Dropbox Sign Security Breach Exposes User Data and Credentials

Dropbox has confronted a severe security breach concerning its Dropbox Sign service, previously known as HelloSign. The unsettling incident was disclosed in a recent filing with the Securities and Exchange Commission (SEC). According to the company, the episode of unauthorized access occurred on April 24, 2024, leading to the exposure of sensitive customer information. The compromised data encompassed a range of user information, including emails, usernames, and general account settings. Not only were account holders left vulnerable, but individuals who interacted with documents via Dropbox Sign without having accounts also had their names and email addresses exposed.

While the breach was significant, Dropbox has confirmed that the contents within user accounts and their payment information were not accessed during the intrusion. However, the scope of the breach extended to other types of sensitive data. Phone numbers, hashed passwords, and various authentication credentials, including API keys, OAuth tokens, and methods for multi-factor authentication, were also compromised for specific users.

Response and Rectification Efforts

Dropbox recently reported a significant security incident affecting its Dropbox Sign service, formerly known as HelloSign, through an SEC filing. On April 24, 2024, unauthorized parties gained access, leading to the compromise of sensitive user data. The breach exposed emails, usernames, and basic account settings for both Dropbox account holders and non-account holders who utilized Dropbox Sign, revealing their names and emails as well.

Fortunately, the attackers did not access the contents within accounts or any payment details. Nevertheless, the intrusion resulted in the unauthorized exposure of phone numbers, hashed passwords, and multiple authentication methods, including API keys, OAuth tokens, and various multi-factor authentication processes for a subset of users. Dropbox is actively managing the situation to reinforce security and protect its users.

Explore more