If you’ve been using the service since 2012, it’s probably a good idea to change your password. This allowed the hackers to gain access to Dropbox’s corporate network and steal the data. It also appears the original hack took place after a Dropbox employee re-used the same password for LinkedIn, which was also hacked – revealing the password. The company appears to have used solid user security techniques to encrypt the passwords at the time and seems to have been upgrading the encryption to a more secure version. They communicated to all impacted parties via email”Īccording to Hunt, the leaked records total 68,648,009 Dropbox accounts which are currently “searchable in HIBP”.ĭropbox, which had around 100 million users in 2012, sent out notifications last week to ask users to change their passwords if they had not done so since 2012. Hunt also confirmed Dropbox had asked his wife, via email, to reset her password, concluding: “As for Dropbox, they seem to have handled this really well. “ There is no doubt whatsoever that the data breach contains legitimate Dropbox passwords, you simply can’t fabricate this sort of thing,” he writes. Hunt was sent data from a ‘supporter’ which he analysed, eventually finding his and his wife’s emails among the hacked files. Motherboard reported the data dump earlier today, after it was highlighted by security service Leakbase, with operator of Have I been pwned, Troy Hunt, independently verifying the news. The site says it has already forced password resets. Here’s what you need to know about the massive security breach.Īt the time of the hack, Dropbox revealed user’s email addresses had been stolen, but it did not disclose that passwords had also been taken. More than 68 million user records for popular cloud storage service Dropbox have been dumped online after being stolen in 2012.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |