Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users

February 8, 2026

eScan Antivirus Update Servers Compromised to Deliver Multi-Stage Malware

February 8, 2026

Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm

February 8, 2026
Facebook X (Twitter) Instagram
Sunday, February 8
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»New Password-Stealing Phishing Campaign Targets Dropbox Credentials
News

New Password-Stealing Phishing Campaign Targets Dropbox Credentials

Team-CWDBy Team-CWDFebruary 6, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A multi-stage phishing campaign is using a sneaky technique to evade detection by security tools and harvest corporate credentials for well-known cloud storage services, researchers have warned.

Forcepoint X-Labs issued an alert about the ongoing campaign on February 2, which combines phishing emails which claim to relate to urgent business, PDF attachments, hidden malicious links and a spoofed login page to steal login credentials for Dropbox accounts.

The campaign begins with phishing emails which appear to be related to procurement requests or business purchases.

The messages are brief but could be viewed as convincingly professional looking, often tailored to look like they come from an organization or contact the target might expect, and ask the user to open a PDF attachment for more information.

Forcepoint noted that the succinct nature of the emails helps them to bypass email authentication checks like SPF, DKIM and DMARC, while the implied urgency of the request is designed to manipulate the receiver into following the instructions.

If the user opens the PDF, they are asked to follow an embedded link to aid with the request. This link is written in AcroForm which minimizes the ability for security software to scan it.

According to researchers, this link directs the target to a ‘Trusted Cloud Storage’ platform, which then in turn serves up a fake, but convincing looking Dropbox login page.

“By using legitimate cloud infrastructure, the attackers reduce suspicion, bypassing many automated security checks that rely on reputation and known-bad indicators in the process,” said Hassan Faizan, senior security researcher at Forcepoint.

If the user enters their login credentials, that username and password is sent to a Telegram channel operated by the attackers. With legitimate login credentials, the attackers can access the account and potentially use this initial access as a starting point to conduct additional attacks.

“These stolen credentials are exfiltrated to attacker-controlled command-and-control infrastructure, enabling further misuse such as account takeover, internal access or additional follow-on fraud,” said Faizan.

Credential theft and identity-based attacks surged during 2025, as cybercriminals looked to covertly gain access to enterprise accounts and networks. Sometimes, the end goal for attackers is simply data theft itself. But these intrusions can also represent the beginning of more destructive campaigns, including ransomware attacks.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleResearchers Find 175,000 Publicly Exposed Ollama AI Servers Across 130 Countries
Next Article Two Ivanti EPMM Zero-Day RCE Flaws Actively Exploited, Security Updates Released
Team-CWD
  • Website

Related Posts

News

Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users

February 8, 2026
News

eScan Antivirus Update Servers Compromised to Deliver Multi-Stage Malware

February 8, 2026
News

Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm

February 8, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Why you should never pay to get paid

September 15, 2025

How it preys on personal data – and how to stay safe

October 23, 2025

Don’t let “back to school” become “back to bullying”

September 11, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.