Several weeks ago, reports started to trickle out that a number of Dropbox users were under attack from spam. Since then, Dropbox has been investigating those attacks (with some help from a third-party) and today gave the first update on the progress, saying that some accounts were indeed accessed by hackers, but that it is now adding two-factor authentication and other security features to prevent further problems.
For some background: On July 17th, a number of Dropbox users begun noticing an increase in the level spam attacking their accounts. As Sarah reported at the time, the red flag appeared when users begun reporting that the email accounts receiving spam were in fact only tied to their Dropbox accounts, which indicated that the address leak had come from Dropbox itself. Many of those reports came from the companyâs international users, including Germany, the U.K. and the Netherlands.
To its credit, Dropbox was quick to respond. Less than 24 hours later, in a message posted to forums, the company said they were bringing in âan outside team of expertsâ to back up their own security team in the investigation along with help from law enforcement. Today, we received the first round of answers.
The company (via Dropboxâs VP of Engineering, Aditya Agarwal) said in a blog post that its investigation found that the usernames and passwords were in fact stolen and were stolen from third party websites, which were then used to sign in to âa small number of Dropbox accounts.â The company did not cite numbers specifically, so itâs not clear exactly how many accounts were accessed, but the company did say that it has contacted those users and is helping them to further protect their accounts.
The company also said that one of those stolen passwords was used to access a Dropbox employeeâs account, which contained a project document with user email addresses. The company believes that âthis improper access is what led to the spam.â The company also apologized and said that it has âput additional controls in place to help make sure it doesnât happen again.â
What is that going to mean?
Dropbox is taking a number of steps, which they laid out in the post. Weâve shared them below:
- Two-factor authentication, a way to optionally require a unique code in addition to your password when signing in. (Coming in a few weeks)
- New automated mechanisms to help identify suspicious activity. Weâll continue to add more of these over time.
- A new pagethat lets you examine all active logins to your account.
- In some cases, we may require you to change your password. (For example, if itâs commonly used or hasnât been changed in a while)
Naturally, it appears that this issue is one in which both sides are somewhat culpable. On its end, Dropbox is taking steps to improve security, and meanwhile, it suggests that users consider coming up with a unique password for each website they use. Reusable passwords, again, are not your friend. As Dropbox points out, âthough itâs easy to reuse the same password on different websites, this means if any one site is compromised, all your accounts are at risk.â
As to the spam controversy, the company did not say if there were any other causes behind this other than just some wayfaring miscreant, hacker-types, because the investigation is still ongoing. But keep in mind that there have been some fairly high-profile hacks and leaks recently, like the one that targeted LinkedIn back in June.
It would not be surprising to learn that Dropbox is essentially the first service to experience a ripple effect from that hack. Given that many people use the same passwords for multiple different accounts, if hackers were able to retrieve passwords from LinkedIn accounts, it wouldnât be too difficult to gain access to Dropbox accounts.
No comments:
Post a Comment