The study shows that a compromised cloud server can expose stored passwords, threatening both personal and corporate security and prompting a reevaluation of trust models for password managers.
A team of security researchers at ETH Zurich examined the resilience of popular cloud‑based password managers by modeling an extreme threat: a server that is entirely malicious.
Using this worst‑case assumption, they evaluated Bitwarden, LastPass and Dashlane. The tests showed a complete vault extraction for both Bitwarden and LastPass, while Dashlane only suffered a shared‑vault breach, indicating that its isolation mechanisms limited exposure.
The researchers noted that assuming a fully compromised backend is unlikely in practice, yet it exposes design weaknesses. “If the vault resides on a server the attacker controls, the encryption keys can be subverted,” one author wrote.
The findings urge enterprises and consumers to scrutinize zero‑knowledge guarantees and to prefer solutions that keep decryption keys off the server. Providers must reinforce client‑side encryption to preserve credential confidentiality even under server‑side breach.
Comments
Want to join the conversation?
Loading comments...