Evernote Breaks Own Security Rule in Data-Breach Email

NBC News Clone summarizes the latest on: Wbna51035244 - Breaking News | NBC News Clone. This article is rewritten and presented in a simplified tone for a better reader experience.

An elephant never forgets, unless it's the one in Evernote's logo.

An elephant never forgets, unless it's the one in Evernote's logo.

Evernote, the cloud-based note-taking and archiving service based in Redwood City, Calif., this weekend became the latest company to suffer a data breach resulting in the loss of customer information — including user names, email addresses and encrypted passwords.

The company handled the breach well at first. Evernote sent an email to its estimated 50 million registered users explaining the situation, notifying users it had reset their passwords and informing them that it had been using fairly strong password encryption.

Wisely, it also reminded customers to "Never click on 'reset password' requests in emails — instead go directly to the service."

Whoops

Not so wisely, Evernote then blew it. It included a password-reset link inside that very same alert email.

Even worse, the link didn't point to the Evernote website, but to an entirely different domain at "links.evernote.mkt5371.com".

In other words, there's no way a user could have been able to tell whether the message was a real breach-notification email from Evernote, or instead part of a phishing scam designed to capture passwords.

"Are people getting fake Evernote password reset emails?" asked Veracode security specialist Chris Eng on Twitter.

A tech-savvy but suspicious user would immediately check the email headers, information that's usually hidden but reveals an email message's origin.

In this reporter's case, the sender's return path was "[email protected]." That's not very reassuring.

Tech writer Ed Bott tweeted, "I did get a password reset email from Evernote yesterday. My server marked it as spam because it was from http://mail4773.evernote.mkt5371.com ".

[ 8 Simple Tips for Securing Your Computer ]

False alarm

Thankfully, that dodgy-looking email address and link are indeed genuine.

Graham Cluley of the British security firm Sophos explained that both are owned by Silverpop, an Atlanta digital-marketing firm that Evernote appears to have hired to handle its mass emails.

"That's a technique commonly used in a normal marketing email communications," Cluley said, "but looks very out of place in an email about a security breach which tries to hammer home the point" about never clicking on links in unsolicited emails.

The link in the notification email takes you straight to the Evernote front page, where there's a banner that reads: "If you received a password reset notification, please click here to set your new password."

Confusingly, the following page simply asks for your old password as if no data breach had happened.

The old password doesn't work, of course, forcing you to request a second email message which will allow you to actually reset your password.

When it arrives in your mailbox, the second message contains a link of its own — a big green button reading "Reset Password" that points to "https://www.evernote.com/ResetPassword.action" followed by a string of unique user data.

Its headers reveal the email message did indeed come from "evernote.com," and, naturally, you knew it was coming — three signs that this message is A-OK.

Once you click the big green button, you're taken to a password-reset page on the Evernote site and all is well.

Another Mac shop falls

Evernote hasn’t said how it was hacked, but circumstantial evidence indicates it may have been hit by the same browser-based Java exploit in January that hit Twitter, Facebook, Apple, Microsoft and an estimated 40 other companies, most still unnamed.

Sharp-eyed blog watchers noted that in a Business Insider slideshow of Evernote's offices posted last year, Macs are everywhere and there's scarcely a Windows PC to be seen.

There have been several hints that the Java exploit targeted Macs instead of PCs, especially Macs used by programmers developing apps for iPhones and iPads. Even at Microsoft, it was Macs that got hit.

(Sean Sullivan of Finnish security firm F-Secure has made a pretty convincing case for the Mac-targeting theory on his company's blog.)

As for Evernote's handling of the breach, it's not clear why Evernote could have just sent the notification email from its own servers, without a link to any site, and instead asked users to simply go to the Evernote site. That would have allayed any suspicions.

Despite the notification boo-boo, the advice still stands: Don't click on any links in emails you're not expecting. Type in the website address instead.

As is the case with every data breach, change your password on each and every account for which you used the compromised password.

Try never to use the same password twice, especially for important accounts such as Facebook, Twitter, iTunes/Apple, Google, Yahoo, Amazon, online financial services and any site that stores your credit-card information.

And, please, disable Java in your Web browser.

×
AdBlock Detected!
Please disable it to support our content.

Related Articles

Donald Trump Presidency Updates - Politics and Government | NBC News Clone | Inflation Rates 2025 Analysis - Business and Economy | NBC News Clone | Latest Vaccine Developments - Health and Medicine | NBC News Clone | Ukraine Russia Conflict Updates - World News | NBC News Clone | Openai Chatgpt News - Technology and Innovation | NBC News Clone | 2024 Paris Games Highlights - Sports and Recreation | NBC News Clone | Extreme Weather Events - Weather and Climate | NBC News Clone | Hollywood Updates - Entertainment and Celebrity | NBC News Clone | Government Transparency - Investigations and Analysis | NBC News Clone | Community Stories - Local News and Communities | NBC News Clone