Dropbox Sign Data Breach

CompanyDropbox
Breach DateApril 24, 2024
Disclosure DateMay 1, 2024
Records AffectedUndisclosed

In April 2024, Dropbox discovered unauthorized access to the Dropbox Sign (formerly HelloSign) production environment. The attacker accessed customer data including emails, usernames, and authentication tokens for all users of the e-signature service.

What Happened

On April 24, 2024, Dropbox detected unauthorized access to the Dropbox Sign production environment. The attacker compromised a service account used for automated system configuration, gaining access to the Dropbox Sign customer database. The threat actor accessed information for all Dropbox Sign users, including those who received or signed documents through the service without creating an account. Dropbox stated that the core Dropbox file storage service was not affected. The company reset passwords, logged out all sessions, and rotated API keys.

What Data Was Exposed

  • Email addresses
  • Usernames
  • Phone numbers
  • Hashed passwords
  • API keys, OAuth tokens, and MFA authentication details
  • Account settings
  • Names and email addresses of those who received or signed documents (even without accounts)

Who Is Affected

All Dropbox Sign users were affected, as well as anyone who received or signed a document through Dropbox Sign, even without having a Dropbox Sign account. The total number of affected individuals was not publicly disclosed.

How to Check If You Were Affected

Dropbox emailed all affected Dropbox Sign users with information about the breach. Check your email (including spam) for communications from Dropbox. If you ever used Dropbox Sign or received a document through the service, assume your email address was exposed. Visit HaveIBeenPwned.com to check if your email appears in this breach.

What You Should Do Now

Last updated: February 10, 2026