Research uncovers flaws in password managers' zero-knowledge claims

New research from ETH Zurich and USI Lugano reveals vulnerabilities in popular password managers, challenging their assurances that servers cannot access user vaults. The study analyzed Bitwarden, Dashlane, and LastPass, identifying ways attackers with server control could steal or modify data, particularly when features like account recovery or sharing are enabled. Companies have begun patching the issues while defending their overall security practices.

Password managers have become essential for millions, with an estimated 94 million US adults using them to store sensitive data like passwords, cryptocurrency credentials, and payment details. Providers such as Bitwarden, Dashlane, and LastPass promote a 'zero-knowledge' encryption model, assuring users that even if servers are compromised, no one except the user can access the data. Bitwarden states that 'not even the team at Bitwarden can read your data (even if we wanted to).' Dashlane claims that without the master password, 'malicious actors can’t steal the information, even if Dashlane’s servers are compromised.' LastPass similarly asserts that no one can access the vault 'except you (not even LastPass).'

However, researchers from ETH Zurich and USI Lugano, in a paper published on February 17, 2026, demonstrated that these promises do not always hold. By reverse-engineering the software, they identified 25 vulnerabilities allowing an adversary with server control—through compromise or insider access—to read or even modify entire vaults. The attacks primarily exploit features like key escrow for account recovery and vault sharing. For instance, in Bitwarden, during new member enrollment in a family or organization, an attacker can replace the group public key with their own, enabling decryption of the user's symmetric key and access to the vault. This can propagate 'worm-like' across overlapping groups if recovery is enabled.

Similar flaws affect LastPass's key escrow in Teams versions, where superadmin key replacement allows vault theft upon login via browser extension. Dashlane faces risks in shared vaults, where unauthenticated key pairs let attackers recover shared symmetric keys to read and modify items. Backward compatibility with older versions introduces further weaknesses, such as padding oracle attacks in Bitwarden and Dashlane that could decrypt vaults over time. Attacks on hashing iterations also reduce master password cracking difficulty dramatically.

The researchers noted that these issues were overlooked despite prior audits, calling for more focus on malicious server scenarios. They mentioned 1Password likely shares similar flaws but analyzed it less deeply. Companies responded by patching many vulnerabilities after private notifications. Bitwarden emphasized that the threat model assumes 'full server compromise and adversarial behavior beyond standard operating assumptions.' LastPass highlighted its multi-layered security, including annual penetration testing and bug bounties. Dashlane affirmed rigorous testing and quick mitigation. 1Password stated the paper revealed no new vectors beyond its documented risks and continues evaluating against advanced threats.

The study underscores that while server breaches are rare, they remain a credible risk, especially from nation-state actors, given past incidents like LastPass breaches in 2015, 2021, and 2022.

Articoli correlati

Illustration depicting hackers hijacking Linux Snap Store apps to steal cryptocurrency recovery phrases, featuring a compromised Ubuntu laptop and digital seed phrase theft.
Immagine generata dall'IA

Attackers hijack Linux Snap Store apps to steal crypto phrases

Riportato dall'IA Immagine generata dall'IA

Cybercriminals have compromised trusted Linux applications on the Snap Store by seizing expired domains, allowing them to push malware that steals cryptocurrency recovery phrases. Security experts from SlowMist and Ubuntu contributor Alan Pope highlighted the attack, which targets established publisher accounts to distribute malicious updates impersonating popular wallets. Canonical has removed the affected snaps, but calls for stronger safeguards persist.

A 2022 data breach at password manager LastPass has resulted in prolonged cryptocurrency thefts, according to blockchain intelligence firm TRM Labs. The incident involved stolen user vaults that facilitated around $35 million in losses extending into 2025.

Riportato dall'IA

Following the 2022 LastPass data breach, blockchain firm TRM Labs has tied over $35 million in stolen cryptocurrency to Russian cybercriminals, detailing sophisticated laundering via mixers and exchanges persisting into late 2025.

Hackers have targeted Waltio, a French cryptocurrency accounting platform, demanding a ransom after stealing emails and tax reports from 50,000 customers. The company reported the incident on January 21, 2026, stating that no passwords or highly sensitive data were compromised. French authorities are now investigating the sophisticated cyberattack.

Riportato dall'IA

After a record 2025 for wrench attacks on cryptocurrency holders, as previously analyzed, experts forecast further increases in 2026. These physical coercions to steal digital assets are underreported amid law enforcement challenges and surging crypto adoption, warns TRM Labs.

A cryptocurrency investor lost over $282 million in Bitcoin and Litecoin after scammers impersonated Trezor support to steal a recovery seed phrase. The theft, revealed on January 16, 2026, by investigator ZachXBT, involved 1,459 Bitcoin and 2.05 million Litecoin stolen on January 10. The attacker laundered funds through Thorchain and converted them to Monero, causing the privacy coin's price to surge 36%.

Riportato dall'IA

Security experts are warning that ransomware attacks are now more frequently targeting firewalls. They advise organizations to secure these critical network defenses promptly. The alert comes amid rising cyber threats.

 

 

 

Questo sito web utilizza i cookie

Utilizziamo i cookie per l'analisi per migliorare il nostro sito. Leggi la nostra politica sulla privacy per ulteriori informazioni.
Rifiuta