{"id":3476,"date":"2013-03-07T14:28:41","date_gmt":"2013-03-07T14:28:41","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=3476"},"modified":"2015-09-09T19:36:55","modified_gmt":"2015-09-09T11:36:55","slug":"evernote-hacked-all-users-required-to-reset-passwords","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2013\/03\/evernote-hacked-all-users-required-to-reset-passwords\/","title":{"rendered":"Evernote Hacked – ALL Users Required To Reset Passwords"},"content":{"rendered":"

The big news in the past week or so was the Evernote hack, being a user of Evernote I was interested by this one – it seems to be a pretty pervasive hack with user IDs and e-mail addresses being leaked.<\/p>\n

Thankfully the passwords are salted hashes, so it’s unlikely they’ll get brute forced any time soon. As a precaution, Evernote forced a password reset on its entire userbase.<\/p>\n

Evernote has joined the growing list of companies whose cloud-based services have suffered a serious security breach, announcing over the weekend that it had implemented a service-wide password reset after attackers accessed user information.<\/p>\n

Happily, the company’s announcement notes, the passwords accessed were salted hashes, which should mean they last longer than the passwords lifted from the Australian Broadcasting Corporation recently.<\/p>\n

The user information accessed by the attackers also included user Ids and e-mail addresses.<\/p><\/blockquote>\n

Evernote joins the ranks of numerous other large companies which have been hacked recently (including Apple, Facebook & others compromised by the Java exploit<\/a>).<\/p>\n

I’m wondering if there’s some serious service based 0-day exploit out there people are leveraging (Apache? nginx? MySQL?) or something else perhaps.<\/p>\n