TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

A recent security incident involving Dropbox Sign

213 点作者 JonoBB大约 1 年前

13 条评论

dml2135大约 1 年前
This is Dropbox Sign, not Dropbox. It’s a document signing product akin to Docusign, and was called Hellosign before Dropbox acquired them.<p>We are a customer of theirs at my startup, and as far as I can tell Dropbox has made very few changes since the acquisition beyond changing the branding. So I wouldn’t take this incident to be an indicator of much on the cloud-storage side of the company.
评论 #40236415 未加载
评论 #40238246 未加载
评论 #40235758 未加载
chenxi9649大约 1 年前
&quot;Upon further investigation, we discovered that a threat actor had accessed data including Dropbox Sign customer information such as emails, usernames, phone numbers and hashed passwords, in addition to general account settings and certain authentication information such as API keys, OAuth tokens, and multi-factor authentication.&quot;<p>hashed passwords, API keys, OAuth tokens, MFA...<p>Oh no.
评论 #40236193 未加载
评论 #40234025 未加载
thrdbndndn大约 1 年前
&gt; Based on our investigation, a third party gained access to a Dropbox Sign automated system configuration tool. The actor compromised a service account that was part of Sign’s back-end, which is a type of non-human account used to execute applications and run automated services. As such, this account had privileges to take a variety of actions within Sign’s production environment. The threat actor then used this access to the production environment to access our customer database.<p>Not familiar with this area, how usually does it happen? Social engineering or some more &quot;technical&quot; ways?<p>Also, under normal (not hacked) circumstance, who usually would have access to these service accounts?
评论 #40235122 未加载
评论 #40234087 未加载
fileseeder大约 1 年前
That&#x27;s why e2ee is key, decentralised tooling for these types of applications is the way (even if the UX is not as good yet)
artdigital大约 1 年前
I love Dropbox but stuff like this is a good reminder to re-evaluate using any service that store large amount of personal data without e2ee. I understand that partly because of block-level diffing and syncing, it&#x27;s hard to provide true e2ee for Dropbox, but it&#x27;s still a big reason why I&#x27;m having most of my stuff in iCloud Drive (with Advanced Data Protection), despite liking Dropbox much more.<p>Hope they&#x27;ll come around and add it at some point, and not just for businesses as hinted at when they acquired boxcryptor.<p>(Cryptomator and encrypted sparsebundles work great on Dropbox. Just annoying to manage)
评论 #40234015 未加载
评论 #40236630 未加载
评论 #40233960 未加载
评论 #40234796 未加载
btown大约 1 年前
Trying to understand some of the interplay here:<p>&gt; threat actor had accessed data including ... certain authentication information such as API keys, OAuth tokens, and multi-factor authentication.<p>&gt; If I have a Sign account linked to my Dropbox account, is my Dropbox account affected? No. Based on our investigation to date, we believe this incident was isolated to Dropbox Sign infrastructure, and did not impact any other Dropbox products.<p>If you linked your Dropbox account to a Sign account, wouldn&#x27;t Sign have had an OAuth token (or similar) with permissions to access documents in Dropbox accounts? One imagines that leaked, if everything else did. Would they have been able to detect this as a distinct access pattern from someone, say, choosing a file to sign via the Sign interface?
aborsy大约 1 年前
Dropbox was breached also around 2012.
评论 #40234115 未加载
评论 #40235404 未加载
评论 #40234023 未加载
latexr大约 1 年前
&gt; For those who received or signed a document through Dropbox Sign, but never created an account, email addresses and names were also exposed.<p>So they also leaked data of people who are not their customers, and who never agreed to have their information collected.<p>I doubt that flies under the GDPR.
评论 #40239341 未加载
polski-g大约 1 年前
I am confused about Dropbox Sign&#x27;s pricing model.<p>Why are they charging per-user? What exactly does that mean? A company will have one singular account and send documents to non-Dropbox affiliated entities, who aren&#x27;t classified as users.
rvnx大约 1 年前
At least it&#x27;s a hack this time, it&#x27;s not like when they forgot to enable authentication and you could sign-in to any Dropbox just by entering the e-mail.<p><a href="https:&#x2F;&#x2F;techcrunch.com&#x2F;2011&#x2F;06&#x2F;20&#x2F;dropbox-security-bug-made-passwords-optional-for-four-hours&#x2F;" rel="nofollow">https:&#x2F;&#x2F;techcrunch.com&#x2F;2011&#x2F;06&#x2F;20&#x2F;dropbox-security-bug-made-...</a>
评论 #40234028 未加载
评论 #40234419 未加载
评论 #40234623 未加载
bilekas大约 1 年前
&gt; We didn’t live up to that standard here, and we’re deeply sorry for the impact it caused our customers.<p>This might be the first time a large company has actually apologised and admitted some fault. Colour me shocked.
virtue3大约 1 年前
good reminder to enable 2fa on my dropbox account. Whoops.
评论 #40234230 未加载
chrisjj大约 1 年前
So, Dropbox failed to inform the affected customers?