Threat Advisory

Fake Dropbox Phishing Attack that Harvest Login Credentials

Threat: Phishing Campaign
Targeted Region: Global
Targeted Sector: Technology & IT
Criticality: High

EXECUTIVE SUMMARY:

A phishing campaign that abuses trusted cloud storage services to bypass traditional email security controls and increase victim trust. The attack chain begins with phishing emails that deliver professionally crafted PDF attachments designed to resemble legitimate business communications. Rather than directly hosting malicious content, the PDFs contain embedded links that redirect users to additional documents hosted on well-known cloud platforms such as Dropbox. By leveraging reputable infrastructure, the attackers reduce suspicion and improve delivery success rates, as links to cloud services are less likely to be blocked or flagged by security filters. The campaign is focused on credential harvesting rather than malware deployment, targeting user login details for cloud accounts and corporate email services. This approach aligns with a broader trend of phishing operations shifting away from executable payloads toward social engineering and cloud abuse. The campaign demonstrates how attackers combine document-based lures, brand impersonation, and trusted platforms to scale credential theft while maintaining a low technical footprint on victim systems.

 

Technically, the campaign operates through a multi-stage redirection process designed to obscure the final phishing destination and complicate detection. The initial PDF attachment contains clickable elements that redirect users to a second PDF hosted on cloud storage, reinforcing the appearance of legitimacy. This secondary document includes a call-to-action link that leads to a spoofed Dropbox login page crafted to closely mimic the genuine service. When victims enter their credentials, the data is exfiltrated to attacker-controlled infrastructure rather than being used to authenticate the user. No malware is dropped, executed, or persisted on the victim’s device, allowing the attack to evade endpoint-based detection mechanisms. The campaign relies heavily on social engineering, brand impersonation, and abuse of trusted services rather than technical exploitation. By avoiding malicious binaries and using encrypted web traffic, the attackers significantly reduce forensic artifacts, making detection dependent on behavioral analysis, URL inspection, and user awareness rather than signature-based controls.

 

This phishing campaign highlights the evolving nature of credential-harvesting threats and the growing misuse of legitimate cloud services in attack chains. While the absence of malware reduces immediate system compromise, the impact of stolen credentials can be severe, enabling unauthorized access, data theft, account takeover, and further lateral phishing within organizations. Compromised cloud or email accounts may be leveraged to distribute additional phishing messages, reset passwords for other services, or access sensitive corporate data. The campaign underscores the limitations of relying solely on traditional malware detection and attachment scanning, as well as the need for enhanced visibility into cloud-based links and document behavior. Organizations face increased risk due to user trust in widely used platforms and the difficulty of distinguishing malicious activity from normal cloud usage. Overall, this activity is best categorized as a phishing-based malicious campaign focused on credential theft, demonstrating how low-noise, cloud-enabled attacks can achieve high success rates without deploying malware.

THREAT PROFILE:

Tactic Technique ID Technique Sub-Technique
Initial Access T1566.001 Phishing Spearphishing Attachment
T1566.002 Phishing Spearphishing Link
Execution T1204.001 User Execution Malicious Link
Defense Evasion T1036 Masquerading
T1027 Obfuscated  Files and Information
Command and Control T1071.001 Application Layer Protocol Web Protocols
Exfiltration T1567.002 Exfiltration Over Web Service Exfiltration to Cloud Storage

REFERENCES:

The following reports contain further technical details:

https://cybersecuritynews.com/beware-of-fake-dropbox-phishing-attack/

https://www.forcepoint.com/blog/x-labs/dropbox-pdf-phishing-cloud-storage

crossmenu