected by this breach.

In response to the breach, DropBox took several immediate security measures to contain the incident and prevent further unauthorized access. This included resetting passwords for all DropBox Sign users, logging out all sessions associated with DropBox Sign, and implementing restrictions on how API keys can be used until customers rotate them. DropBox has also provided detailed guidance in their security advisory on how to rotate API keys and reconfigure MFA with a new key to regain full privileges.

DropBox is actively reaching out to all affected customers and advising them to be vigilant against potential phishing campaigns that may exploit the breached data to collect more sensitive information. Customers are urged to directly visit the DropBox Sign website to reset their passwords, rather than clicking through links in emails, which could be malicious. This incident follows a previous security breach in 2022, where DropBox’s GitHub accounts were compromised, leading to the theft of 130 code repositories. This pattern underscores the ongoing cybersecurity challenges DropBox faces, highlighting the need for continual enhancement of their security measures.

Reference:
  • DropBox Sign Hack Exposes User Data and Authentication Keys

Tags: cyber incidentsCyber Incidents 2024Cyber RiskCyberattacksDropboxeSignatureHelloSignMay 2024
ADVERTISEMENT

Related Posts

AI Spam Hijacks Official US Vaccine Site

Cyberattack On Brussels Parliament Continues

June 13, 2025
AI Spam Hijacks Official US Vaccine Site

Swedish Broadcaster SVT Hit By DDoS

June 13, 2025
Major Google Cloud Outage Disrupts Web

Major Google Cloud Outage Disrupts Web

June 13, 2025
AI Spam Hijacks Official US Vaccine Site

AI Spam Hijacks Official US Vaccine Site

June 13, 2025
Erie Insurance Cyberattack Halts Operations

DragonForce Ransomware Hits Philly Schools

June 13, 2025
Erie Insurance Cyberattack Halts Operations

Erie Insurance Cyberattack Halts Operations

June 12, 2025

Latest Alerts

Old Discord Links Now Lead To Malware

VexTrio TDS Uses Adtech To Spread Malware

Simple Typo Breaks AI Safety Via TokenBreak

Coordinated Brute Force Hits Tomcat Manager

SmartAttack Uses Sound To Steal PC Data

Pentest Tool TeamFiltration Hits Entra ID

Subscribe to our newsletter

    Latest Incidents

    Cyberattack On Brussels Parliament Continues

    Swedish Broadcaster SVT Hit By DDoS

    Major Google Cloud Outage Disrupts Web

    AI Spam Hijacks Official US Vaccine Site

    DragonForce Ransomware Hits Philly Schools

    Erie Insurance Cyberattack Halts Operations

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial