

Verticals targeted by this group include engineering, information technology, law, communications, branding and marketing, media, insurance, and social services.

MSTIC’s assessment is that POLONIUM is an operational group based in Lebanon, coordinating its activities with other actors affiliated with Iran’s Ministry of Intelligence and Security (MOIS).Īccording to ESET telemetry, POLONIUM has targeted more than a dozen organizations in Israel since at least September 2021, with the group’s most recent actions being observed in September 2022. POLONIUM is a cyberespionage group first documented by Microsoft Threat Intelligence Center (MSTIC) in June 2022. We’ll keep you updated on this story once we hear back from Dropbox.įollow Alyssa Bereznak on Twitter or email her.ESET researchers analyzed previously undocumented custom backdoors and cyberespionage tools deployed in Israel by the POLONIUM APT groupĮSET researchers reveal their findings about POLONIUM, an advanced persistent threat (APT) group about which little information is publicly available and its initial compromise vector is unknown. Feel free to send the link to Dropbox, too. Also helpful: a guide to protecting your home network from hackers. For advice on how to create and use far stronger passwords, check out our comprehensive guide to fixing your passwords. If you are a Dropbox user, now is as good a time as ever to change your password and enable two-step verification on the site.Īmong the many passwords exposed in the hack, one of the worst was 123abc. The perpetrators of the hack claim they have 7 million compromised passwords. Though the cloud storage company has not yet posted anything about the hack, it did disable the listed passwords and is forcing users of those accounts to create new passwords when they next use Dropbox, according to The Next Web. As of this writing, they have raised 0.0001 bitcoin, or about 4 cents.

(The Reddit thread is easy to find, but since it links to lists of the hacked passwords, we are not linking to it here.)Īccording to the thread, those responsible for the hack are asking for Bitcoin donations (for some reason), but haven’t had much luck. The Next Web discovered a Reddit comment thread Monday evening that linked to a site where hundreds of usernames and passwords for the storage site were revealed in plain text. Hundreds of Dropbox passwords may have been leaked online. We’ve checked and these are not associated with Dropbox accounts. A subsequent list of usernames and passwords has been posted online.
