{"id":12875,"date":"2016-08-31T11:57:56","date_gmt":"2016-08-31T15:57:56","guid":{"rendered":"https:\/\/www.kaspersky.co.za\/blog\/?p=12875"},"modified":"2019-11-15T13:48:58","modified_gmt":"2019-11-15T11:48:58","slug":"dropbox-hack","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.za\/blog\/dropbox-hack\/12875\/","title":{"rendered":"68M Dropbox passwords stolen \u2014 what you need to know"},"content":{"rendered":"<p>Earlier this week, my colleague <a href=\"https:\/\/twitter.com\/brokenfuses\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Chris from Threatpost<\/a> penned an article <a href=\"https:\/\/threatpost.com\/dropbox-forces-password-reset-for-older-users\/120184\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">about how Dropbox forced a password reset<\/a> for users who had not changed their passwords since 2012. At the time of his post, Dropbox called the move \u201cpurely a preventative measure.\u201d<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2016\/08\/06021642\/dropbox-email-screenshot.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-12876\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2016\/08\/06021642\/dropbox-email-screenshot.png\" alt=\"68M Dropbox passwords stolen \u2014 what you need to know\" width=\"1104\" height=\"900\"><\/a><\/p>\n<p>Back in 2012, Dropbox was the victim of a security breach that caused headaches and spam for users of the service. Four years later, the full extent of the breach is now coming to light after a cache of Dropbox user credentials was discovered online. Last night, Motherboard reported that the databases making their way around the database trading community were real and comprised more than <b>68 million Dropbox accounts.<\/b><\/p>\n<p>In the post, Motherboard noted that Dropbox had not seen evidence of malicious account access. Of the 68 million-plus accounts, approximately 32 million are secured with <a href=\"https:\/\/en.wikipedia.org\/wiki\/Bcrypt\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">bcrypt<\/a>; the rest are hashed with <a href=\"https:\/\/en.wikipedia.org\/wiki\/SHA-1\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">SHA-1<\/a>.<\/p>\n<h3>What does this mean?<\/h3>\n<p>According to Motherboard\u2019s report, the Dropbox data dump is not currently listed on the major dark web marketplaces, presumably because when passwords are adequately secured, their value to criminals diminishes. Given that this story is still developing, I suggest keeping tabs on Threatpost; they\u2019ll have rapid coverage should things change.<\/p>\n<h3>What should you do?<\/h3>\n<p>In the grand scheme of things, this breach is just another one to add to the ever-growing list of data dumps from megasites. It joins <a href=\"https:\/\/www.kaspersky.co.za\/blog\/linkedin-password-leak\/12146\/\" target=\"_blank\" rel=\"noopener noreferrer\">LinkedIn<\/a>, <a href=\"https:\/\/www.kaspersky.co.za\/blog\/myspace-tumbler-data-breach\/12252\/\" target=\"_blank\" rel=\"noopener noreferrer\">MySpace, Tumblr<\/a>, <a href=\"https:\/\/www.kaspersky.co.za\/blog\/oh-no-okcupid\/12152\/\" target=\"_blank\" rel=\"noopener noreferrer\">OKCupid<\/a>, and <a href=\"https:\/\/www.kaspersky.co.za\/blog\/change-your-spotify-password-again\/11948\/\" target=\"_blank\" rel=\"noopener noreferrer\">Spotify<\/a> (<a href=\"https:\/\/www.kaspersky.co.za\/blog\/change-your-spotify-password-again\/11948\/\" target=\"_blank\" rel=\"noopener noreferrer\">x2<\/a>), among others. Criminals find value in account credentials, and we know that hackers are gonna hack, so what we need to do as citizens of the digital world is to be smarter about how we secure our digital lives. As with any major breach, we will bang the drum on five essential tips for online security:<\/p>\n<p><b>1. Use strong passwords and change them regularly.<\/b> Can we all agree that keeping the same password for <em>four years<\/em> is not a good idea? Beyond that, passwords should both be easy to remember and strong (for an exercise in creating strong passwords, try our <a href=\"https:\/\/password.kaspersky.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">password check tool<\/a>).<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Also, for tips on creating secure but memorable passwords, please see <a href=\"http:\/\/t.co\/Q6qWwHUF9v\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/Q6qWwHUF9v<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/carphonewarehouse?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#carphonewarehouse<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/Kaspersky?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Kaspersky<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/securepasswords?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#securepasswords<\/a><\/p>\n<p>\u2014 David Emm (@emm_david) <a href=\"https:\/\/twitter.com\/emm_david\/status\/630678104441253888?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">August 10, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>It is also a good rule of thumb to change your passwords regularly on vital sites. Think online banking, Facebook, LinkedIn, and your primary personal e-mail. If the thought of creating, changing, and remembering all of your passwords seems daunting, consider using a password managing tool such as <a href=\"http:\/\/free.kaspersky.com\/advert\/?redef=1&amp;THRU&amp;reseller=gl_socmedfree16_acq_ona_smm__onl_b2c_kasperskydaily_lnk____kss\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Kaspersky Password Manager<\/a>.<\/p>\n<p><b>2. Delete old accounts.<\/b> When we reported on Myspace in May, a common piece of snark on our internal chat was, \u201cWait, people still use Myspace?\u201d Well, no, not many do, but many dormant accounts still exist. People set up the free accounts in the early 2000s and simply forgot about them when shiny objects like Twitter and Facebook burst onto the scene and supplanted the one-time head honcho of social networks.<\/p>\n<p>A good rule of thumb is to get rid of any accounts that you are not actively using. The reason for this is that if you aren\u2019t actively managing an account \u2014 and regularly changing the password on it \u2014 you could be leaving yourself at risk, especially if you are in the habit of reusing passwords.<\/p>\n<p><b>3. By the way: Don\u2019t reuse passwords.<\/b> I\u2019ve mentioned it a few times already, but it deserves its own point. Just say no to reusing passwords. Sure, it makes things easy for you, but consider the password you used to join a My Little Pony community being stolen and allowing crooks into your bank account.<\/p>\n<p><b>4. Activate two-factor authentication.<\/b> Most online services enhance user security by offering <a href=\"https:\/\/www.kaspersky.co.za\/blog\/multi-factor-authentication\/9669\/\" target=\"_blank\" rel=\"noopener noreferrer\">two-factor authentication<\/a>. They use app verification or SMS to ensure that the person attempting to get into an account is the person authorized to use the account. (Note: Dropbox offers this option.)<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">What is two-factor authentication and where should you enable it? <a href=\"http:\/\/t.co\/WSvDc9oSvb\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/WSvDc9oSvb<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/passwords?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#passwords<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/privacy?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#privacy<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/security?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#security<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/476019700636614656?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">June 9, 2014<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p><b>5. Be wary of third-party integration.<\/b> Many online services, such as Facebook and Dropbox, let you connect with third-party services for extra functions such as sharing files or competing in games with friends. The integration often makes life easier (and can mean not needing to remember yet another password). The flip side of that ease of use is accepting more potential points of failure when it comes to security. Sure App X may save you some time when you\u2019re sharing updates on the go, but does it safely secure the keys to your digital castle?<\/p>\n<p>Before connecting services, think twice. Is it vital to use one login \u2014 or to create another account? The answer is up to each user, but the question is one to seriously consider.<\/p>\n<p>In closing, the Dropbox data breach is another eye-opener and an important example of how criminals continue to target digital identities. We strongly advise everyone to roll the tips above into a regular security hygiene check. We have home security systems and locks for our terrestrial lives; we should be just as vigilant about our digital lives.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hackers have stolen 68 million account credentials from Dropbox dating back to 2012. Here\u2019s what you should do.<\/p>\n","protected":false},"author":636,"featured_media":12877,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,2670,9],"tags":[1852,18,527,961,433,131],"class_list":{"0":"post-12875","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"category-tips","10":"tag-advice","11":"tag-dropbox","12":"tag-hacks","13":"tag-leaks","14":"tag-security-breach","15":"tag-tips"},"hreflang":[{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/dropbox-hack\/12875\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/dropbox-hack\/7588\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/dropbox-hack\/7614\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/dropbox-hack\/7604\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/dropbox-hack\/9011\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/dropbox-hack\/8875\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/dropbox-hack\/12933\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/dropbox-hack\/2386\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/dropbox-hack\/12875\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/dropbox-hack\/6022\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/dropbox-hack\/6521\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/dropbox-hack\/5324\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/dropbox-hack\/8563\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/dropbox-hack\/12403\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/dropbox-hack\/12933\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/dropbox-hack\/12875\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.za\/blog\/tag\/advice\/","name":"#advice"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/12875","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/users\/636"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/comments?post=12875"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/12875\/revisions"}],"predecessor-version":[{"id":24288,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/12875\/revisions\/24288"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media\/12877"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media?parent=12875"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/categories?post=12875"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/tags?post=12875"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}