Security researchers have uncovered a sophisticated phishing campaign that leverages multiple stages and legitimate cloud infrastructure to harvest corporate Dropbox credentials. The attack, detailed by Forcepoint's X-Labs, begins with a seemingly harmless email containing a PDF attachment. This initial step helps bypass email gateways that scan for malicious links. The PDF contains a link that sends the user through a series of redirections, including leveraging the Vercel cloud platform, to ultimately land on a pixel-perfect replica of a Dropbox login page. Once credentials are submitted, they are stolen and sent to the attackers via a Telegram bot, demonstrating a modern and evasive method for credential theft.
The campaign is a classic example of credential phishing, but with modern evasive techniques. The primary goal is to steal valid login credentials for corporate Dropbox accounts, which can then be used for business email compromise (BEC), data theft, or as a foothold for further network intrusion.
Attack Chain:
tovz[.]life).This campaign's effectiveness lies in its abuse of trust and layered design:
T1566.001 - Spearphishing Attachment: The use of a PDF attachment in a targeted email.T1598.003 - Spearphishing Link: Although embedded in a PDF, the core of the attack is a malicious link.T1204.001 - Malicious Link: The user is tricked into clicking links within the PDF and intermediate pages.T1539 - Steal Web Session Cookie: While the report focuses on credentials, such pages often also steal session cookies.T1071.001 - Web Protocols: Used for redirection and exfiltration to the Telegram bot API.The immediate impact is the loss of credentials for a critical cloud service. This can lead to:
| Type | Value | Description |
|---|---|---|
| domain | tovz[.]life |
Phishing domain hosting the fake Dropbox login page. |
D3-UA - URL Analysis.tovz[.]life. While attackers rotate domains frequently, threat intelligence feeds can help keep blocklists updated.D3-MFA - Multi-factor Authentication.dropbox.com instead of clicking links.The most effective control to prevent account takeover even if credentials are stolen.
Mapped D3FEND Techniques:
Train users to identify sophisticated phishing attacks and to verify URLs before entering credentials.
Use web filters to block access to known phishing sites and newly registered domains.
Mapped D3FEND Techniques:
The primary and most crucial defense against this credential harvesting campaign is the enforcement of Multi-Factor Authentication (MFA) on all corporate cloud services, with Dropbox being the specific target here. Organizations should mandate the use of strong MFA methods, such as authenticator apps (e.g., Google Authenticator, Microsoft Authenticator) or hardware security keys (FIDO2/WebAuthn), for all users. Even when an employee is tricked into submitting their username and password on the fake login page, the attackers will be unable to complete the login process without the second factor. This single control effectively neutralizes the primary goal of the attack, preventing account takeover and subsequent data breaches.
To combat the evasive nature of this attack, organizations should deploy advanced email security solutions capable of deep content inspection and URL analysis. These tools should be configured to 'detonate' or open attachments in a sandbox environment to analyze their behavior. Specifically, the system must be able to extract URLs from within PDF files and follow the redirection chain to the final destination URL. By analyzing the final landing page (tovz[.]life in this case) for phishing characteristics (e.g., login forms, recently registered domain, impersonation of a known brand), the email can be blocked before it ever reaches the user's inbox. This automated analysis is key to defeating attacks that rely on hiding malicious links within attachments.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats