Dropbox data breach proves the “One Site, One Password” rule
A couple of weeks ago, Dropbox users started noticing an upturn in spam to email addresses they’d only ever used for Dropbox.
Understandably, they wanted to know, “Why?”
There are numerous possible explanations for this sort of thing.
Here are a few:
- An email address database at Dropbox got compromised.
- Email addresses leaked out from a non-database source at Dropbox.
- Malware on the user’s computer scooped up email addresses from the local hard disk.
- Malware logged passwords on the user’s computer.
- User inadvertently used the same email address somewhere else.
- User inadvertently used the same password somewhere else.
- Dropbox’s password database got stolen and cracked.
- Spammers got lucky guessing at email addresses.
With so many reasons to hand, tracking exactly why an email address suddenly saw a surge in spam can be tricky.
In the Dropbox case, however, the jury has now returned a verdict.
As in many multiple choice examinations, the right answer is “more than one of the above” – in fact, reasons (2) and (6).
Some users had used the same password on multiple sites, and a compromise elsewhere led to their Dropbox accounts being unlawfully accessed.
Unfortunately, the list of users who had re-used passwords included a Dropbox staffer. That user’s account was raided and gave up not one email address, but many, thanks to what Dropbox describes as “a project document with user email addresses.”
In other words, the breach (yes, I know email addresses alone don’t make much of a breach, but it’s the thought that counts) ended up being a mixture of poor practice both inside and outside the organisation. o, if you’ve ever doubted the value of the advice to choose a different password for each online account, this is a real-life case study to make you think again.