sign.dropbox.com Open in urlscan Pro
3.164.110.125  Public Scan

Submitted URL: https://links.dropbox.com/u/click?_t=ef863976fbfa496abde4b55f0c743182&_m=73ce514943534055a916bac8d380e928&_e=xUKbmgVwxwLae...
Effective URL: https://sign.dropbox.com/blog/a-recent-security-incident-involving-dropbox-sign?_ad=73ce514943534055a916bac8d380e928&_cam...
Submission: On May 07 via api from JP — Scanned from JP

Form analysis 0 forms found in the DOM

Text Content

Skip to main content
No items found.
Why Dropbox Sign?


WHAT YOU CAN DO

Sign documents online
Create electronic signatures
Create templates

Fill and sign PDFs
Complete online contracts
Document management
Explore features


USE CASES

Sales and business development
Human resources
Startups
Financial technology
Real estate
On-demand services
Products
Sign

Make it easy to send and sign
Sign API

Integrate eSign in your workflow
Forms

Collect complex data on mobile
Fax

Send faxes without a fax machine
Integrations

We meet you where you work
Resources
Blog

Workflow expertise & product news
Customer stories

Real-world stories with real results
Help center

In-depth guidance for our products
Resource library

Reports, videos, and info sheets
Developers
Pricing
Dropbox Sign pricing

Find the right plan for you
Dropbox Sign API pricing

Real-world stories with real results
Contact sales
Sign up

Contact Sales
Sign in
Dropbox Sign
Dropbox Forms
Dropbox Fax
Free trial





Blog
/
Product news


A RECENT SECURITY INCIDENT INVOLVING DROPBOX SIGN

by 
Dropbox Sign team

May 1, 2024
6
minute read



New look, same great product! HelloSign is now Dropbox Sign.

On April 24th, we became aware of unauthorized access to the Dropbox Sign
(formerly HelloSign) production environment. Upon further investigation, we
discovered that a threat actor had accessed Dropbox Sign customer information.
We believe that this incident was isolated to Dropbox Sign infrastructure, and
did not impact any other Dropbox products. We’re in the process of reaching out
to all users impacted by this incident who need to take action, with
step-by-step instructions on how to further protect their data. Our security
team also reset users’ passwords, logged users out of any devices they had
connected to Dropbox Sign, and is coordinating the rotation of all API keys and
OAuth tokens. Please read on for additional details and an FAQ.

On April 24th, we became aware of unauthorized access to the Dropbox Sign
(formerly HelloSign) production environment. Upon further investigation, we
discovered that a threat actor had accessed data including Dropbox Sign customer
information such as email addresses, usernames, phone numbers and hashed
passwords, in addition to general account settings and certain authentication
information such as API keys, OAuth tokens, and multi-factor authentication.

For those who received or signed a document through Dropbox Sign, but never
created an account, email addresses and names were also exposed. Additionally,
if you created a Dropbox Sign or HelloSign account, but did not set up a
password with us (e.g. “Sign up with Google”), no password was stored or
exposed. We’ve found no evidence of unauthorized access to the contents of
customers’ accounts (i.e. their documents or agreements), or their payment
information.  

From a technical perspective, Dropbox Sign’s infrastructure is largely separate
from other Dropbox services. That said, we thoroughly investigated this risk and
believe that this incident was isolated to Dropbox Sign infrastructure, and did
not impact any other Dropbox products.


WHAT HAPPENED AND OUR RESPONSE

When we became aware of this issue, we launched an investigation with
industry-leading forensic investigators to understand what happened and mitigate
risks to our users.  

Based on our investigation, a third party gained access to a Dropbox Sign
automated system configuration tool. The actor compromised a service account
that was part of Sign’s back-end, which is a type of non-human account used to
execute applications and run automated services. As such, this account had
privileges to take a variety of actions within Sign’s production environment.
The threat actor then used this access to the production environment to access
our customer database.

In response, our security team reset users’ passwords, logged users out of any
devices they had connected to Dropbox Sign, and is coordinating the rotation of
all API keys and OAuth tokens. We reported this event to data protection
regulators and law enforcement.


WHAT WE’RE DOING NEXT

At Dropbox, our number one value is to be worthy of trust. We hold ourselves to
a high standard when protecting our customers and their content. We didn’t live
up to that standard here, and we’re deeply sorry for the impact it caused our
customers.

We’ve been working around the clock to mitigate risk to our customers, and we’re
in the process of reaching out to all users impacted by this incident who need
to take action, with step-by-step instructions on how to further protect their
data.

We’re also conducting an extensive review of this incident to better understand
how this happened, and to protect against this kind of threat in the future. We
are grateful for our customers’ partnership, and we’re here to help all of those
who were impacted by this incident.

To contact us about this incident, please reach out to us here.


CUSTOMER FAQ

I’m a Sign customer - what has Dropbox done to protect me and what do I need to
do?

 * We’ve found no evidence of unauthorized access to the contents of users’
   accounts (i.e. their documents or agreements).
 * We’ve expired your password and logged you out of any devices you had
   connected to Dropbox Sign to further protect your account. The next time you
   log in to your Sign account, you’ll be sent an email to reset your password.
   We recommend you do this as soon as possible.
 * If you’re an API customer, to ensure the security of your account, you’ll
   need to rotate your API key by generating a new one, configuring it with your
   application, and deleting your current one. As an additional precaution,
   we’ll be restricting certain functionality of API keys while we coordinate
   rotation. Only signature requests and signing capabilities will continue to
   be operational for your business continuity. Once you rotate your API keys,
   restrictions will be removed and the product will continue to function as
   normal. Here is how you can easily create a new key.
 * Customers who use an authenticator app for multi-factor authentication should
   reset it. Please delete your existing entry and then reset it. If you use SMS
   you do not need to take any action.
 * If you reused your Dropbox Sign password on any other services, we strongly
   recommend that you change your password on those accounts and utilize
   multi-factor authentication when available.

If I have a Sign account linked to my Dropbox account, is my Dropbox account
affected?

 * No. Based on our investigation to date, we believe this incident was isolated
   to Dropbox Sign infrastructure, and did not impact any other Dropbox
   products.
 * However, if you reused your Dropbox Sign password on any other services, we
   strongly recommend that you change your password on those accounts and
   utilize multi-factor authentication when available. Instructions on how to do
   this for your Dropbox Sign account can be found here.

I’m a Sign API customer. Was my customers’ data exposed as well?

 * Names and email addresses for those who received or signed a document through
   Dropbox Sign, but never created an account, were exposed.

Where can I go for more information on this incident?

 * We’re in the process of reaching out to all impacted users who need to take
   action, and we expect all notifications to be complete within a week.

Is your investigation complete?

 * Our investigation is still ongoing, and we’ll provide additional updates as
   we have them.

‍

May 3, 2024 update: edited list of customer information to clarify that email
addresses were involved, not emails

Lorem ipsum

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim
in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor
interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo
cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.


Lorem ipsum



UP NEXT:


Product news
2
minute read

ATLÉTICO DE MADRID AND DROPBOX JOIN FORCES TO DRIVE THE CLUB'S DIGITAL
TRANSFORMATION

Product news
4
minute read

GET FROM “DEAL” TO “DONE DEAL”–FASTER

eBook

GETTING YOUR SALES TEAM SET-UP WITH ESIGNATURES

Products
Dropbox SignDropbox Sign APIDropbox FormsDropbox FaxIntegrations
Why Dropbox Sign
Electronic signaturesSign documentsSign and Fill PDFsOnline contractsCreate
electronic signaturesSignature editorSign word documents
Support
Help centerContact salesContact supportCookies & CCPA preferencesGetting
started: Dropbox SignGetting started: Dropbox Sign APIGetting started: Dropbox
Forms
Resources
BlogCustomer storiesResource centerLegality guideTrust center
Partners
Strategic PartnersPartners locator
Company
CareersTermsPrivacy

Accepted payment methods


Select language:
English (United States)English (United Kingdom)DeutschFrançais (Canada)Français
(France)DanskNorsk (bokmål)SvenskaEspañol (Latinoamérica)Español (España)Bahasa
IndonesiaItaliano日本語한국어Bahasa MalaysiaNederlandsPolskiPortuguês
(Brasil)PусскийไทยУкраїнська中文(简体)中文(繁體)
English (United States)English (United Kingdom)DeutschFrançais (Canada)Français
(France)DanskNorsk (bokmål)SvenskaEspañol (Latinoamérica)Español (España)Bahasa
IndonesiaItaliano日本語한국어Bahasa MalaysiaNederlandsPolskiPortuguês
(Brasil)PусскийไทยУкраїнська中文(简体)中文(繁體)

Dropbox Sign electronic signatures are legally binding in the United States,
European Union, United Kingdom, and in many countries around the world.
For more information, please view our Terms and Conditions and Privacy Policy