Menu
Dropbox used for convincing phishing attack

Dropbox used for convincing phishing attack

Dropbox was quick to remove the bogus login page, Symantec said

Once a victim supplied their login credentials, the bogus page redirected to Dropbox's real login page, Symantec said.

Once a victim supplied their login credentials, the bogus page redirected to Dropbox's real login page, Symantec said.

Dropbox's file storage service was used for a tricky phishing attack, although the service was quick to shut down it down, according to Symantec.

The security vendor said it detected a batch of phishing emails advising recipients that they've been sent a large file and included a link to Dropbox-hosted page.

"The email claims the document can be viewed by clicking on the link included in the message," wrote Nick Johnston of Symantec in a blog post. "However, the link opens a fake Dropbox login page, hosted on Dropbox itself."

By hosting the fake login page on Dropbox, the scammers gain some benefits over hosting it on a random, strange-looking domain name. The phishing page is contained within Dropbox's user content domain, similar to shared photos or files, Johnston wrote.

Most of the phishing page's elements are also served over SSL (Secure Sockets Layer), which encrypts communication between a client and a server and makes the ruse look more convincing. Older browsers may not prompt a warning if SSL isn't used for the entire page, he wrote.

"The prominence of the warning varies from browser to browser; some browsers simply change the padlock symbol shown in the address bar, whereas others include a small banner at the top of the page," Johnston wrote. "Users may not notice or understand these security warnings or the associated implications."

Phishing attacks have often been staged on trusted domains for file storage and sharing, such as on Google's Docs and Drive services.

The phishing page, which was quickly taken down by Dropbox, asks for a user's Dropbox credentials but also includes logos for popular webmail services. It purports to allow people to use the same webmail credentials to log into Dropbox.

Once a set of credentials has been collected, a PHP script within phishing page simply redirects to Dropbox's actual login page, Johnston wrote.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags dropboxsymantecsecurityfraud

Slideshows

Meet the leading HP partners in New Zealand...

Meet the leading HP partners in New Zealand...

HP has recognised its top performing partners in New Zealand at the second annual 2016 HP Partner Awards, held at a glittering bash in Auckland. The HP Partner Awards recognises and celebrates excellence, growth, consistency and engagement of its top partners. This year also saw the addition of several new categories, resulting in 11 companies winning across 11 award categories.

Meet the leading HP partners in New Zealand...
Channel comes together as Ingram Micro Showcase hits Auckland

Channel comes together as Ingram Micro Showcase hits Auckland

Ingram Micro outlined its core focuses for 2017 at Showcase in Auckland, bringing together the channel for a day of engaging keynotes, compelling breakout sessions and new technologies.

Channel comes together as Ingram Micro Showcase hits Auckland
Show Comments