Dropbox Code Repositories Stolen in Cyberattack on GitHub-Based Developers

0
84
Dropbox Code Repositories Stolen in Cyberattack on GitHub-Based Developers



A large phishing marketing campaign focusing on GitHub customers satisfied at the very least one developer at Dropbox to enter of their credentials and a two-factor authentication code, resulting in the theft of at the very least 130 software program code repositories.

According to a Dropbox advisory on Nov. 1, the mid-October assault consisted of emails that seemed to be from CircleCI, a well-liked DevOps platform, and directed Dropbox staff to go to a pretend login web page, enter of their GitHub credentials, after which enter within the one-time password created by a {hardware} key. 

The attacker ultimately succeeded with at the very least one goal, having access to and copying 130 code repositories, which included personalized variations of third-party libraries, prototypes of inside software program initiatives, and a set of instruments and configuration recordsdata maintained by the Dropbox safety group.

The attackers didn’t acquire entry to the corporate’s core software program or the recordsdata used to configure and function its infrastructure, Dropbox stated in its advisory.

“Our safety groups took instant motion to coordinate the rotation of all uncovered developer credentials, and decide what buyer information — if any — was accessed or stolen,” the corporate said. “We additionally reviewed our logs, and located no proof of profitable abuse.”

GitHub Developers: In the Cyber-Crosshairs

Dropbox programmers weren’t the one builders focused by the attackers. In September, GitHub warned {that a} menace group had begun focusing on the service’s customers with the identical tactic: phishing emails that presupposed to be from CircleCI, with the purpose of harvesting person credentials and the one-time passwords utilized by builders as a second issue of authentication.

The stakes are excessive: An attacker who efficiently steals a developer’s credentials can then obtain code from any non-public repository to which the compromised account has entry and use a wide range of methods — comparable to creating private entry tokens, including SSH keys, and authorizing purposes utilizing OAuth — to take care of persistence of entry, GitHub said in a September advisory.

“While GitHub itself was not affected, the marketing campaign has impacted many sufferer organizations,” the advisory said.

Cyber-Risks to Dropbox Customers “Minimal”

The assault on the Dropbox developer allowed the attackers to nab a “few thousand names and e-mail addresses belonging to Dropbox staff, present and previous clients, gross sales leads, and distributors,” Dropbox famous, including that it has greater than 700 million registered customers. Despite this, the privateness dangers to clients, companions and staff are “minimal,” Dropbox maintained.

“At no level did this menace actor have entry to the contents of anybody’s Dropbox account, their password, or their fee info,” Dropbox stated in its assertion. “To date, our investigation has discovered that the code accessed by this menace actor contained some credentials — primarily, API keys — utilized by Dropbox builders.”

Developers have change into an more and more standard goal of attackers. Stolen Slack credentials, for instance, have allowed the compromise of developer accounts at software program and sport makers, together with Take-Two Interactive’s Rockstar Games.

Like most safety consultants, Dropbox careworn that people — even probably the most technical and educated customers — are fallible, and for that motive, technical controls proceed to be necessary.

“Even probably the most skeptical, vigilant skilled can fall prey to a rigorously crafted message delivered in the fitting approach on the proper time,” the corporate stated. “This is exactly why phishing stays so efficient — and why technical controls stay the most effective safety in opposition to these sorts of assaults.”

How to Adopt Phishing-Resistant Infrastructure

Multifactor authentication (MFA) makes phishing for credentials way more tough, however not unimaginable. Attackers have discovered methods round time-based one-time passwords (TOTPs), Javvad Malik, an evangelist at safety consciousness and coaching supplier KnowBe4, stated in a press release despatched to Dark Reading.

“As MFA adoption will increase in reputation, we see criminals adapt their strategies to bypass MFA controls by tricking the customers in more and more refined methods,” he stated. “This is why phishing-resistant MFA is strongly suggested in order that social engineering assaults have much less chance of succeeding.”

In its advisory, GitHub careworn that firms ought to transfer as an alternative to {hardware} safety keys, the codes for which a person can’t inadvertently hand over to an attacker, or WebAuthn, a standards-based approach to make use of {hardware} keys for two-factor authentication.

Dropbox has already launched into the latter path, the corporate stated.

“Prior to this incident, we have been already within the means of adopting this extra phishing-resistant type of multi-factor authentication,” Dropbox said in its advisory. “Soon, our entire surroundings will probably be secured by WebAuthn with {hardware} tokens or biometric elements.”

LEAVE A REPLY

Please enter your comment!
Please enter your name here