One of the risks of using an expanding cadre of critical online SaaS platforms is that these vendors are routinely attacked by sophisticated hackers. The largest and most successful vendors, like Dropbox, are attacked more often, with more sophistication, than just about any other type of SaaS vendor. Recent, they fell victim to a breach of their “Dropbox Sign” service offering (formerly “Hello Sign”).
In this article, we’ll look at how attackers got hold of API keys and OAuth tokens, what they gained access to (or didn’t?!), and share some practical tips to help keep your data safe.
The Dropbox Sign breach incident highlighted vulnerabilities in the security infrastructure of their widely used cloud storage service. Their investigation revealed that an unauthorized party managed to access a tool used for configuring Dropbox Sign automatically (Yikes!). A hacker was able to compromise a service account within Sign’s backend service. This is a type of account designated for executing applications and managed access to Dropbox. Consequently, this service account had permissions to perform various actions within Sign’s production environment. The threat actor used this access to gain entry into Dropbox’s customer database (and possibly more!).
Attackers managed to infiltrate Dropbox’s systems, gaining unauthorized access to API keys and OAuth tokens. These cryptographic credentials are instrumental in facilitating secure communication between different applications and services.
By obtaining API keys and OAuth tokens, attackers can impersonate legitimate users or applications, potentially gaining access to sensitive data and compromising the integrity of systems connected to the breached service. The repercussions of such breaches extend far beyond individual accounts, impacting businesses, organizations, and even the broader digital ecosystem.
This incident was confined to the Dropbox Sign infrastructure and did not affect any other Dropbox products. If you were not enrolled in Dropbox Sign, then what we know at the moment from Dropbox, is that your data and account is/was safe.
The hacker did managed to get hold of various Dropbox Sign customer details, like email addresses, usernames, phone numbers, and encrypted passwords. They have also gained access to general account preferences and some authentication details such as API keys, OAuth tokens, and multi-factor authentication information.
Dropbox’s current stance is that there is no evidence suggesting the threat actor(s) accessed the contents of any Dropbox users’ accounts including agreements, templates, or their payment information.
API keys and OAuth tokens are cryptographic credentials used to authenticate and authorize access to web services and APIs. Both serve as security measures to ensure that only authorized entities can access protected resources.
The methods employed by attackers to steal API keys and OAuth tokens can vary, ranging from sophisticated cyber attacks to social engineering tactics. In the case of the Dropbox Sign Breach, specific details regarding the attack vector have not been publicly disclosed, due to the ongoing investigation. However, common techniques utilized by attackers include:
Mitigating the risk of API key and OAuth token theft requires a multi-faceted approach encompassing technical, procedural, and educational measures. Consider implementing the following strategies to bolster your organization’s defenses:
When organizations take proactive steps to strengthen their cybersecurity and follow these best practices, they can better protect against breaches including ones like the Dropbox API key and OAuth token theft event. The Dropbox Sign Breach incident is yet another reminder that hackers are after our sensitive data and we need to build cyber resilience into everything we do online. By working together we can create a safer and more secure digital environment for all.
Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.
Spoiler alert: If you’re still using “password123” or “iloveyou” for your login… it’s time for an...
Read moreStop tricking employees. Start training them. Take Control of Your Security Awareness Training with a Platform...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.