The company said the compromise was related to a security incident in 2012 Dropbox’s move last week to ask users who had signed up before mid-2012 to change their account passwords followed the discovery of a large dump of email addresses and passwords related to these accounts.The online storage company confirmed late Tuesday reports that 68 million user email addresses and hashed and salted passwords from an incident in 2012 had been compromised.Dropbox said that the password reset the company completed last week covered all of the affected users so that the Dropbox accounts are protected.Last week, the company asked users who signed up before mid-2012 to change their passwords if they haven’t done so since then, describing it as a preventive measure and not because there was any indication that their accounts were improperly accessed. Hackers stole over 60 million account details from the online storage platform in the previously disclosed breach, Motherboard reported earlier on Tuesday. “Not just a little bit hacked……but proper hacked to the tune of 68 million records,” wrote Troy Hunt, creator of the Have I been pwned? (HIBP) website set up for users to check if they have been hit by known data breaches.The company did not comment on how the account information had been breached. “There is no doubt whatsoever that the data breach contains legitimate Dropbox passwords, you simply can’t fabricate this sort of thing,” Hunt said. He added that there were now over 68.6 million Dropbox accounts that could be searched on the HIPB website, with some 144,136 email alerts sent to subscribers of its free notification service.In July 2012, Dropbox said its investigation found that usernames and passwords recently stolen from other websites were used to sign in to a small number of Dropbox accounts. It said it had contacted the users affected to help them protect their accounts. A stolen password was also used to access an employee Dropbox account containing a project document with user email addresses, leading to spam attacks, the company said at the time.“We’ve confirmed that the proactive password reset we completed last week covered all potentially impacted users,” said Patrick Heim, Dropbox’s head of trust and security, in an emailed statement on Tuesday. “We initiated this reset as a precautionary measure, so that the old passwords from prior to mid-2012 can’t be used to improperly access Dropbox accounts.”Heim encouraged users to reset passwords on other services if they suspect they may have reused their Dropbox password. Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe