Data leak

Evernote Database Breach β€” 50 Million User Accounts Forced Password Reset

πŸ“… 2013-02-28 🏒 Evernote user database
Primary Source β†—

Incident Details

In late February 2013, Evernote β€” the popular note-taking application with approximately 50 million registered users β€” detected and blocked suspicious activity on its network. The attackers accessed usernames, email addresses associated with Evernote accounts, and encrypted passwords (using PBKDF2 password hashing). Evernote disclosed the breach on 2 March 2013 and immediately required all users to reset their passwords. Payment card data and user notes were stored in separate systems and were not compromised. Evernote’s rapid disclosure (within days of discovery) and immediate forced password reset was praised by security researchers. The company’s blog post was direct and transparent, explaining exactly what was and was not accessed. The PBKDF2 password hashing provided better protection than simpler schemes used by many contemporaneous services. The breach highlighted that note-taking and productivity applications containing significant personal and business information were attractive targets for credential theft. Evernote continued to grow following the breach.

Technical Details

Initial Attack Vector
Unknown attacker gained access to Evernote's user database; Evernote described the attack as targeting their network infrastructure; attacker accessed usernames, email addresses, and encrypted passwords
Vendor / Product
Evernote user database

Timeline

  1. 2013-02-28 Breach occurred
  2. 2013-03-02 Publicly disclosed
  3. 2013-03-02 Customers notified