Sophisticated Phishing Attack Uses PDF Lures and Cloud Services to Steal Dropbox Credentials

Multi-Stage Phishing Campaign Bypasses Security Using PDF Attachments and Vercel to Harvest Dropbox Logins

MEDIUM
February 3, 2026
5m read
PhishingData Breach

Related Entities

Organizations

Products & Tech

Other

Full Report

Executive Summary

Security researchers have uncovered a sophisticated phishing campaign that leverages multiple stages and legitimate cloud infrastructure to harvest corporate Dropbox credentials. The attack, detailed by Forcepoint's X-Labs, begins with a seemingly harmless email containing a PDF attachment. This initial step helps bypass email gateways that scan for malicious links. The PDF contains a link that sends the user through a series of redirections, including leveraging the Vercel cloud platform, to ultimately land on a pixel-perfect replica of a Dropbox login page. Once credentials are submitted, they are stolen and sent to the attackers via a Telegram bot, demonstrating a modern and evasive method for credential theft.


Threat Overview

The campaign is a classic example of credential phishing, but with modern evasive techniques. The primary goal is to steal valid login credentials for corporate Dropbox accounts, which can then be used for business email compromise (BEC), data theft, or as a foothold for further network intrusion.

Attack Chain:

  1. Lure: The target receives a professional-looking email with a subject related to procurement or tenders. The email contains a PDF attachment instead of a direct link.
  2. Redirection 1 (PDF): The user opens the PDF and clicks a link within it.
  3. Redirection 2 (Cloud Service): The link directs the user to a page hosted on a legitimate service like Vercel Blob. This page often shows a blurred document, prompting the user to click again to log in and view it.
  4. Phishing Page: The final click leads to the fake Dropbox login page, hosted on an attacker-controlled domain (e.g., tovz[.]life).
  5. Credential Harvest: The user enters their email and password. The page simulates an error after a five-second delay to appear authentic.
  6. Exfiltration: In the background, the stolen credentials, along with the victim's IP address and location, are sent to the attackers via a Telegram bot.

Technical Analysis

This campaign's effectiveness lies in its abuse of trust and layered design:

  • PDF Attachments: Using PDFs as the initial container helps evade many email security solutions that are primarily focused on scanning URLs in the email body.
  • Legitimate Cloud Services: Leveraging services like Vercel for intermediate redirection makes the traffic appear benign to network security tools. It's difficult for organizations to block entire cloud platforms without causing business disruption.
  • Multi-Stage Redirection: The multiple hops make it harder for automated URL analysis tools to follow the entire chain to the final malicious page.
  • Telegram for Exfiltration: Using a legitimate messaging service for C2 and data exfiltration is a common evasive tactic, as the traffic blends in with normal user activity.

MITRE ATT&CK Techniques

Impact Assessment

The immediate impact is the loss of credentials for a critical cloud service. This can lead to:

  • Data Breach: Attackers gaining access to sensitive files stored in the compromised Dropbox account.
  • Account Takeover: The attacker can change the password, locking the legitimate user out.
  • Further Phishing: The compromised account can be used to send phishing emails to internal colleagues or external partners, leveraging the trust associated with the user's identity.
  • Initial Access: The credentials may be reused by the employee on other corporate systems, potentially giving the attacker access to the internal network or other cloud applications.

IOCs

Type Value Description
domain tovz[.]life Phishing domain hosting the fake Dropbox login page.

Detection & Response

  1. Email Security: Deploy advanced email security solutions that can sandbox attachments and analyze links within documents (URL Analysis). See D3-UA - URL Analysis.
  2. Endpoint Protection: EDR solutions can detect Office or PDF reader applications making network connections to suspicious domains.
  3. Network Monitoring: Monitor for connections to known phishing domains like tovz[.]life. While attackers rotate domains frequently, threat intelligence feeds can help keep blocklists updated.
  4. Credential Exposure: Monitor for corporate credentials appearing in public data dumps or on criminal forums.

Mitigation

  1. Multi-Factor Authentication (MFA): This is the single most effective mitigation. Even if the attacker steals the user's password, they cannot log in without the second factor. Enforce MFA on all cloud services, especially file sharing platforms like Dropbox. This is a direct implementation of D3-MFA - Multi-factor Authentication.
  2. User Training: Conduct regular, ongoing security awareness training that specifically covers multi-stage phishing attacks. Teach users to be wary of any login prompt that follows a series of unexpected clicks, and to manually type in known URLs like dropbox.com instead of clicking links.
  3. Web Filtering: Use a web filtering solution to block access to newly registered domains and domains categorized as phishing.
  4. Limit Cloud Services: Where possible, restrict the use of non-approved cloud services for business purposes to reduce the attack surface.

Timeline of Events

1
February 3, 2026
This article was published

MITRE ATT&CK Mitigations

The most effective control to prevent account takeover even if credentials are stolen.

Mapped D3FEND Techniques:

Train users to identify sophisticated phishing attacks and to verify URLs before entering credentials.

Use web filters to block access to known phishing sites and newly registered domains.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

The primary and most crucial defense against this credential harvesting campaign is the enforcement of Multi-Factor Authentication (MFA) on all corporate cloud services, with Dropbox being the specific target here. Organizations should mandate the use of strong MFA methods, such as authenticator apps (e.g., Google Authenticator, Microsoft Authenticator) or hardware security keys (FIDO2/WebAuthn), for all users. Even when an employee is tricked into submitting their username and password on the fake login page, the attackers will be unable to complete the login process without the second factor. This single control effectively neutralizes the primary goal of the attack, preventing account takeover and subsequent data breaches.

To combat the evasive nature of this attack, organizations should deploy advanced email security solutions capable of deep content inspection and URL analysis. These tools should be configured to 'detonate' or open attachments in a sandbox environment to analyze their behavior. Specifically, the system must be able to extract URLs from within PDF files and follow the redirection chain to the final destination URL. By analyzing the final landing page (tovz[.]life in this case) for phishing characteristics (e.g., login forms, recently registered domain, impersonation of a known brand), the email can be blocked before it ever reaches the user's inbox. This automated analysis is key to defeating attacks that rely on hiding malicious links within attachments.

Sources & References

Attackers Harvest Dropbox Logins Via Fake PDF Lures - Dark Reading
Dark Reading (darkreading.com) February 2, 2026
New phishing attack leverages PDFs and Dropbox - CSO Online
CSO Online (csoonline.com) February 3, 2026
PDF phishing attack leads to stolen Dropbox credentials | SC Media
SC Magazine (scmagazine.com) February 2, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

phishingcredential theftDropboxVercelTelegram

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading