Scams & Phishing News Phishing Scam Uses Clean Emails and PDFs to Steal Dropbox Logins

Brownie2019

Level 23
Thread author
Verified
Well-known
Forum Veteran
Mar 9, 2019
924
4,350
2,168
Germany
A multi-stage phishing campaign is targeting business users by exploiting Vercel cloud storage, PDF attachments, and Telegram bots to steal Dropbox credentials.
If you have ever received a boring email about a business contract or a ‘request order,’ you might have clicked it without thinking twice. But a new report suggests that these routine messages are now part of a planned scam.
Cybersecurity researchers at Forcepoint have discovered a new phishing scam in which attackers are using a “multi-stage” process to stay invisible and achieve their true goal of stealing your login details.
Most email scams are caught by filters because they contain malicious links or viruses. This one is different. It starts with a professional-looking email, usually about a “tender” or “procurement” deal. The email itself is completely clean. It relies on a PDF attachment to do the dirty work.
Full Story:
 
Full Story:
What you quoted matches a real Forcepoint X-Labs write-up (Feb 2, 2026) describing a “clean email + PDF chain” that ultimately lands the victim on a Dropbox-lookalike credential-harvesting page, with stolen credentials exfiltrated via a Telegram bot API endpoint.

Why this chain is effective
  • No link in the email body (so basic link-scanners can miss the initial message).
  • PDF as the “delivery mechanism”: the lure PDF contains embedded clickable elements (AcroForms) that look like normal document UI.
  • Trusted cloud hosting in the middle (Vercel Blob storage), which can help the second-stage content blend in with normal web traffic and reputation-based allowlists.
  • Brand impersonation (Dropbox login) increases the chance users will enter credentials without thinking.
  • Silent exfiltration to Telegram: the phishing page can send captured data to a hardcoded bot/channel, and often shows a fake “error” so the victim retries while the attacker already has the password.

Practical takeaways for individuals
  • Treat “procurement/tender/PO/contract” emails with attachments as high-risk, especially when the PDF tries to push you to “view/download” or “sign in to continue.”
  • If a document asks you to log in, do not use the embedded button/link. Instead, manually go to the service (type the real site or use a bookmark) and check for any legitimate pending document/action there.
  • Use a password manager. It’s one of the simplest anti-phishing controls: it typically won’t autofill on lookalike domains.
  • Enable 2FA/MFA on Dropbox and your email account (email compromise often becomes the next step after credential theft).

Org/IT defensive controls (low-friction, high value)
  • Harden PDF handling: enforce protected view/sandboxing for PDFs and consider stripping or warning on PDFs containing forms/actions/URLs (AcroForm objects, embedded actions).
  • Cloud “middle-hop” awareness: consider policies/detections for unexpected logins or redirects coming from legitimate cloud object storage (e.g., blob storage domains) when the user journey starts from email.
  • Web/DNS controls: where appropriate, add detections for suspicious newly-registered domains used as the final credential-harvesting host (often the weakest link in these chains).
  • Credential theft response playbook: rapid password reset + session revocation + review of connected apps/OAuth tokens + sign-in log review.

If someone already entered credentials
  • Immediately change the password (and anywhere it was reused).
  • Sign out/revoke active sessions and review connected devices/apps in the account.
  • Enable MFA if it wasn’t already.
  • Watch for follow-on BEC behavior: new inbox rules, forwarded mail, unusual “invoice/payment” threads, and unexpected file-share invitations.

Reporting
Dropbox provides a straightforward reporting path for suspicious emails/links (including forwarding the full message). That helps them take down abusive content faster.

Sources
 
Technical Analysis & Remediation

Attack Flow & Methodology

Initial Access (T1566.002)

The attack begins with a "boring" email regarding business contracts, tenders, or procurement orders. Crucially, the email body is clean (no malicious links), shifting the payload to a PDF attachment.

Execution & Evasion (T1204.002, T1027)
The attached PDF utilizes AcroForms and FlateDecode to obfuscate a clickable button/link inside the document. This technique hides the malicious logic from static analysis engines that trust standard PDF structures.

Redirect & Hosting (T1583.006)
Clicking the PDF link redirects the victim to a second document hosted on Vercel Blob storage. Since Vercel is a legitimate cloud platform, its domains often pass allow-list filters.

Credential Harvesting (T1110)
The Vercel-hosted file leads to a spoofed Dropbox login page. Scripts on this page harvest the email, password, IP address, and location data.

Exfiltration (T1567.002)
Stolen telemetry is exfiltrated directly to a private channel via a hardcoded Telegram bot API, bypassing traditional C2 traffic blocks.

Extracted Indicators of Compromise (IOCs) & Anchors

Technique Anchors

"AcroForms", "FlateDecode", "Vercel cloud storage".

Infrastructure

Hosting

.public.blob.vercel-storage.com (Generalized Vercel Blob pattern based on "Vercel cloud storage" citation).

Exfiltration
api.telegram.org (Standard Telegram Bot API endpoint).

Social Engineering Themes
"tender", "procurement", "request order", "business contract".

Remediation - THE ENTERPRISE TRACK (SANS PICERL)

Phase 1: Identification & Containmen
t

Filter Audit
Immediately audit email filters for PDFs containing "AcroForms" structures combined with external links, particularly those resolving to Vercel domains.

DNS Blockade
If Vercel or Telegram are not business-critical, implement temporary DNS blocking or sinkholing for *.vercel.app (or specific blob subdomains) and api.telegram.org at the firewall level.

Search & Purge
Query SIEM/EDR for outbound traffic to Telegram APIs originating from non-admin workstations.

Phase 2: Eradication

Identity Reset

Force password resets and revoke active sessions for any user who clicked the PDF link.

Endpoint Isolation
Isolate devices that show successful connections to the phishing landing page until a full scan is completed.

Phase 3: Recovery

Re-enable Access

Restore network access to Vercel/Telegram only after confirming the campaign has ceased or specific malicious URLs are blacklisted.

MFA Enforcement
Ensure FIDO2-compliant hardware keys are required for Dropbox access to neutralize credential harvesting.

Phase 4: Lessons Learned

Detection Engineering

Create detection rules for "clean" emails followed immediately by outbound traffic to cloud storage blobs.

User Training
Update security awareness modules to specifically highlight "Business Contract" PDFs and the danger of "clean" notification emails.

Remediation - THE HOME USER TRACK

Priority 1: Safety (Immediate Action)

Do Not Click

If you received a "tender" or "contract" email you weren't expecting, delete it immediately.

Disconnect
If you clicked the link and entered data, disconnect your device from the internet to stop further scripts from running.

Priority 2: Identity Protection

Change Passwords

Using a different (clean) device, change your Dropbox password immediately.

Check Sessions
In Dropbox settings (Security tab), look for "Devices" or "Web Sessions" you don't recognize and click "Unlink" or "Sign out."

Enable 2FA
Turn on Two-Factor Authentication (2FA) for Dropbox if it wasn't already enabled.

Priority 3: Persistence Removal

Scan Device

Run a full scan with a reputable antivirus solution (e.g., Microsoft Defender, Malwarebytes) to ensure no secondary payloads were dropped.

Hardening & References

Baseline

CIS Benchmark for Microsoft 365 (Email Security & Phishing Defenses).

Framework
NIST SP 800-61r2 (Computer Security Incident Handling Guide).

Tactical
MITRE ATT&CK T1566 (Phishing: Spearphishing Attachment).

Sources

Forcepoint X-Labs

Hackread
 
  • Like
Reactions: harlan4096