Skip to main content

Dropbox Just Required A Password Reset From 2012 Hack

By September 15, 2016March 2nd, 2023Blog, Cybersecurity

dropboxxjustIf you’re one of the millions of Dropbox users around the world, you were probably mildly annoyed recently when you logged on to find that you were being forced to change your password on that system. It’s one part of the company’s response to a data breach that dates back to 2012.

In 2012, the company became aware of a breach, and at that time, its investigation concluded that the number of users impacted by the breach was quite small. Those users were notified, and it was recommended that they change their passwords immediately. The company did not force a password change at that time.

Recently, however, a database was found for sale on the Darkweb that contained nearly seventy million user names and passwords of Dropbox users.This discovery was proof that the breach was much more extensive and severe than was originally estimated. As a result, the company compiled a complete listing of all impacted accounts from the rogue database, and force reset all the affected accounts.

Unfortunately, the company is not alone. In recent months, there have been a number of similar databases for sale on the Darkweb offering user accounts and passwords for tens, and sometimes hundreds of millions of users of a variety of high-profile, highly popular websites, including Yahoo, Gmail, LinkedIn, and others.

All of this highlights the importance of three things. Firstly, you should be changing your passwords on any site you use with frequency in case a breach occurs. Secondly, your passwords should be good, robust and not easy to decipher. Thirdly, if you’re using the same password across multiple sites, you’re opening yourself up to a world of trouble.

If, for example, your Dropbox password was the same as the password you use to access your bank account and/or credit card accounts, then back in 2012, when the Dropbox breach occurred, the hackers got access to those other accounts as well. It’s only a matter of time before they exploit that information, turning the problem of data vulnerability into a much larger and potentially more damaging one.

Chris Forte

Chris Forte, President and CEO of Olmec Systems, has been in the MSP workspace for the past 25 years. Chris earned his Master’s Degree from West Virginia University, graduating Magna Cum Laude. He was a past member of the Entrepreneurs’ Organization, a current member of the New Jersey Power Partners and Executive Association of New Jersey, where he has previously served on its board of directors. In his spare time, Chris enjoys traveling with his family. He also admits to being a struggling golfer and avid watcher of college football and basketball. He currently lives in Boonton Township, NJ with his wife, two daughters, son, and black lab Luna.