| Why Dropbox's data breach response is still wrong |
Why Dropbox's data breach response is still wrong
When it involves telling your users regarding security incidents, fess up, speak directly, and assume things ar worse than they seem.
One day Dropbox may get its head round the best-practice strategies for handling client information breaches, however these days isn't that day.
News stone-broke on Tues that details of sixty eight,680,741 user accounts had been found on-line, apparently the results of a knowledge breach back in 2012. The files reportedly contained the users' email addresses, and their preserved and hashed passwords.
Dropbox's response was to email the affected users, United Nations agency can be forgiven for not realising it had been a few information breach.
"Resetting passwords from mid-2012 and earlier," was the topic line.
"We're reaching intent on allow you to recognize that if you haven't updated your Dropbox parole since mid-2012, you will be prompted to update it consequent time you check in. this is often strictly a preventative live, and we're compassionate the inconvenience," the e-mail scan.
"To learn additional regarding why we're taking this precaution, please visit this page on our facilitate Center. If you have got any queries, be at liberty to contact US at password-reset-help@dropbox.com."
If users did click through, they'd had to own scrolled down four sub-headings before they were finally told there'd been a knowledge breach -- and even then, it had been solely when however additional softening of the message.
"Our security groups ar perpetually look out for brand new threats to our users. As a part of these current efforts, we have a tendency to learned regarding Associate in Nursing recent set of Dropbox user credentials (email addresses and hashed and preserved passwords) that we have a tendency to believe were obtained in 2012. Our analysis suggests that the credentials relate to an occurrence we have a tendency to disclosed around that point.
"Based on our threat observance and therefore the means we have a tendency to secure passwords, we do not believe that any accounts are improperly accessed. Still, collectively of the many precautions, we're requiring anyone United Nations agency hasn't modified their parole since mid-2012 to update it consequent time they check in."
I reckon there is a few issues thereupon electronic messaging, although i am going to come to it. there is additional to stress regarding. (And for Dropbox's response concerning their password-changing prompts, see the update at the tip of the article.)
First, there is a drawback with the secondary authentication protocol: it is not being employed.
Assume for the instant that the dangerous guys have obtained a user's parole. they will log in to Dropbox. Then, if they are forced to alter the parole, this is often what they see.
![]() |
| Why Dropbox's data breach response is still wrong |
The dangerous guys enter a replacement parole, and it's game over.
What ought to happen? The secondary authentication protocol ought to be brought into play. For Dropbox, that is the user's email address.
Once the user has entered the recent parole, they must be emailed a one-time time-limited token, one in every of those emails that says "Click here to enter you new password". That means the dangerous guys have to be compelled to have gained access to the user's email account still. Not good, however a big extra hurdle.
Second, even once a user will amendment their parole, Dropbox says that any logged-in sessions on different devices can still move -- which would come with any sessions created by the dangerous guys before the user modified the parole.
What ought to happen? once there is Associate in Nursingy suspicion that an account might are compromised, all logged-in sessions ought to be logged out at once. once the user logs back in, they must be forced to alter their parole at once -- not simply prompted to try to to it after they get around to that.
OK, sure, during this specific instance Dropbox says their threat observance and parole storage strategy provide them a clean bill of health. So far, we've got no reason to doubt that.
But Dropbox has kind.
In 2014, Dropbox waved away security issues, despite having written that "there's nothing additional necessary to US than keeping your stuff safe and secure".
In 2012, Dropbox clearly did not reset everyone's passwords when a possible information breach. If that they had done, they would not be asking users to reset them currently, right?
And in 2011, Dropbox left a bunch of users' files hospitable the net, however brushed away issues by claiming it had been solely "a terribly little variety of users (much but one percent)" United Nations agency might need been affected. that is no consolation if you were one in every of them.
Dropbox, like such a lot of different organisations, is presumptively distressed that users are frightened away by security breaches, in order that they soften the language. however expertise and analysis show that once it involves information breaches, owning up truly will increase trust.
So here's however i would have handled Dropbox's latest issues -- excluding fixing those secondary authentication and session management issues.
"Security Message", i would have written in Associate in Nursing email to each user, having antecedently shoved the PR and promoting groups into a canal.
"We've had a security drawback. to date our investigations recommend that your account hasn't been accessed by anyone else. See below for the small print. however to make sure, we'd like you to reset your parole. it would even be a decent plan to show on two-factor authentication (2FA)."
I'd list the steps users have to be compelled to take, then the remainder of the small print -- as well as the steps we'd already taken to research and rectify the matter, Associate in Nursingd once we'd be emailing them an update.
Yes, i would say "problem" not "issue", as a result of that is what it's. And yes, i would email each user, as a result of why not? It builds trust.
One day Dropbox ought to begin taking note to the present kind of best-practice recommendation, and these days is that day.
Update at eleven.43am AEST, September 1: The work flow originally delineate during this column is that from the "change password" work flow on the website's "Account" page.
Dropbox has told Geeks Home that if a user was within the set of users probably littered with the 2012 incident, their "next login attempt" would be blocked with a password-change dialog.
![]() |
| Why Dropbox's data breach response is still wrong |
"The user is prevented from work in till he/she clicks the link they received in their email, and set a replacement parole," a exponent for Dropbox aforementioned.
"Dropbox employs variety of mechanisms to find compromised accounts, and do invalidate active sessions if those ar tripped."
Dropbox has additionally updated their journal post explaining things.
While ZDNet accepts that the best-practice work flow is followed on Associate in Nursing affected user's next login, this will need the user to own proactively logged out of Dropbox, then logged in once more.
Given that users ar probably to remain logged into Dropbox for weeks if not months at a time -- that is definitely what I do -- it's clear that Dropbox and that i have totally different opinions on what "proactively asking probably compact users to reset their password" suggests that.
A Dropbox user United Nations agency contacted ZDNet aforementioned she was involved that she'd logged in and however not been given the password-change dialog. within the ensuant speech communication, it became clear that she meant she had "logged in" within the conversational sense of "visiting" the web site. She was, of course, still logged in via a long-running session on her laptop.
This would appear to substantiate this writer's read that Dropbox's electronic messaging hadn't been robust enough.
"If I hadn't seen you tweet and browse your article, i do not suppose i would have ever gotten around to that," aforementioned the user, United Nations agency describes herself as "a usually stupid dropbox user".
The broader points also are still valid. Passwords ought to are modified in 2012, not once the info dump was discovered four years later. and every one logged-in sessions ought to are killed at once upon that discovery, not simply once Dropbox's unspecified "number of mechanisms" were triggered.
Surely defence-in-depth implies that you assume the worst in ever situation, instead of forward everything is functioning as publicized .


No comments:
Post a Comment