![]() We still encourage users to reset passwords on other services if they suspect they may have reused their Dropbox password."ĭropbox initially disclosed the data breach in 2012, notifying users that one of its employee passwords was acquired and used to access a file with users' email addresses, but the company didn't disclose that the hackers were able to pilfer passwords too.īut earlier this week, Dropbox sent out emails alerting its users that a large chunk of its users' credentials was obtained in 2012 data breach that may soon be seen on the Dark Web marketplace, prompting them to change their password if they hadn't changed since mid-2012. "We initiated this reset as a precautionary measure so that the old passwords from prior to mid-2012 can't be used to improperly access Dropbox accounts. ![]() "We've confirmed that the proactive password reset we completed last week covered all potentially impacted users," said Patrick Heim, Head of Trust and Security for Dropbox. These password hashes also believed to have used a Salt – a random string added to the hashing process to further strengthen passwords in order to make it more difficult for hackers to crack them. Out of 68 Million, almost 32 Million passwords are secured using the strong hashing function " BCrypt," making difficult for hackers to obtain users' actual passwords, while the rest of the passwords are hashed with the SHA-1 hashing algorithm. However, in a selection of files obtained through sources in the database trading community and breach notification service Leakbase, Motherboard found around 5GB of files containing details on 68,680,741 accounts, which includes email addresses and hashed (and salted) passwords for Dropbox users.Īn unnamed Dropbox employee verified the legitimacy of the data.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |