Dropbox Used to Steal Credentials and Bypass MFA in Phishing Campaign (2024)

A novel phishing campaign leveraged legitimate Dropbox infrastructure and successfully bypassed multifactor authentication (MFA) protocols, new research from Darktrace has revealed.

The attack highlights the growing exploitation of legitimate popular services to trick targets into downloading malware and revealing log in credentials.

The findings also show how attackers are becoming adept at evading standard security protocols, including email detection tools and MFA.

Speaking to Infosecurity, Hanah Darley, Head of Threat Research at Darktrace, noted that while it is common for attackers to exploit the trust users have in specific services by mimicking the normal emails they receive, in this case, the threat actor(s) went a step further and leveraged the legitimate Dropbox cloud storage platform to conduct their phishing attacks.

The Attackers Leveraged Dropbox Infrastructure

The attackers targeted a Darktrace customer on January 25, 2024, with 16 internal users on the organization’s SaaS environment receiving an email from ‘no-reply@dropbox[.]com.’ This is a legitimate email address used by the Dropbox file storage service.

The email contained a link that would lead the user to a PDF file hosted on Dropbox, which was seemingly named after a partner of the organization.

This PDF file contained a suspicious link to a domain that had never previously been seen on the customer’s environment, named ‘mmv-security[.]top.’

The researchers noted that there is “very little to distinguish” malicious or benign emails from automated emails used by legitimate services such as Dropbox. Therefore, this approach is effective in evading email security tools and convincing targets to click a malicious link.

This email was detected and held by Darktace’s email security tool. However, on January 29 a user received another email from the legitimate no-reply@dropbox[.]com address, reminding them to open the previously shared PDF file.

Although the message was moved to the user’s junk file, the employee went on to open the suspicious email and follow the link to the PDF file. The internal device connected to the malicious link mmv-security[.]top a few days later.

This link led to a fake Microsoft 365 login page, designed to harvest the credentials of legitimate SaaS account holders.

The researchers added that the approach of impersonating trusted organizations like Microsoft is an effective way of appearing legitimate to targets.

Attackers Successfully Bypassed MFA

On January 31, Darktrace observed several suspicious SaaS logins from multiple unusual locations that had never previously accessed the account.

Subsequent unusual logins on February 1 were associated with ExpressVPN, indicating that the threat actors used a virtual private network (VPN) to mask their real location.

These logins appeared to use a valid MFA token, suggesting the attackers had successfully bypassed the organization’s MFA policy.

The researchers believe the employee may have unknowingly approved an MFA authentication request of authenticate on their own device once they’d compromised the credentials.

“By using valid tokens and meeting the necessary MFA requirements, threat actors are often able to remain undetected by traditional security tools that view MFA as the silver bullet,” the researchers wrote.

Despite the attackers bypassing MFA with legitimate credentials, the organization’s security team were still alerted to the suspicious activity after identifying unexpected activity on the SaaS accounts.

Darley told Infosecurity that the incident demonstrates that organizations can no longer rely on MFA as the last line of defense against cyber-attackers.

“MFA bypass, as in this case, is now a frequent tactic used by attackers – especially given its success in granting access to shared resources such as SharePoint files which can be exploited,” she outlined.

Threat Actor Shows Persistence

Shortly after the MFA bypass, Darktrace observed another unusual login to the SaaS account, using the HideMyAss VPN service.

On this occasion, the threat actor created a new email rule on the compromised Outlook account, which was intended to immediately move any emails from the organization’s accounts team directly to the ‘Conversation History’ mailbox folder.

The researchers said this approach is designed to avoid detection – by moving their malicious emails and any responses to them to less commonly visited mailbox folders.

Additionally, the actor sent follow-up emails with subject lines such as “Incorrect contract” and “Requires Urgent Review.”

“This likely represented threat actors using the compromised account to send further malicious emails to the organization’s accounts team in order to infect additional accounts across the customer’s SaaS environment,” noted the researchers.

Phishing Attacks Are Targeted and Sophisticated

The researchers noted that it is “relatively simple” for attackers to abuse legitimate third-party solutions like Dropbox for phishing attacks, rather than relying on their own infrastructure.

Darley commented: “The case study highlights just how sophisticated cybercriminals are becoming in performing staged attacks. The emails themselves came from a legitimate ‘no-reply’ address from Dropbox that would generally send notices or links to clients.”

“The link contained in the email was also to a legitimate Dropbox storage endpoint, where a malicious file was being hosted. It was disguised as a partner document, making the emails appear legitimate,” she added.

Generative AI Assists Attackers

Darley noted that generative AI technologies are having a huge impact in enabling attackers to craft more sophisticated phishing messages.

Darktrace’s 2023 End of Year Threat Report found that over 25% of phishing cases observed the second half of 2023 contained more than 1000 characters, which is largely due to the capabilities provided by generative AI.

“These are not ‘payload alone’ emails with a couple of words and a dodgy link, but instead are highly crafted and wordy. There are also cases of enhanced social engineering wherein attackers will drop into existing conversation threads, impersonating colleagues or known contacts, attempting to mimic the tone of correspondence,” explained Darley.

“These instances of higher sophistication are being enabled by generative AI, which is giving bad actors more time to spend strategizing on wider scale attacks,” she added.

Image credit:Nopparat Khokthong / Shutterstock.com

Dropbox Used to Steal Credentials and Bypass MFA in Phishing Campaign (2024)

FAQs

Dropbox Used to Steal Credentials and Bypass MFA in Phishing Campaign? ›

A novel phishing campaign leveraged legitimate Dropbox infrastructure and successfully bypassed multifactor authentication (MFA) protocols, new research from Darktrace

Darktrace
Darktrace plc is a British cyber security company, established in 2013 and headquartered in Cambridge, England. It is listed on the London Stock Exchange and is a constituent of the FTSE 250 Index.
https://en.wikipedia.org › wiki › Darktrace
has revealed.

Is Dropbox used to steal credentials and bypass MFA in novel phishing campaign? ›

The file hosting service Dropbox is being abused in a novel phishing campaign that exploits trust in the platform to harvest Microsoft 365 credentials. The campaign targeted 16 employees of an organization who received an email from the no-reply[@]dropbox.com account, a legitimate email account that is used by Dropbox.

Is Dropbox used for phishing? ›

Dropbox Phishing Attacks

By leveraging the legitimate infrastructure of Dropbox, threat actors are able to carry out a range of malicious activities, from convincing their targets to unknowingly download malware to revealing sensitive information like login credentials.

Is it safe to open Dropbox? ›

At Dropbox, the security of your data is our highest priority. We have a dedicated security team using the best tools and engineering practices available to build and maintain Dropbox, and you can rest assured that we've implemented multiple levels of security to protect and back up your files.

Why am I getting emails from Dropbox? ›

If Dropbox detects a suspicious login attempt, we'll send a one-time security code to the email address associated with your Dropbox account as an additional security step. Important: If you receive an email that seems like it's from Dropbox and you're unsure if it's safe, you can check our official domains here.

Does Dropbox use MFA? ›

A text message containing a security code will be sent to your phone each time you log in to Dropbox. To receive your code via text message: Select Use text messages during multi-factor authentication setup. Enter the phone number where you'd like to receive text messages.

What is MFA phishing? ›

In an MFA phishing attack, a cybercriminal attempts to trick users into revealing the confidential information they use for authentication purpose or into intervening in the fraudulent approval of the login request produced by their MFA solution.

Did Dropbox have a security breach? ›

What happened in the Dropbox data breach, and what information was exposed? In April 2024, Dropbox disclosed a cybersecurity breach that impacted its Dropbox Sign (formerly HelloSign) service, exposing sensitive customer information.

What is Dropbox used for? ›

Dropbox is a cloud storage solution, equipped with features to help you save time, improve your productivity, and collaborate with others. Just some of the many things you can do with Dropbox include: Store your files, documents, and photos online and access them from any device.

Is Dropbox safe and secure? ›

Dropbox files at rest are encrypted using 256-bit Advanced Encryption Standard (AES). In fact, Dropbox is designed with multiple layers of protection to keep your files secure, above and beyond this encryption.

What is the downside of Dropbox? ›

Non-intuitive interface and heavy on storage

Secondly, Dropbox requires you to maintain plenty of storage space on your local hard drive for file synchronization. This is not the case with a platform like Google Drive or a DAM system.

Is Dropbox owned by Microsoft? ›

Dropbox is a file hosting service operated by the American company Dropbox, Inc., headquartered in San Francisco, California, U.S. that offers cloud storage, file synchronization, personal cloud, and client software.

Can anyone access your Dropbox? ›

Only people invited: Only people you invite can access your files and folders. If someone who wasn't invited receives the link, they can't open it. Team members: Only other members on your team account can access your files and folders.

Can someone see my email on Dropbox? ›

In the list of shared folder members, the person will be able to see the email address under to your name.

How do I stop someone having access to my Dropbox? ›

How to remove a member from a shared folder
  1. Log in to dropbox.com.
  2. Hover over the folder you'd like to manage and click Share.
  3. Click Who can access.
  4. Click the dropdown next to the member you'd like to remove.
  5. Click Remove.
  6. Choose if you want to leave the member a copy of the shared folder.
  7. Click Remove again.
Jun 4, 2024

How to verify a Dropbox email? ›

To verify your email address:
  1. Log in to dropbox.com.
  2. Send a verification email to the email address associated with your account.
  3. Look for the verification email from no-reply@dropbox.com in your inbox and click the link in that email.
Mar 8, 2024

What is the security breach involving user information in Dropbox? ›

A threat actor accessed Dropbox Sign customer names, emails, hashed passwords, API keys, OAuth tokens, multifactor authentication information and other data. Dropbox on Wednesday disclosed a data breach involving Dropbox Sign, its electronic signature service formerly known as HelloSign.

Is Dropbox safe to store passwords? ›

What makes Dropbox Passwords better? You're the only one who can see your passwords. Zero-knowledge encryption means your Dropbox Passwords data—from usernames and URLs to passwords, notes, and payment cards—is only accessible by you. It's available to every Dropbox user—for free—no matter what plan you're on.

What security does Dropbox use? ›

Dropbox files at rest are encrypted using 256-bit Advanced Encryption Standard (AES) Dropbox uses Secure Sockets Layer (SSL)/Transport Layer Security (TLS) to protect data in transit between Dropbox apps and our servers.

Did Dropbox get hacked? ›

Dropbox has confirmed that a hacker has accessed customer information including emails and usernames, phone numbers and hashed passwords, OAuth tokens and multi-factor authentication information.

Top Articles
Latest Posts
Article information

Author: Errol Quitzon

Last Updated:

Views: 6429

Rating: 4.9 / 5 (79 voted)

Reviews: 86% of readers found this page helpful

Author information

Name: Errol Quitzon

Birthday: 1993-04-02

Address: 70604 Haley Lane, Port Weldonside, TN 99233-0942

Phone: +9665282866296

Job: Product Retail Agent

Hobby: Computer programming, Horseback riding, Hooping, Dance, Ice skating, Backpacking, Rafting

Introduction: My name is Errol Quitzon, I am a fair, cute, fancy, clean, attractive, sparkling, kind person who loves writing and wants to share my knowledge and understanding with you.