68 million Dropbox credentials leak online
Old hack from 2012 linked to fresh usernames and passwords data dump


More than 68 million Dropbox customers' usernames and passwords have been leaked after a four-year-old hack, it has emerged.
The stolen credentials date back to mid-2012, and Dropbox acknowledged last week that it was forcing some customers to reset their passwords if they have not changed it since that period.
However, today breach notification service Leakbase told Motherboard it has obtained four 5GB files filled with 68,680,741 Dropbox users' credentials.
Dropbox confirmed to IT Pro that more than 60 million accounts have been affected - around two-thirds of the company's userbase back in 2012.
"We can confirm that the scope of the password reset we completed last week did protect all impacted users," said Dropbox's head of trust and security Patrick Heim in a statement.
"Our analysis confirms that the credentials are user email addresses with hashed and salted passwords that were obtained prior to mid-2012."
That was a bumper year for hacks - the login information of 117 million users was stolen from LinkedIn, and Tumblr and MySpace also suffered major breaches in a similar period. Many cybercriminals attempted to use password data from these breaches to break into other sites, where users may have recycled their passwords.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
At the time, Dropbox said affected accounts were compromised through password reuse, blaming the incident on hacks of other sites that gave hackers credentials they could then try out on victims' Dropbox accounts.
But it also disclosed that the hackers stole a Dropbox employee's credentials, and used them to access "a project document with user email addresses".
Dropbox today maintained that the 68 million leaked credentials that surfaced today from that old incident were obtained through password reuse, rather that through a breach of its network.
However, security expert Troy Hunt, who specialises in tracking data breaches such as this, told IT Pro that "without a shadow of a doubt, the data was taken from Dropbox's system". He claimed that the leaked database could not have been the result of credential reuse, saying "there's no way this was cobbled together from other sources".
Hunt tested the leaked bcrypt hashes against his wife's unique password that he claims was only stored in a password manager and on Dropbox's servers, saying "you simply can't fabricate this sort of thing". Instead, he said that the data could have been obtained from a backup or a poorly-stored log on Dropbox's own systems.
Dropbox refused to futher clarify the matter, calling it an ongoing security investigation. Hunt was also quick to note that Dropbox customers were not in any immediate danger because of the resiliency of Dropbox's bcrypt hashing algorithm, and praised the way the company dealt with the situation.
Adam Shepherd has been a technology journalist since 2015, covering everything from cloud storage and security, to smartphones and servers. Over the course of his career, he’s seen the spread of 5G, the growing ubiquity of wireless devices, and the start of the connected revolution. He’s also been to more trade shows and technology conferences than he cares to count.
Adam is an avid follower of the latest hardware innovations, and he is never happier than when tinkering with complex network configurations, or exploring a new Linux distro. He was also previously a co-host on the ITPro Podcast, where he was often found ranting about his love of strange gadgets, his disdain for Windows Mobile, and everything in between.
You can find Adam tweeting about enterprise technology (or more often bad jokes) @AdamShepherUK.
-
Should AI PCs be part of your next hardware refresh?
AI PCs are fast becoming a business staple and a surefire way to future-proof your business
By Bobby Hellard
-
Westcon-Comstor and Vectra AI launch brace of new channel initiatives
News Westcon-Comstor and Vectra AI have announced the launch of two new channel growth initiatives focused on the managed security service provider (MSSP) space and AWS Marketplace.
By Daniel Todd
-
Capita tells pension provider to 'assume' nearly 500,000 customers' data stolen
Capita told the pension provider to “work on the assumption” that data had been stolen
By Ross Kelly
-
Gumtree site code made personal data of users and sellers publicly accessible
News Anyone could scan the website's HTML code to reveal personal information belonging to users of the popular second-hand classified adverts website
By Connor Jones
-
Pizza chain exposed 100,000 employees' Social Security numbers
News Former and current staff at California Pizza Kitchen potentially burned by hackers
By Danny Bradbury
-
83% of critical infrastructure companies have experienced breaches in the last three years
News Survey finds security practices are weak if not non-existent in critical firms
By Rene Millman
-
Identity Automation launches credential breach monitoring service
News New monitoring solution adds to the firm’s flagship RapidIdentity platform
By Praharsha Anand
-
Neiman Marcus data breach hits 4.6 million customers
News The breach took place last year, but details have only now come to light
By Rene Millman
-
Indiana notifies 750,000 after COVID-19 tracing data accessed
News The state is following up to ensure no information was transferred to bad actors
By Rene Millman
-
Pearson fined $1 million for downplaying severity of 2018 breach
News The SEC found the London-based firm made “misleading statements and omissions” about the intrusion
By Rene Millman