Security News > 2022 > November > Dropbox admits 130 of its private GitHub repos were copied after phishing attack
Dropbox has said it was successfully phished, resulting in someone copying 130 of its private GitHub code repositories and swiping some of its secret API credentials.
GitHub let Dropbox know the next day, and the cloud storage outfit investigated.
Interestingly, just three weeks before the attack, GitHub warned of phishing campaigns that involved impersonation of CircleCI. Dropbox appears not to have got the memo, because in early October its staff were sent and one or more bods fell for emails that masqueraded as legit CircleCI messages.
"These legitimate-looking emails directed employees to visit a fake CircleCI login page, enter their GitHub username and password, and then use their hardware authentication key to pass a One Time Password to the malicious site," Dropbox's explanation states.
Dropbox doesn't appear unduly worried by the incident because the repos "Included our own copies of third-party libraries slightly modified for use by Dropbox, internal prototypes, and some tools and configuration files used by the security team."
Dropbox also said the intruder's access to the GitHub repo silo was revoked on October 14, and that the cloud storage biz has since rotated all developer API credentials that the intruder had access to.
News URL
https://go.theregister.com/feed/www.theregister.com/2022/11/01/dropbox_phishing_code_leak/
Related news
- Monday.com removes "Share Update" feature abused for phishing attacks (source)
- FlyingYeti phishing crew grounded after abominable Ukraine attacks (source)
- New Gitloker attacks wipe GitHub repos in extortion scheme (source)
- More_eggs Malware Disguised as Resumes Targets Recruiters in Phishing Attack (source)
- Gitloker attacks abuse GitHub notifications to push malicious oAuth apps (source)