{"id":43845,"date":"2026-02-23T05:10:08","date_gmt":"2026-02-22T21:10:08","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/23\/researchers-demonstrate-27-attacks-against-major-password-managers\/"},"modified":"2026-02-23T05:10:08","modified_gmt":"2026-02-22T21:10:08","slug":"researchers-demonstrate-27-attacks-against-major-password-managers","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/23\/researchers-demonstrate-27-attacks-against-major-password-managers\/","title":{"rendered":"Researchers Demonstrate 27 Attacks Against Major Password Managers"},"content":{"rendered":"\n<p>We often treat cloud-based <a href=\"https:\/\/hackread.com\/tag\/Password-manager\/\" data-type=\"post_tag\" data-id=\"5589\" target=\"_blank\" rel=\"noreferrer noopener\">password managers<\/a> as digital safes that only we can open. These services rely on Zero-Knowledge Encryption, a marketing promise that the company storing your data cannot actually see what is inside. However, new research suggests that this safety net is not as secure as many of us assume.<\/p>\n<p>A group of researchers from ETH Zurich and the Universit\u00e0 della Svizzera italiana, led by Professor Kenneth Paterson, recently released a paper  that should make every security-conscious person concerned. The team executed 27 successful attacks against industry leaders <a href=\"https:\/\/hackread.com\/fake-bitwarden-password-manager-zenrat\/\" target=\"_blank\" data-type=\"post\" data-id=\"97928\" rel=\"noreferrer noopener\">Bitwarden<\/a>, <a href=\"https:\/\/hackread.com\/uk-ico-fine-lastpass-2022-security-breach\/\" target=\"_blank\" rel=\"noreferrer noopener\">LastPass<\/a>, and <a href=\"https:\/\/hackread.com\/password-managers-found-to-be-vulnerable\/\" target=\"_blank\" data-type=\"post\" data-id=\"76438\" rel=\"noreferrer noopener\">Dashlane<\/a> (12 against Bitwarden, 7 against LastPass, and 6 against Dashlane), proving that if a server is compromised by a sophisticated actor, your vault can be unlocked with surprising ease.<\/p>\n<h3><strong>How the Vaults Were Broken<\/strong><\/h3>\n<p>The findings dismantle the main promise of <a href=\"https:\/\/www.reddit.com\/r\/cryptography\/comments\/10nc1np\/zeroknowledge_encryption_vs_endtoend_encryption\/\" target=\"_blank\" rel=\"noreferrer noopener\">Zero-Knowledge<\/a>. Using a Malicious Server Model, researchers showed that a hacked server could trick the app into betraying the user. These apps often fail to verify if data from the central server has been tampered with, a flaw known as a lack of ciphertext integrity and cryptographic binding, where the <a href=\"https:\/\/hackread.com\/docker-ask-gordon-ai-flaw-metadata-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener\">metadata<\/a> (like the URL) isn&#8217;t properly locked to the sensitive data (the password).<\/p>\n<p>In a field swap attack against Bitwarden and LastPass, researchers showed that because logins are saved in separate pieces (username, password, and URL), a hacker on the server can swap them. By moving your encrypted password into the URL spot, the app may accidentally send your decrypted password to an attacker\u2019s server while simply trying to load a website icon.<\/p>\n<p>Other attacks targeted features like account recovery and sharing. In a Malicious Auto-Enrolment attack, a compromised server can force a user to join a fake organisation. Because the app does not authenticate public keys, it might &#8220;blindly trust&#8221; the server and encrypt the user\u2019s master key using the attacker\u2019s key. This hands over a &#8220;recovery ciphertext&#8221; that the hacker can easily unlock.<\/p>\n<p>Furthermore, researchers exploited a Legacy Hazard, where apps keep 15-year-old security methods active for backward compatibility, allowing attackers to force a KDF downgrade to guess data byte-by-byte.<\/p>\n<div>\n<figure><a href=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/password-managers-vulnerability-compromised-servers-modify-user-credentials-1.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"717\" src=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/password-managers-vulnerability-compromised-servers-modify-user-credentials-1.jpg\" style=\"width:697px;height:auto\" srcset=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/password-managers-vulnerability-compromised-servers-modify-user-credentials-1.jpg 1024w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/password-managers-vulnerability-compromised-servers-modify-user-credentials-1-300x210.jpg 300w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/password-managers-vulnerability-compromised-servers-modify-user-credentials-1-768x538.jpg 768w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/password-managers-vulnerability-compromised-servers-modify-user-credentials-1-380x266.jpg 380w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/password-managers-vulnerability-compromised-servers-modify-user-credentials-1-800x560.jpg 800w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" alt=\"Researchers Demonstrate 27 Attacks Against Major Password Managers\" \/><\/a><figcaption>Attacks are divided into four categories based on the password manager feature exploited. Each reference indicates the affected product: BW for Bitwarden, LP for LastPass, DL for Dashlane. For each attack, we state the root cause, high level impact, \u2020 denotes recovery of encrypted passwords, and required client interaction: synchronisation, periodic or user triggered, login, vault opening, organisation join, vault sharing, or clicking a misleading dialog.<\/figcaption><\/figure>\n<\/p><\/div>\n<h3><strong>Which Apps are Safest and What to Do<\/strong><\/h3>\n<p>While Bitwarden, LastPass, and Dashlane showed various weaknesses, 1Password emerged as the most secure. Researchers found that 1Password\u2019s Secret Key, a random code that stays only on your devices, makes most of these server-side attacks mathematically impossible. Even if a hacker takes over the company\u2019s servers, they lack the second half of the key needed to decrypt the data. This highlights that true digital safety requires a small extra step from the user rather than total reliance on a company&#8217;s marketing.<\/p>\n<p>Following the study\u2019s 90-day disclosure period, vendors have begun patching these holes. Dashlane and Bitwarden have already released fixes to harden their systems and remove legacy cryptography. Users should update their apps immediately. <\/p>\n<div style='margin: 8px auto; text-align: center; display: block; clear: both;'> <script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-3675825324474978\"      crossorigin=\"anonymous\"><\/script>  <ins      style=\"display:inline-block;width:300px;height:250px\"      data-ad-client=\"ca-pub-3675825324474978\"      data-ad-slot=\"3421156210\"><\/ins> <script>      (adsbygoogle = window.adsbygoogle || []).push({}); <\/script><\/div>\n<p>To maximise protection, enable a Secret Key or use a hardware security key (like a YubiKey); these add a physical layer of security that a remote hacker simply cannot bypass. Apart from that, researchers conclude that vendors also need to \u201censure solid foundations, novel definitions to capture security in this setting.\u201d<\/p>\n<div >\n<div>\n<div>\n<div>\n<h5> \t\t\t\t\t\t<a href=\"https:\/\/hackread.com\/author\/deeba\/\" rel=\"author\"> \t\t\t\t\t\t\tDeeba Ahmed\t\t\t\t\t\t<\/a> \t\t\t\t\t<\/h5>\n<div> \t\t\t\t\t\t\t<a href=\"https:\/\/hackread.com\/author\/deeba\/\" rel=\"author\"> \t\t\t\t\t\t\t\t<img src='https:\/\/secure.gravatar.com\/avatar\/9fefbe13a37a8aeb4620dfe89bb7feabd9433643ff382b6b882f27837a4cfb72?s=80&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/9fefbe13a37a8aeb4620dfe89bb7feabd9433643ff382b6b882f27837a4cfb72?s=160&#038;d=mm&#038;r=g 2x' height='80' width='80' alt=\"Researchers Demonstrate 27 Attacks Against Major Password Managers\" \/>\t\t\t\t\t\t\t<\/a> \t\t\t\t\t\t<\/div>\n<div>\n<div> \t\t\t\t\t\t\t\tDeeba is a veteran cybersecurity reporter at Hackread.com with over a decade of experience covering cybercrime, vulnerabilities, and security events. Her expertise and in-depth analysis make her a key contributor to the platform\u2019s trusted coverage.\t\t\t\t\t\t\t<\/div>\n<div>\n<div> \t\t<a href=\"https:\/\/hackread.com\/author\/deeba\/\" target=\"\"> \t\t\tView Posts\t\t<\/a> \t<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>We often treat cloud-based password managers as digital [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-43845","post","type-post","status-publish","format-standard","hentry","category-hackread"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43845","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=43845"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43845\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=43845"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=43845"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=43845"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}