Dropbox

Communication and Collaboration

Dropbox - Cloud storage service for file sharing and collaboration.

Detection Rules for Dropbox
These detection rules are designed to enhance Dropbox security by monitoring for unusual access patterns, unauthorized data sharing, and abnormal login behaviors, aiming to safeguard against unauthorized access and data exfiltration. They address critical aspects of Dropbox as a cloud-based storage and collaboration tool, ensuring sensitive file protection and alerting on suspicious activities.

Provider: Dropbox

Detection Rule MITRE Tactic MITRE Technique Criticality
Unauthorized File Access Initial Access T1071.001 - Application Layer Protocol: Web Protocols High
Investigation Actions (APIs) Use Dropbox API to check file access logs
query for unusual IPs.
Incident Creation Criteria Create an incident if unauthorized access is confirmed.
Data Exfiltration via Dropbox Exfiltration T1041 - Exfiltration Over Command and Control Channel Critical
Investigation Actions (APIs) Check Dropbox API for file download logs
analyze transfer sizes
Incident Creation Criteria Create an incident if abnormal data transfer is detected
Suspicious File Sharing Activity Command and Control T1071.001 - Application Layer Protocol: Web Protocols Medium
Investigation Actions (APIs) Query file sharing settings via API
check logs for unusual shares
Incident Creation Criteria Create an incident if unauthorized file sharing is found.
Large Volume File Downloads Exfiltration T1041 - Exfiltration Over Command and Control Channel Medium
Investigation Actions (APIs) Use Dropbox API to retrieve download logs
Analyze user activity.
Incident Creation Criteria Create an incident if thresholds for download volumes are exceeded.
Malware Delivery via File Uploads Execution T1203 - Exploitation for Client Execution Critical
Investigation Actions (APIs) Check file upload logs via API
Query user login activity APIs for patterns.
Incident Creation Criteria Integrate with malware scanning APIs
Credential Theft from Dropbox Credential Access T1081 - Credentials in Files High
Investigation Actions (APIs) Analyze logs for unusual credential usage
Use API for account activity
Incident Creation Criteria Create an incident if stolen credentials are verified.
Unauthorized API Access Credential Access T1078 - Valid Accounts High
Investigation Actions (APIs) Use API to review access tokens
Analyze for unexpected token usage.
Incident Creation Criteria Create an incident if unauthorized API calls are confirmed.
Phishing Campaigns Using Dropbox Links Initial Access T1566 - Phishings Critical
Investigation Actions (APIs) Query shared link logs via API.
Check links against phishing databases.
Incident Creation Criteria Create an incident if links are confirmed as maliciousconfirmed.
Account Takeover Attempts Credential Access T1078 - Valid AccountsDiscovery High
Investigation Actions (APIs) Use API to track login attempts
Monitor for location changes
Incident Creation Criteria Create an incident if multiple failed login attempts are detected.
File Integrity Manipulation Execution T1203 - Exploitation for Client Execution Medium
Investigation Actions (APIs) Use API to check file version history
Compare against known baselines
Incident Creation Criteria Create an incident if unauthorized changes are detected

APIs and Their Scopes

Detections Name API Required Scope Required Usage
Unauthorized File Access Dropbox API (File Access) files.metadata.read, files.content.read Access to read metadata and content of files to monitor access.
Data Exfiltration via Dropbox Dropbox API (File Download) files.content.read Used to track file downloads and identify large transfers.
Suspicious File Sharing Activity Dropbox API (Shared Links) sharing.read Access to shared link settings and logs for suspicious activity.
Large Volume File Downloads Dropbox API (File Download) files.content.read Monitors download activity to detect abnormal behavior.
Malware Delivery via File Uploads Dropbox API (File Upload) files.content.write, files.metadata.read Checks uploads for potential malware signatures and content.
Credential Theft from Dropbox Dropbox API (Account Activity) account.read Access to user account activity logs to track credential usage.
Unauthorized API Access Dropbox API (Account Management) team.read Allows tracking of API token usage and management for security.
Phishing Campaigns Using Dropbox Links Dropbox API (Shared Links) sharing.read Queries shared link logs to identify potential phishing attempts.
Account Takeover Attempts Dropbox API (Login Activity) account.read Access to login activity logs to monitor for suspicious attempts.
File Integrity Manipulation Dropbox API (File Metadata) files.metadata.read Checks file version history and changes for integrity verification.

Reports and Widgets for CISO

Report Name Widgets Description
Unauthorized Access Overview Bar Chart: Count of unauthorized access attempts by user. Summarizes instances of unauthorized file access attempts.

Pie Chart: Sources of unauthorized access (IP addresses).

Table: Details of unauthorized access events (date, file, user).

Data Exfiltration Attempts

Line Chart: Trends in data transfers over time.

Highlights detected attempts of data exfiltration.

Bar Chart: Count of exfiltration attempts by file type.

List: Top files targeted for exfiltration.

File Sharing Activity Report

Bar Chart: Number of files shared by users.

Provides insights into file sharing practices and anomalies.

Heatmap: Times of peak sharing activity.

Table: List of files shared externally with user details.

Malware Detection Report

Bar Chart: Count of malware detections by file type.

Reports on detected malware in uploaded files.

Table: Details of malware detections (file name, user, date).

Pie Chart: Distribution of malware types detected.

User Activity Analysis

Dashboard: Summary of user activity metrics.

Monitors user activity patterns and identifies anomalies.

Bar Chart: Most active users.

Line Chart: Trends in user login attempts over time.

Account Security Overview

Map: Geographical distribution of logins.

Summarizes account security events, including logins and access.

Table: List of accounts with multiple failed login attempts.

Bar Chart: Count of login attempts by user.

Phishing Campaign Summary

Line Chart: Trends in detected phishing attempts.

Provides insights into detected phishing attempts using Dropbox links.

Table: Details of phishing attempts (link, user, date).

Pie Chart: Sources of phishing links detected.