Research uncovers flaws in password managers' zero-knowledge claims

New research from ETH Zurich and USI Lugano reveals vulnerabilities in popular password managers, challenging their assurances that servers cannot access user vaults. The study analyzed Bitwarden, Dashlane, and LastPass, identifying ways attackers with server control could steal or modify data, particularly when features like account recovery or sharing are enabled. Companies have begun patching the issues while defending their overall security practices.

Password managers have become essential for millions, with an estimated 94 million US adults using them to store sensitive data like passwords, cryptocurrency credentials, and payment details. Providers such as Bitwarden, Dashlane, and LastPass promote a 'zero-knowledge' encryption model, assuring users that even if servers are compromised, no one except the user can access the data. Bitwarden states that 'not even the team at Bitwarden can read your data (even if we wanted to).' Dashlane claims that without the master password, 'malicious actors can’t steal the information, even if Dashlane’s servers are compromised.' LastPass similarly asserts that no one can access the vault 'except you (not even LastPass).'

However, researchers from ETH Zurich and USI Lugano, in a paper published on February 17, 2026, demonstrated that these promises do not always hold. By reverse-engineering the software, they identified 25 vulnerabilities allowing an adversary with server control—through compromise or insider access—to read or even modify entire vaults. The attacks primarily exploit features like key escrow for account recovery and vault sharing. For instance, in Bitwarden, during new member enrollment in a family or organization, an attacker can replace the group public key with their own, enabling decryption of the user's symmetric key and access to the vault. This can propagate 'worm-like' across overlapping groups if recovery is enabled.

Similar flaws affect LastPass's key escrow in Teams versions, where superadmin key replacement allows vault theft upon login via browser extension. Dashlane faces risks in shared vaults, where unauthenticated key pairs let attackers recover shared symmetric keys to read and modify items. Backward compatibility with older versions introduces further weaknesses, such as padding oracle attacks in Bitwarden and Dashlane that could decrypt vaults over time. Attacks on hashing iterations also reduce master password cracking difficulty dramatically.

The researchers noted that these issues were overlooked despite prior audits, calling for more focus on malicious server scenarios. They mentioned 1Password likely shares similar flaws but analyzed it less deeply. Companies responded by patching many vulnerabilities after private notifications. Bitwarden emphasized that the threat model assumes 'full server compromise and adversarial behavior beyond standard operating assumptions.' LastPass highlighted its multi-layered security, including annual penetration testing and bug bounties. Dashlane affirmed rigorous testing and quick mitigation. 1Password stated the paper revealed no new vectors beyond its documented risks and continues evaluating against advanced threats.

The study underscores that while server breaches are rare, they remain a credible risk, especially from nation-state actors, given past incidents like LastPass breaches in 2015, 2021, and 2022.

Makala yanayohusiana

Researchers analyzing 10 million web pages have identified 1,748 active API credentials from 14 major providers exposed across nearly 10,000 websites, including those run by banks and healthcare providers. These leaks could enable attackers to access sensitive data or gain control over digital infrastructure. Nurullah Demir of Stanford University described the issue as very significant, affecting even major companies.

Imeripotiwa na AI

A security vulnerability in Dell software has reportedly remained unpatched for almost two years, allowing Chinese hackers to exploit it. The flaw involves hardcoded login credentials in a tool, raising concerns about data security.

The Hacker News has released its latest ThreatsDay Bulletin, focusing on various cybersecurity issues. The bulletin covers topics such as Kali Linux combined with Claude, Chrome crash traps, WinRAR flaws, and activities related to LockBit. It also includes over 15 additional stories on emerging threats.

Imeripotiwa na AI

Several top photo ID apps have exposed user data due to database misconfigurations, impacting an estimated 150,000 individuals. The breach highlights vulnerabilities in mobile security tools designed for identity verification. TechRadar reported the incident on February 9, 2026.

Ijumaa, 17. Mwezi wa nne 2026, 12:05:02

Standard Bank data dumped daily after cyberattack ransom refusal

Ijumaa, 13. Mwezi wa tatu 2026, 18:03:59

Veeam patches three critical security flaws in backup servers

Jumatano, 11. Mwezi wa tatu 2026, 14:00:34

Google report warns of shifting cloud threat landscape

Jumatano, 11. Mwezi wa tatu 2026, 02:47:16

Dutch intelligence accuses Russia of hacker attacks on WhatsApp and Signal

Jumapili, 22. Mwezi wa pili 2026, 14:40:31

Vitalik Buterin outlines human-centered crypto security framework

Alhamisi, 19. Mwezi wa pili 2026, 09:18:19

Experts claim ransomware attacks increasingly target firewalls

Jumamosi, 14. Mwezi wa pili 2026, 13:45:41

Scammers target Trezor and Ledger users with fake mail letters

Alhamisi, 5. Mwezi wa pili 2026, 15:05:32

Critical flaws discovered in n8n workflow tool

Jumatano, 4. Mwezi wa pili 2026, 19:25:39

Russian hackers exploit Microsoft Office vulnerability days after patch

Tovuti hii inatumia vidakuzi

Tunatumia vidakuzi kwa uchambuzi ili kuboresha tovuti yetu. Soma sera ya faragha yetu kwa maelezo zaidi.
Kataa