After detecting a hack, Evernote is requiring all 50 million customers to change passwords. Although Evernote does not believe the attackers used a critical hole in Java to gain access, there is a new Java zero-day successfully being exploited in the wild. The cloud-based note-syncing and productivity software service Evernote announced that attackers gained access to accounts’ usernames, email addresses and passwords, so 50 million Evernote customers are required to change their passwords. Yet the company maintains this forced service-wide password change is a “precaution to protect your data.”According to Evernote’s security notice, “Evernote’s Operations & Security team has discovered and blocked suspicious activity on the Evernote network that appears to have been a coordinated attempt to access secure areas of the Evernote Service.”In our security investigation, we have found no evidence that any of the content you store in Evernote was accessed, changed or lost. We also have no evidence that any payment information for Evernote Premium or Evernote Business customers was accessed. The investigation has shown, however, that the individual(s) responsible were able to gain access to Evernote user information, which includes usernames, email addresses associated with Evernote accounts and encrypted passwords. Even though this information was accessed, the passwords stored by Evernote are protected by one-way encryption. (In technical terms, they are hashed and salted.)Evernote reminded users to “never click on ‘reset password’ requests in emails-instead go directly to the service.” However, as Naked Security’s Graham Cluley pointed out, “Uh-oh, in the same email that Evernote tells users not to click on ‘reset password’ requests sent via email, they have clickable links. And what might make some recipients pause for thought is that the links don’t go directly to evernote.com, but instead link to a site called mkt5371.” Cluley explained, “This was just carelessness on Evernote’s part. mkt5371 is a domain owned by Silverpop, an email communications firm who Evernote has clearly employed to send emails to its 50 million or so affected users.”An Evernote company representative told CNET that this breach “follows a similar pattern of the many high profile attacks on other Internet-based companies that have taken place over the last several weeks.” Evernote joined Facebook, Apple, Twitter and Microsoft in a continuing trend of publicly admitting that its company suffered an intrusion. Unlike some of the hacked newspapers and Mandiant’s report, Evernote did not mention Chinese hackers. It also did not mention whether the “sophisticated” attack is believed to be linked to Eastern European gang of hackers whom Bloomberg reported are behind some of the Mac attacks to steal company secrets. Evernote spokeswoman Ronda Scott told Reuters that the Redwood City, California-based company believes “the hackers did not exploit a bug in Java when they broke into the company’s system.”Yet another new Java zero-day being exploited in the wild On that note, the malware intelligence lab FireEye warned that there is yet another Java zero-day that is successfully being exploited “against browsers that have Java v1.6 Update 41 and Java v1.7 Update 15 installed.” Threat intelligence firm Cyber Engineering Services Inc (CyberESI) was credited for confirming this new critical hole in Java. After triggering the vulnerability, the attackers install a Trojan dubbed McRAT. Although FireEye wanted to warn the general public, the company:…notified Oracle and will continue to work with Oracle on this in-the-wild discovery. Since this exploit affects the latest Java 6u41 and Java 7u15 versions, we urge users to disable Java in your browser until a patch has been released; alternatively, set your Java security settings to “High” and do not execute any unknown Java applets outside of your organization.Hopefully you disabled Java long ago? Surely you did after experts said it may take two years fix all the Java flaws.Alex Lanstein, a senior security researcher at FireEye, told Krebs on Security that this is the same malware using the same command and control server as the group that attacked Bit9. Symantec added that attackers using this Trojan “have been extremely persistent and have shown their sophistication in multiple attacks. Their primary motivation has been industrial espionage on a variety of industry sectors. The attackers have employed multiple zero-days.” Symantec pointed back to its reports of watering hole attacks and the espionage hacker gang ‘Elderwood’ that reportedly has ‘an unlimited supply of zero-day vulnerabilities.’On Feb. 28, Oracle assigned CVE-2013-1493 to this new critical Java hole.Like this? Here’s more posts:CISPA: Experts agree, private info not needed for sharing cyber threats with gov’tAll-seeing Big Bro Domain Awareness System coming to all 34,000 NYPD copsDARPA’s unblinking, all-seeing 1.8-gigapixel camera stare on PBS Rise of the DronesSecurity firm report details APT attacks by Chinese Army hackersPreserving American Privacy Act would limit domestic drone spying, ban killer dronesMicrosoft admits to being hacked tooMobile Firefox OS & Wikipedia to be delivered for free via text messagesChinese hackers use compromised USA university computers to attack usMicrosoft’s Secure Boot, Red Hat request ignites Linus Torvalds’ NSFW flame warInsect assassin drones? Armed drones choosing targets? What could possibly go wrong?Unpatched TRENDnet IP cameras still provide a real-time Peeping Tom paradise Follow me on Twitter @PrivacyFanatic Related content news Dow Jones watchlist of high-risk businesses, people found on unsecured database A Dow Jones watchlist of 2.4 million at-risk businesses, politicians, and individuals was left unprotected on public cloud server. By Ms. Smith Feb 28, 2019 4 mins Data Breach Hacking Security news Ransomware attacks hit Florida ISP, Australian cardiology group Ransomware attacks might be on the decline, but that doesn't mean we don't have new victims. A Florida ISP and an Australian cardiology group were hit recently. By Ms. Smith Feb 27, 2019 4 mins Ransomware Security news Bare-metal cloud servers vulnerable to Cloudborne flaw Researchers warn that firmware backdoors planted on bare-metal cloud servers could later be exploited to brick a different customer’s server, to steal their data, or for ransomware attacks. By Ms. Smith Feb 26, 2019 3 mins Cloud Computing Security news Meet the man-in-the-room attack: Hackers can invisibly eavesdrop on Bigscreen VR users Flaws in Bigscreen could allow 'invisible Peeping Tom' hackers to eavesdrop on Bigscreen VR users, to discreetly deliver malware payloads, to completely control victims' computers and even to start a worm infection spreading through VR By Ms. Smith Feb 21, 2019 4 mins Hacking Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe