Company Details
dropbox
3,971
504,765
5112
dropbox.com
0
DRO_6274250
In-progress

Dropbox Company CyberSecurity Posture
dropbox.comDropbox is the one place to keep life organized and keep work moving. With more than 700 million registered users across 180 countries, we're on a mission to design a more enlightened way of working. To learn more about working at Dropbox, visit jobs.dropbox.com We also have a few simple guidelines to keep this space respectful and productive. Please avoid: - Harassing other people or using language that’s hateful, offensive, vulgar, or advocates violence - Trolling, fraud and spamming - Violating someone else’s rights or privacy - Advertising or soliciting donations - Link baiting - Posting off topic comments or thread hijacking We may remove comments that violate these guidelines.
Company Details
dropbox
3,971
504,765
5112
dropbox.com
0
DRO_6274250
In-progress
Between 700 and 749

Dropbox Global Score (TPRM)XXXX

Description: The Evony gaming company's website and forum were breached, exposing the personal information of 33 million players. A second hack of the website occurred two months later, this time targeting the Evony forum and exposing the personal information of 938,000 registered users. Among other internal data fields, each record has an IP address, password, email address, and username. Whenever a user appears in a breach, they can now receive notifications. Because the passwords were saved in unsalted MD5 and SHA-1 (Secure Hash Algorithm 1), hackers can easily decrypt them.
Description: The corporation is being forced by a DropBox data breach to reset login credentials for users who were part of an online data dump. Dropbox has acknowledged the 2012 data breach and informed users that they could be required to reset their passwords as a result of the incident. Motherboard, which was able to get portions of the compromised collection, claims that the contents include hashed passwords and email addresses belonging to Dropbox customers. Undoubtedly, the data is authentic, as stated by an anonymous Dropbox staff member who spoke on condition of anonymity.
Description: Dropbox experienced a security breach. The threat actors stole 130 code repositories after gaining access to one of its GitHub accounts using employee credentials stolen in a phishing attack. The attackers breached the account on October 14. The code accessed by this threat actor contained some credentials primarily, API keys used by Dropbox developers. The code and the data around it also included a few thousand names and email addresses belonging to Dropbox employees, current and past customers, sales leads, and vendors. On the same phishing page, the employees were asked to enter their GitHub username and password & to use their hardware authentication key to pass a One Time Password (OTP). They did not include code for their core apps or infrastructure. The attackers never had access to customers' accounts, passwords, or payment information, and its core apps and infrastructure were not affected as a result of this breach.


No incidents recorded for Dropbox in 2025.
No incidents recorded for Dropbox in 2025.
No incidents recorded for Dropbox in 2025.
Dropbox cyber incidents detection timeline including parent company and subsidiaries

Dropbox is the one place to keep life organized and keep work moving. With more than 700 million registered users across 180 countries, we're on a mission to design a more enlightened way of working. To learn more about working at Dropbox, visit jobs.dropbox.com We also have a few simple guidelines to keep this space respectful and productive. Please avoid: - Harassing other people or using language that’s hateful, offensive, vulgar, or advocates violence - Trolling, fraud and spamming - Violating someone else’s rights or privacy - Advertising or soliciting donations - Link baiting - Posting off topic comments or thread hijacking We may remove comments that violate these guidelines.

Daraz is the leading e-commerce marketplace across South Asia (excluding India). Our business covers four key areas – e-commerce, logistics, payment infrastructure and financial services – providing our sellers and customers with an end-to-end commerce solution. With access to over 500 million custo

About Lazada Group Founded in 2012, Lazada Group is the leading eCommerce platform in Southeast Asia. We are accelerating progress in Indonesia, Malaysia, the Philippines, Singapore, Thailand and Vietnam through commerce and technology. With the largest logistics and payments networks in the regio

Cadence is a market leader in AI and digital twins, pioneering the application of computational software to accelerate innovation in the engineering design of silicon to systems. Our design solutions, based on Cadence’s Intelligent System Design™ strategy, are essential for the world’s leading semic

Rakuten Group, Inc. (TSE: 4755) is a global technology leader in services that empower individuals, communities, businesses and society. Founded in Tokyo in 1997 as an online marketplace, Rakuten has expanded to offer services in e-commerce, fintech, digital content and communications to 2 billion m

Trimble is a global technology company that connects the physical and digital worlds, transforming the ways work gets done. With relentless innovation in precise positioning, modeling and data analytics, Trimble enables essential industries including construction, geospatial and transportation. Whet
VMware by Broadcom delivers software that unifies and streamlines hybrid cloud environments for the world’s most complex organizations. By combining public-cloud scale and agility with private-cloud security and performance, we empower our customers to modernize, optimize and protect their apps an

GlobalLogic, a Hitachi Group company, is a trusted partner in design, data, and digital engineering for the world’s largest and most innovative companies. Since our inception in 2000, we have been at the forefront of the digital revolution, helping to create some of the most widely used digital prod

More than one billion people around the world use Instagram, and we’re proud to be bringing them closer to the people and things they love. Instagram inspires people to see the world differently, discover new interests, and express themselves. Since launching in 2010, our community has grown at a r

[24]7.ai™ customer engagement solutions use conversational artificial intelligence to understand customer intent, enabling companies to create personalized, predictive, and effortless customer experiences across all channels; attract and retain customers; boost agent productivity and satisfaction; a
.png)
Cybersecurity firm Oneleet secures $33m Series A led by Dawn Capital. Discover how it aims to end compliance theatre—read more now.
North Korean Hackers Used GitHub and Cloud Services in Espionage Campaign Against Diplomats, While IT Workers Exploited AI to Infiltrate...
Dropbox Passwords will cease October 28 — act now to save your credentials.
Millions still have "zombie accounts" on apps they forgot existed.
Ingram Micro, one of the world's largest distributors, has confirmed it is trying to restore systems following a ransomware attack.
Popular cloud-storage service, Dropbox, suffered a security breach recently when hackers absconded with users' email addresses and passwords linked to their...
Dropbox is no stranger to data leaks. We take a look at Dropbox security to determine the positives and potential negatives.
A hacker group known as APT37 has launched a new espionage campaign against organizations in South Korea with interests in national security, researchers have...
Brazil-targeted phishing abuses RMM trialware via NF-e lures + Dropbox links, enabling stealth access.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Dropbox is http://www.dropbox.com.
According to Rankiteo, Dropbox’s AI-generated cybersecurity score is 732, reflecting their Moderate security posture.
According to Rankiteo, Dropbox currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Dropbox is not certified under SOC 2 Type 1.
According to Rankiteo, Dropbox does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Dropbox is not listed as GDPR compliant.
According to Rankiteo, Dropbox does not currently maintain PCI DSS compliance.
According to Rankiteo, Dropbox is not compliant with HIPAA regulations.
According to Rankiteo,Dropbox is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Dropbox operates primarily in the Software Development industry.
Dropbox employs approximately 3,971 people worldwide.
Dropbox presently has no subsidiaries across any sectors.
Dropbox’s official LinkedIn profile has approximately 504,765 followers.
Dropbox is classified under the NAICS code 5112, which corresponds to Software Publishers.
Yes, Dropbox has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/dropbox.
Yes, Dropbox maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/dropbox.
As of December 15, 2025, Rankiteo reports that Dropbox has experienced 3 cybersecurity incidents.
Dropbox has an estimated 27,702 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an remediation measures with reset login credentials..
Title: Dropbox Security Breach
Description: Dropbox experienced a security breach where threat actors stole 130 code repositories after gaining access to one of its GitHub accounts using employee credentials stolen in a phishing attack.
Date Detected: 2023-10-14
Type: Data Breach, Phishing
Attack Vector: Phishing, Credential Theft
Vulnerability Exploited: Employee credentials
Motivation: Data Theft
Title: Dropbox Data Breach
Description: Dropbox acknowledged a 2012 data breach, forcing a reset of login credentials for users whose data was part of an online data dump.
Type: Data Breach
Title: Evony Gaming Data Breach
Description: The Evony gaming company's website and forum were breached, exposing the personal information of 33 million players. A second hack occurred two months later, targeting the Evony forum and exposing the personal information of 938,000 registered users.
Type: Data Breach
Attack Vector: WebsiteForum
Vulnerability Exploited: Weak password encryption (unsalted MD5 and SHA-1)
Common Attack Types: The most common types of attacks the company has faced is Breach.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through GitHub account.

Data Compromised: Api keys, Employee names and email addresses, Customer names and email addresses, Sales leads, Vendor information
Systems Affected: GitHub account

Data Compromised: Hashed passwords, Email addresses

Data Compromised: Ip address, Password, Email address, Username
Systems Affected: WebsiteForum
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Api Keys, Employee Names And Email Addresses, Customer Names And Email Addresses, Sales Leads, Vendor Information, , Hashed Passwords, Email Addresses, , Ip Address, Password, Email Address, Username and .

Entity Name: Dropbox
Entity Type: Organization
Industry: Cloud Storage

Entity Name: Evony
Entity Type: Gaming Company
Industry: Gaming
Customers Affected: 33 million players, 938,000 registered users

Remediation Measures: reset login credentials

Type of Data Compromised: Api keys, Employee names and email addresses, Customer names and email addresses, Sales leads, Vendor information
Number of Records Exposed: A few thousand
Sensitivity of Data: Medium
Personally Identifiable Information: NamesEmail addresses

Type of Data Compromised: Hashed passwords, Email addresses

Type of Data Compromised: Ip address, Password, Email address, Username
Number of Records Exposed: 33 million, 938,000
Sensitivity of Data: High
Data Encryption: Weak (unsalted MD5 and SHA-1)
Personally Identifiable Information: IP addressemail addressusername
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: reset login credentials, .

Source: Motherboard
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Motherboard.

Entry Point: GitHub account

Root Causes: Phishing attack leading to credential theft

Root Causes: Weak password encryption (unsalted MD5 and SHA-1)
Most Recent Incident Detected: The most recent incident detected was on 2023-10-14.
Most Significant Data Compromised: The most significant data compromised in an incident were API keys, Employee names and email addresses, Customer names and email addresses, Sales leads, Vendor information, , hashed passwords, email addresses, , IP address, password, email address, username and .
Most Significant System Affected: The most significant system affected in an incident was GitHub account and WebsiteForum.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were email addresses, hashed passwords, email address, Sales leads, IP address, API keys, password, username, Customer names and email addresses, Employee names and email addresses and Vendor information.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 33.9M.
Most Recent Source: The most recent source of information about an incident is Motherboard.
Most Recent Entry Point: The most recent entry point used by an initial access broker was an GitHub account.
Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Phishing attack leading to credential theft, Weak password encryption (unsalted MD5 and SHA-1).
.png)
NXLog Agent before 6.11 can load a file specified by the OPENSSL_CONF environment variable.
uriparser through 0.9.9 allows unbounded recursion and stack consumption, as demonstrated by ParseMustBeSegmentNzNc with large input containing many commas.
A vulnerability was detected in Mayan EDMS up to 4.10.1. The affected element is an unknown function of the file /authentication/. The manipulation results in cross site scripting. The attack may be performed from remote. The exploit is now public and may be used. Upgrading to version 4.10.2 is sufficient to fix this issue. You should upgrade the affected component. The vendor confirms that this is "[f]ixed in version 4.10.2". Furthermore, that "[b]ackports for older versions in process and will be out as soon as their respective CI pipelines complete."
MJML through 4.18.0 allows mj-include directory traversal to test file existence and (in the type="css" case) read files. NOTE: this issue exists because of an incomplete fix for CVE-2020-12827.
A half-blind Server Side Request Forgery (SSRF) vulnerability exists in kube-controller-manager when using the in-tree Portworx StorageClass. This vulnerability allows authorized users to leak arbitrary information from unprotected endpoints in the control plane’s host network (including link-local or loopback services).

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.