Credential theft

Dropbox Credential Reuse Breach via LinkedIn (68M Accounts)

πŸ“… 2012-07-01
Primary Source β†—

Incident Details

The Dropbox breach of approximately July 2012 originated from employee password reuse. A Dropbox employee had reused their LinkedIn account password for their corporate Dropbox work account. When the LinkedIn breach (also 2012) exposed that employee’s hashed LinkedIn password and it was cracked, attackers used it to log into the employee’s Dropbox account. Inside, they found a Dropbox document containing a database backup with hashed email addresses and passwords for approximately 68 million Dropbox users. Dropbox did not discover or disclose the breach until August 2016 β€” four years later β€” when the data appeared on dark web trading sites. Dropbox force-reset all user passwords from before mid-2012 as a precaution. The breach is a canonical case study on the dangers of password reuse, the importance of MFA, and the risks of storing sensitive data in an employee’s cloud storage account. It also demonstrated the downstream ‘credential chain’ effect: the LinkedIn breach created the conditions for the Dropbox breach.

Technical Details

Initial Attack Vector
A Dropbox employee reused their LinkedIn password for their Dropbox work account; when the 2012 LinkedIn breach exposed that password, attackers used it to log into the employee's Dropbox work account, which contained a document with hashed Dropbox user passwords

Timeline

  1. 2012-07-01 Breach occurred
  2. 2016-08-30 Publicly disclosed
  3. 2016-08-30 Customers notified