Dropbox Sign Data Breach: What You Need to Know

Dropbox Sign's recent data breach highlights how non-human identities are driving more profound breaches.
Omri Marom
3 min read
Last updated May 3, 2024
Dropx Sign Data Breach

On May 1st 2024, Dropbox disclosed a cybersecurity breach in which hackers abused a service account to gain access to Dropbox Sign’s production environment and access customer data. 

While there is no evidence that attackers accessed Dropbox customer payment information, agreements, or templates, they did access customer data including emails and usernames. In some cases, phone numbers, hashed passwords, and other authentication-related details like OAuth tokens, MFA keys, and API keys were also accessed. 

For Dropbox Sign customers who enabled API access to other applications, the theft of these authentication tokens could allow a threat actor to connect to another connected application, potentially exfiltrating sensitive data.   

What does this mean for my organization? 

Any breach of accounts with access to other applications could provide attackers with access to connected SaaS platforms, posing a risk to affected Dropbox Sign customers. 

Dropbox Sign is a product provided by Dropbox, allowing users to sign documents and contracts. One unique feature of Dropbox Sign is the ability to integrate with many popular SaaS platforms, such as Google Drive, Microsoft Office365, Salesforce, and Slack for document signing.

An attacker could use API or OAuth access tokens compromised in this breach to authenticate with SaaS applications connected to Dropbox, executing API commands depending on the scope and permissions of the stolen tokens. Because Dropbox Sign allows users to sign documents from those SaaS applications, there is a risk these exposed tokens might allow attackers to read sensitive files, which may lead to data exfiltration. 

To address this, Dropbox has taken several steps to mitigate the impact of this breach including:

  • Resetting user passwords
  • Logging users out of any devices they had connected to Dropbox Sign
  • Rotating all API keys and OAuth tokens 

We advise Dropbox Sign customers to: 

  • Rotate relevant keys used by integrations with Dropbox Sign. 
  • Look for anomalous user or resource creation by OAuth applications related to Dropbox Sign integrations. 
  • Review actions performed by integration keys and credentials used for Dropbox Sign integrations. 

This is not the first time Dropbox has suffered the abuse of credentials, as in 2022 Dropbox disclosed a security breach after attackers stole over 100 code repositories by breaching the company's GitHub account by using stolen employee credentials. 

Non-Human Identities are Driving Breaches 

In the last several months, breaches involving non-human identities have captured the spotlight as many large companies like Microsoft, Okta, and Sisense experienced breaches involving such identities. 

These non-human identities are targeted by attackers because they are commonly used in integrations with third-party applications, have access to sensitive environments, and often have no easy way to monitor these identities for suspicious behavior. 

Securing and monitoring non-human identities is critical. If these non-human identities are compromised, threat actors may easily gain wide access to the breached environment without anyone noticing. 

How Varonis can help 

Varonis provides a complete and centralized overview of the third-party applications connected to your SaaS applications and the risks they pose. With Varonis, security teams can:

  • Proactively identify risky apps in their environment 
  • Understand which users are connected to each app and the permissions they grant them 
  • Monitor application activity for suspicious or risky behavior that could indicate a threat 
  • Remove third-party applications from each user or entirely from the environment.

Varonis’ centralized third-party application risk dashboard enables admins to see the total number of apps in your environment, whether active or stale, the level of risk they pose, and if they have been verified by admins — along with other key risk indicators. 

Gain a centralized overview of the third-party applications in your environment and the risks they pose. 

Third-party app dashboard 1

Gain a centralized overview of the third-party applications in your environment and the risks they pose. 

Varonis tracks the activity of all your third-party applications and provides a complete and human-readable audit trail of cross-cloud events. We’ll detect any unusual or risky activity and alert you in real-time, so you can immediately investigate and remove the offending third-party app. Varonis can also identify when applications impersonate users and perform activity on their behalf. 

Monitor third-party application activity, identify impersonation, and detect threats. 

Third-party app impersonation

Monitor third-party application activity, identify impersonation, and detect threats. 

Varonis gives you a clear picture of the effective permissions of each third-party app. We break third-party app permissions down to a simple to understand CRUDS (Create, Read, Update, Delete, and Share) model making it simple to understand an app’s effective permissions and the risk they pose to sensitive data. 

With our bi-directional permissions view, you can also see all the users using a single app or click a user and see every application they have connected. 

Get a clear understanding of each application's permission scope. 

Third-party app permissions scope

Get a clear understanding of each application's permission scope. 

If you identify an application as a potential threat or are worried about its scope of permissions, you can revoke its access to your users or environment directly from the Varonis UI. 

Revoke risky or stale third-party application assignments. 

Revoke application assignments 1

Revoke risky or stale third-party application assignments. 

If you are a Dropbox Sign customer who is not currently using Varonis and wants assistance securing and monitoring your data from non-human identities, please reach out to our team

What should I do now?

Below are three ways you can continue your journey to reduce data risk at your company:

1

Schedule a demo with us to see Varonis in action. We'll personalize the session to your org's data security needs and answer any questions.

2

See a sample of our Data Risk Assessment and learn the risks that could be lingering in your environment. Varonis' DRA is completely free and offers a clear path to automated remediation.

3

Follow us on LinkedIn, YouTube, and X (Twitter) for bite-sized insights on all things data security, including DSPM, threat detection, AI security, and more.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.

Keep reading

Varonis tackles hundreds of use cases, making it the ultimate platform to stop data breaches and ensure compliance.

analyzing-company-reputation-after-a-data-breach
Analyzing Company Reputation After a Data Breach
Does a data breach affect how your customers see you? Take a look at what Americans think as we dive into the relationship between breaches and reputation.
data-breach-definition-by-state
Data Breach Definition by State
State governments are becoming more aware of PII and PHI data breaches, how about your state? See how PII is protected per state with our primer on US State Data Breach Law Definitions.
64%-of-americans-don’t-know-what-to-do-after-a-data-breach-—-do-you?-(survey)
64% of Americans Don’t Know What to Do After a Data Breach — Do You? (Survey)
We surveyed Americans to gauge their data breach literacy including awareness and how to respond — see how you data breach literacy stacks up.
more-nsa-goodness:-shadow-brokers-release-unitedrake
More NSA Goodness: Shadow Brokers Release UNITEDRAKE
Looking for some good data security news after the devastating Equifax breach? You won’t find it in this post, although this proposed federal breach notification law could count as a...