
Someone familiar with the matter told Business Insider it was the former - that the passwords were taken in 2012, and that fact has only come to light now, prompting the reset. But that's not what the recent blog post makes it sound like. showed a dark-haired, emaciated woman kneeling beside the figure of a boy. The other alternative is that they come from other major hacks that have recently come to light, like LinkedIn and MySpace, and have subsequently been combined with the Dropbox email data. It simply had a link to a file in Dropbox an online data storage system. But the blog post in 2012 doesn't mention the theft of any passwords - only user email addresses. This implies that the salted and hashed passwords came from the 2012 theft.

In this week's blog post, Dropbox says its security team "learned about an old set of Dropbox user credentials (email addresses plus hashed and salted passwords) that we believe was obtained in 2012," and that its analysis "suggests that the credentials relate to an incident we disclosed around that time." (Note: Salting and hashing are ways of encrypting and securing passwords so even if stolen, they should be useless to the hacker.) Account icon An icon in the shape of a person's head and shoulders.
