Security IT Trends/News
Arctic Wolf Networks

A Chrome Extension Vulnerability Exposed 4.6 Million Evernote Users to Potential Cyberattacks

The popular note-taking app company Evernote is one of the latest businesses to find a potentially dangerous vulnerability in its Web Clipper Chrome extension. According to statistics on the Chrome Web Store, the impaired extension has more than 4.6 million users.

An Unintended Invitation to Hackers

A cross-site scripting vulnerability in Evernote’s Web Clipper Chrome extension gave hackers an entryway to active sessions of other websites in the same browser. This enabled them to bypass Chrome’s same-origin policy.

The vulnerability created an opportunity to execute code that would allow an attacker to perform actions on behalf of the user, granting the hacker access to sensitive user information on affected third-party web pages and services. Data at risk spanned the range from authentication to financial information to private conversations on social media and in personal emails.

Evernote gets credit for how quickly it responded with a solution to the issue. The app company patched the security hole with its release of version 7.11.1., four days after learning about the vulnerability on May 27.

If there is one major takeaway, it’s that 24/7 monitoring matters.

Continuous Monitoring

In a cloud-based world where cyberattacks are increasingly more frequent, companies must take a proactive and effective approach to security.

In the case of Evernote, they were fortunate enough that an external source alerted them to the vulnerability. This allowed them to swiftly provide a solution, and to minimize a potentially disastrous attack. That being said, relying on the monitoring by outside sources is wishful thinking even in a perfect world. It leaves companies extremely vulnerable in a climate where cyberattacks are the new normal. Organizations today must arrange for their own security monitoring, and ensure monitoring takes place around the clock.

Stay Protected With SOC-as-a-Service

With bad actors on the prowl and hunting for even the slightest vulnerability, organizations need the protection provided by a security operations center (SOC). However, this is out of reach of most organizations, because of lack of resources and expertise.

SOC-as-a-service provides complete managed detection and response, 24/7 monitoring, vulnerability assessment and threat analysis, and incident response.

Download the Definitive Guide to SOC-as-a-Service to explore how a SOC-as-a-service gives you access to the professionals, process, and technology you need as a small to mid-size enterprise looking to amp up security.