• Millions of people use password managers. They make accessing online services and bank accounts easy and simplify credit card payments.
  • Many providers promise absolute security – the data is said to be so encrypted that even the providers themselves cannot access it.
  • However, researchers from ETH Zurich have shown that it is possible for hackers to view and even change passwords.
  • CardboardVictim@piefed.social
    link
    fedilink
    English
    arrow-up
    33
    ·
    5 hours ago

    For people interested there were 3 cloud based password managers tested and this is what they found

    The researchers demonstrated 12 attacks on Bitwarden, 7 on LastPass and 6 on Dashlane.

    • stephen01king@piefed.zip
      link
      fedilink
      English
      arrow-up
      2
      ·
      3 hours ago

      Unfortunately they don’t explain what the attacks were in the article. Gonna need to find the paper to know.

      • _edge@discuss.tchncs.de
        link
        fedilink
        English
        arrow-up
        11
        ·
        5 hours ago

        The method, they use, requires a client-server architecture. Hence, they cannot attack a local keepass file even if you sync it to some cloud.

      • CardboardVictim@piefed.social
        link
        fedilink
        English
        arrow-up
        9
        ·
        5 hours ago

        From what I scanned, there was no reason given on why they only attacked cloud based providers.

        My guess is that these are paid ones and thus have a ‘market share’, easier to attack etc.

        If you attack a ‘keepass’ password the attack vector is more crypto / memory based as far as my limited knowledge goes and not some funky inbetween attack.

        Also, if you attack a cloud base provides, you will most likely have multiple victims per breach / exploit, whilst offline are targeted and thus not so interesting in most cases unless we’re talking about a person of interest

        • U7826391786239@lemmy.zip
          link
          fedilink
          English
          arrow-up
          24
          ·
          edit-2
          5 hours ago

          they ran the test on those pw managers because they were open source. that allowed the testers to implement a “dummy” provider on their own “compromised server.” so the results of failing the tests are based on the hypothetical situation of “what if bitwarden (or whoever) had an entire server taken over by hackers”. while the chances of that happening are greater than zero, it would take a lot for someone to completely hijack a server like that

          edit to add-- these tests are one of the reasons these pw managers choose to be open source: to allow 3rd party tests like this to find vulnerabilities, so they can be fixed

          nothing is 100% guaranteed safe, but if you don’t want to remember or write down dozens or hundreds of unique strong passwords, i still would recommend a pw manager

          • sexy_peach@feddit.org
            link
            fedilink
            English
            arrow-up
            5
            ·
            5 hours ago

            Oh okay so they probably delivered malicious code to the user entering their passwords… Well even an offline pw manager can be compromised in the code.

    • artyom@piefed.social
      link
      fedilink
      English
      arrow-up
      2
      arrow-down
      1
      ·
      5 hours ago

      Yes but unfortunately nothing specific about the strength of any particular option.