Menu
Dropbox used for convincing phishing attack

Dropbox used for convincing phishing attack

Dropbox was quick to remove the bogus login page, Symantec said

Once a victim supplied their login credentials, the bogus page redirected to Dropbox's real login page, Symantec said.

Once a victim supplied their login credentials, the bogus page redirected to Dropbox's real login page, Symantec said.

Dropbox's file storage service was used for a tricky phishing attack, although the service was quick to shut down it down, according to Symantec.

The security vendor said it detected a batch of phishing emails advising recipients that they've been sent a large file and included a link to Dropbox-hosted page.

"The email claims the document can be viewed by clicking on the link included in the message," wrote Nick Johnston of Symantec in a blog post. "However, the link opens a fake Dropbox login page, hosted on Dropbox itself."

By hosting the fake login page on Dropbox, the scammers gain some benefits over hosting it on a random, strange-looking domain name. The phishing page is contained within Dropbox's user content domain, similar to shared photos or files, Johnston wrote.

Most of the phishing page's elements are also served over SSL (Secure Sockets Layer), which encrypts communication between a client and a server and makes the ruse look more convincing. Older browsers may not prompt a warning if SSL isn't used for the entire page, he wrote.

"The prominence of the warning varies from browser to browser; some browsers simply change the padlock symbol shown in the address bar, whereas others include a small banner at the top of the page," Johnston wrote. "Users may not notice or understand these security warnings or the associated implications."

Phishing attacks have often been staged on trusted domains for file storage and sharing, such as on Google's Docs and Drive services.

The phishing page, which was quickly taken down by Dropbox, asks for a user's Dropbox credentials but also includes logos for popular webmail services. It purports to allow people to use the same webmail credentials to log into Dropbox.

Once a set of credentials has been collected, a PHP script within phishing page simply redirects to Dropbox's actual login page, Johnston wrote.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags frauddropboxsymantec

Featured

Slideshows

EDGE 2018: Kiwis kick back with Super Rugby before NZ session

EDGE 2018: Kiwis kick back with Super Rugby before NZ session

New Zealanders kick-started EDGE 2018 with a bout of Super Rugby before a dedicated New Zealand session, in front of more than 50 partners, vendors and distributors on Hamilton Island.​

EDGE 2018: Kiwis kick back with Super Rugby before NZ session
EDGE 2018: Kiwis assess key customer priorities through NZ research

EDGE 2018: Kiwis assess key customer priorities through NZ research

EDGE 2018 kicked off with a dedicated New Zealand track, highlighting the key customer priorities across the local market, in association with Dell EMC. Delivered through EDGE Research - leveraging Kiwi data through Tech Research Asia - more than 50 partners, vendors and distributors combined during an interactive session to assess the changing spending patterns of the end-user and the subsequent impact to the channel.

EDGE 2018: Kiwis assess key customer priorities through NZ research
Show Comments