Logo
blank Skip to main content

Dropbox Client Research: Get Code, Emulate MiM Attack – to Protect Sensitive Data

Binary files of Dropbox Client discovered to be compiled and obfuscated Python files – not a big problem for Apriorit Research Department. Use legal Reverse Engineering when you need the 3rd-party application compatibility!

For more details:

The Client and Apriorit teams were working on a DLP system. At the next stage, the solution had to protect sensitive data from being transferred to the public cloud, in particular, Dropbox.

Cloud storage becomes essential part of work – but at the same time, it is one more channel for the corporate data to “slip away”, like email or chats. So a DLP solution must not prevent employees from using such popular cloud tool as Dropbox, while being able to monitor/protect data within it.

Such “flexible” 3rd-party solution compatibility can be a hard task, as we do not want to block application functioning, but to influence it in particular manner. All the processes, formats, and protocols are closed by publisher. What a DLP solution vendor can do in this situation? Fortunately, this is one of the cases when reverse engineering can be applied absolutely legally.

Apriorit Research and Reverse Engineering Group researched Dropbox client internals, network traffic and file system interaction and provided a prototype to successfully intercept, analyze and manage all necessary Dropbox file/folder and network operations.

 

Have a question?

Ask our expert!

Tell us about
your project

...And our team will:

  • Process your request within 1-2 business days.
  • Get back to you with an offer based on your project's scope and requirements.
  • Set a call to discuss your future project in detail and finalize the offer.
  • Sign a contract with you to start working on your project.

Do not have any specific task for us in mind but our skills seem interesting? Get a quick Apriorit intro to better understand our team capabilities.