Dropbox Suffers Data Breach Following Phishing Attack
Contents
Summary Of The Attack
- On November 1 of this year, Dropbox confirmed that it had experienced a data breach
- An unknown attacker gained access to credentials, data, and other secrets within their private GitHub code repositories.
- Dropbox did disclose that certain plain text secrets, such as API keys and other credentials, were included in the code.
- A “few thousand names and email addresses belonging to Dropbox employees were also exposed.
Stay Up-To-Date On The Latest Attacks
Be the first to know when our experts release new insights on the top attacks.
You're on the list! Just one more step...
Check your email to confirm your subscription.
What Happened?
On November 1 of this year, Dropbox confirmed that it had experienced a data breach and that an unknown attacker gained access to credentials, data and other secrets within their private GitHub code repositories.
A threat actor gained access to a Dropbox developer’s GitHub account after he fell victim to a phishing attack.
This hacked developer gave the attacker access to around 130 internal code repositories.
Dropbox maintains that these code repositories were not linked to its core programs, but instead included modified third-party libraries, internal prototypes, and other internal tools.
While the repos may not be linked to its main programs, Dropbox did disclose that certain plain text secrets, such as API keys and other credentials, were included in the code, as well as a “few thousand names and email addresses belonging to Dropbox workers.”
Anatomy Of The Attack
- The attacker sent out a mass phishing email impersonating CircleCI, a major CI/CD software utilized by Dropbox internally.
- The phishing email sent the victim to a bogus CircleCI login page, where they submitted their GitHub credentials. CircleCi enabled users to log in using their GitHub credentials.
- Users were also asked to provide a One-Time Password (OTP) generated by their hardware authentication key,
- The attacker would get access to the victim’s GitHub account using the OTP and credentials given by the user
- The attacker copied 130 internal repositories, which contained both public and confidential code.
- The attacker’s future moves are unclear at this time, however, in prior assaults, the attacker looked for sensitive information such as secrets in order to migrate laterally into more sensitive systems.
Free Security Policy Templates
Get a step ahead of your cybersecurity goals with our comprehensive templates.
Github User’s Are Prime Targets Of Phishing Attacks
Dropbox’s Response
“We think the risk to clients is negligible,” Dropbox’s security team stated in a statement, which disclosed the breach.
“We have alerted people affected and are revealing more here because we take our commitment to security, privacy, and openness seriously,” and they have also claimed that “We also investigated our logs, and found no indication of successful misuse.”
This would imply a low danger to Dropbox users, but as we’ve seen in many prior breaches, attackers may move laterally from internal tools into core infrastructure; however, there is presently no evidence to corroborate this.
Dropbox did, however, reveal that “the code and data around it also included a few thousand names and email addresses belonging to Dropbox employees, present and previous customers, sales prospects, and vendors.”
I’m A Dropbox User, What Can I Do?
We would not consider this breach to be a reason to stop using Dropbox.
Now is an excellent moment to consider and implement standard security measures, such as routinely changing passwords and enabling MFA on your storage account.
Also, as usual, keep an eye out for any questionable emails or unexpected URLs that arrive in your inbox.
Article by
Share This Article
Our Editorial Process
Our content goes through a rigorous approval process which is reviewed by cybersecurity experts – ensuring the quality and accuracy of information published.
Categories
The Breach Report
Our team of security researchers analyze recent cyber attacks, explain the impact, and provide actionable steps to keep you ahead of the trends.