sign.dropbox.com
Open in
urlscan Pro
3.164.110.125
Public Scan
Submitted URL: https://links.dropbox.com/u/click?_t=ef863976fbfa496abde4b55f0c743182&_m=73ce514943534055a916bac8d380e928&_e=xUKbmgVwxwLae...
Effective URL: https://sign.dropbox.com/blog/a-recent-security-incident-involving-dropbox-sign?_ad=73ce514943534055a916bac8d380e928&_cam...
Submission: On May 07 via api from JP — Scanned from JP
Effective URL: https://sign.dropbox.com/blog/a-recent-security-incident-involving-dropbox-sign?_ad=73ce514943534055a916bac8d380e928&_cam...
Submission: On May 07 via api from JP — Scanned from JP
Form analysis
0 forms found in the DOMText Content
Skip to main content No items found. Why Dropbox Sign? WHAT YOU CAN DO Sign documents online Create electronic signatures Create templates Fill and sign PDFs Complete online contracts Document management Explore features USE CASES Sales and business development Human resources Startups Financial technology Real estate On-demand services Products Sign Make it easy to send and sign Sign API Integrate eSign in your workflow Forms Collect complex data on mobile Fax Send faxes without a fax machine Integrations We meet you where you work Resources Blog Workflow expertise & product news Customer stories Real-world stories with real results Help center In-depth guidance for our products Resource library Reports, videos, and info sheets Developers Pricing Dropbox Sign pricing Find the right plan for you Dropbox Sign API pricing Real-world stories with real results Contact sales Sign up Contact Sales Sign in Dropbox Sign Dropbox Forms Dropbox Fax Free trial Blog / Product news A RECENT SECURITY INCIDENT INVOLVING DROPBOX SIGN by Dropbox Sign team May 1, 2024 6 minute read New look, same great product! HelloSign is now Dropbox Sign. On April 24th, we became aware of unauthorized access to the Dropbox Sign (formerly HelloSign) production environment. Upon further investigation, we discovered that a threat actor had accessed Dropbox Sign customer information. We believe that this incident was isolated to Dropbox Sign infrastructure, and did not impact any other Dropbox products. We’re in the process of reaching out to all users impacted by this incident who need to take action, with step-by-step instructions on how to further protect their data. Our security team also reset users’ passwords, logged users out of any devices they had connected to Dropbox Sign, and is coordinating the rotation of all API keys and OAuth tokens. Please read on for additional details and an FAQ. On April 24th, we became aware of unauthorized access to the Dropbox Sign (formerly HelloSign) production environment. Upon further investigation, we discovered that a threat actor had accessed data including Dropbox Sign customer information such as email addresses, usernames, phone numbers and hashed passwords, in addition to general account settings and certain authentication information such as API keys, OAuth tokens, and multi-factor authentication. For those who received or signed a document through Dropbox Sign, but never created an account, email addresses and names were also exposed. Additionally, if you created a Dropbox Sign or HelloSign account, but did not set up a password with us (e.g. “Sign up with Google”), no password was stored or exposed. We’ve found no evidence of unauthorized access to the contents of customers’ accounts (i.e. their documents or agreements), or their payment information. From a technical perspective, Dropbox Sign’s infrastructure is largely separate from other Dropbox services. That said, we thoroughly investigated this risk and believe that this incident was isolated to Dropbox Sign infrastructure, and did not impact any other Dropbox products. WHAT HAPPENED AND OUR RESPONSE When we became aware of this issue, we launched an investigation with industry-leading forensic investigators to understand what happened and mitigate risks to our users. Based on our investigation, a third party gained access to a Dropbox Sign automated system configuration tool. The actor compromised a service account that was part of Sign’s back-end, which is a type of non-human account used to execute applications and run automated services. As such, this account had privileges to take a variety of actions within Sign’s production environment. The threat actor then used this access to the production environment to access our customer database. In response, our security team reset users’ passwords, logged users out of any devices they had connected to Dropbox Sign, and is coordinating the rotation of all API keys and OAuth tokens. We reported this event to data protection regulators and law enforcement. WHAT WE’RE DOING NEXT At Dropbox, our number one value is to be worthy of trust. We hold ourselves to a high standard when protecting our customers and their content. We didn’t live up to that standard here, and we’re deeply sorry for the impact it caused our customers. We’ve been working around the clock to mitigate risk to our customers, and we’re in the process of reaching out to all users impacted by this incident who need to take action, with step-by-step instructions on how to further protect their data. We’re also conducting an extensive review of this incident to better understand how this happened, and to protect against this kind of threat in the future. We are grateful for our customers’ partnership, and we’re here to help all of those who were impacted by this incident. To contact us about this incident, please reach out to us here. CUSTOMER FAQ I’m a Sign customer - what has Dropbox done to protect me and what do I need to do? * We’ve found no evidence of unauthorized access to the contents of users’ accounts (i.e. their documents or agreements). * We’ve expired your password and logged you out of any devices you had connected to Dropbox Sign to further protect your account. The next time you log in to your Sign account, you’ll be sent an email to reset your password. We recommend you do this as soon as possible. * If you’re an API customer, to ensure the security of your account, you’ll need to rotate your API key by generating a new one, configuring it with your application, and deleting your current one. As an additional precaution, we’ll be restricting certain functionality of API keys while we coordinate rotation. Only signature requests and signing capabilities will continue to be operational for your business continuity. Once you rotate your API keys, restrictions will be removed and the product will continue to function as normal. Here is how you can easily create a new key. * Customers who use an authenticator app for multi-factor authentication should reset it. Please delete your existing entry and then reset it. If you use SMS you do not need to take any action. * If you reused your Dropbox Sign password on any other services, we strongly recommend that you change your password on those accounts and utilize multi-factor authentication when available. If I have a Sign account linked to my Dropbox account, is my Dropbox account affected? * No. Based on our investigation to date, we believe this incident was isolated to Dropbox Sign infrastructure, and did not impact any other Dropbox products. * However, if you reused your Dropbox Sign password on any other services, we strongly recommend that you change your password on those accounts and utilize multi-factor authentication when available. Instructions on how to do this for your Dropbox Sign account can be found here. I’m a Sign API customer. Was my customers’ data exposed as well? * Names and email addresses for those who received or signed a document through Dropbox Sign, but never created an account, were exposed. Where can I go for more information on this incident? * We’re in the process of reaching out to all impacted users who need to take action, and we expect all notifications to be complete within a week. Is your investigation complete? * Our investigation is still ongoing, and we’ll provide additional updates as we have them. May 3, 2024 update: edited list of customer information to clarify that email addresses were involved, not emails Lorem ipsum Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere. Lorem ipsum UP NEXT: Product news 2 minute read ATLÉTICO DE MADRID AND DROPBOX JOIN FORCES TO DRIVE THE CLUB'S DIGITAL TRANSFORMATION Product news 4 minute read GET FROM “DEAL” TO “DONE DEAL”–FASTER eBook GETTING YOUR SALES TEAM SET-UP WITH ESIGNATURES Products Dropbox SignDropbox Sign APIDropbox FormsDropbox FaxIntegrations Why Dropbox Sign Electronic signaturesSign documentsSign and Fill PDFsOnline contractsCreate electronic signaturesSignature editorSign word documents Support Help centerContact salesContact supportCookies & CCPA preferencesGetting started: Dropbox SignGetting started: Dropbox Sign APIGetting started: Dropbox Forms Resources BlogCustomer storiesResource centerLegality guideTrust center Partners Strategic PartnersPartners locator Company CareersTermsPrivacy Accepted payment methods Select language: English (United States)English (United Kingdom)DeutschFrançais (Canada)Français (France)DanskNorsk (bokmål)SvenskaEspañol (Latinoamérica)Español (España)Bahasa IndonesiaItaliano日本語한국어Bahasa MalaysiaNederlandsPolskiPortuguês (Brasil)PусскийไทยУкраїнська中文(简体)中文(繁體) English (United States)English (United Kingdom)DeutschFrançais (Canada)Français (France)DanskNorsk (bokmål)SvenskaEspañol (Latinoamérica)Español (España)Bahasa IndonesiaItaliano日本語한국어Bahasa MalaysiaNederlandsPolskiPortuguês (Brasil)PусскийไทยУкраїнська中文(简体)中文(繁體) Dropbox Sign electronic signatures are legally binding in the United States, European Union, United Kingdom, and in many countries around the world. For more information, please view our Terms and Conditions and Privacy Policy