Data leak
Evernote Database Breach β 50 Million User Accounts Forced Password Reset
Primary Source βIncident Details
In late February 2013, Evernote β the popular note-taking application with approximately 50 million registered users β detected and blocked suspicious activity on its network. The attackers accessed usernames, email addresses associated with Evernote accounts, and encrypted passwords (using PBKDF2 password hashing). Evernote disclosed the breach on 2 March 2013 and immediately required all users to reset their passwords. Payment card data and user notes were stored in separate systems and were not compromised. Evernote’s rapid disclosure (within days of discovery) and immediate forced password reset was praised by security researchers. The company’s blog post was direct and transparent, explaining exactly what was and was not accessed. The PBKDF2 password hashing provided better protection than simpler schemes used by many contemporaneous services. The breach highlighted that note-taking and productivity applications containing significant personal and business information were attractive targets for credential theft. Evernote continued to grow following the breach.
Technical Details
- Initial Attack Vector
- Unknown attacker gained access to Evernote's user database; Evernote described the attack as targeting their network infrastructure; attacker accessed usernames, email addresses, and encrypted passwords
- Vendor / Product
- Evernote user database
Timeline
- 2013-02-28 Breach occurred
- 2013-03-02 Publicly disclosed
- 2013-03-02 Customers notified