密码管理器不如承诺的安全
Password managers less secure than promised

原始链接: https://ethz.ch/en/news-and-events/eth-news/news/2026/02/password-managers-less-secure-than-promised.html

## 密码管理器:并非像你认为的那么安全 大多数网络用户需要管理数百个密码,这使得密码管理器——一种在主密码后面存储凭据的工具——变得非常流行。虽然它们提供了便利性和跨设备的可访问性,但苏黎世联邦理工学院的研究表明,领先的提供商(如Bitwarden、LastPass和Dashlane)存在显著的安全漏洞,这些提供商总共服务于6000万用户。 该研究展示了多次成功的攻击,通过日常操作(如登录或同步数据)获取甚至修改了用户密码。尽管供应商声称采用“零知识加密”——这意味着他们不应访问用户数据——但该研究发现漏洞允许完全破坏保险库。 这些弱点源于为用户友好性设计的复杂代码(如密码恢复和共享),这无意中扩大了攻击面。供应商不愿使用现代密码学更新系统,担心现有用户的数据丢失,通常依赖过时的安全措施。 研究人员建议选择具有透明度、外部审计和默认端到端加密的密码管理器。关键要点是:用户应该意识到当前的安全并非万无一失,并且供应商需要优先考虑强大的安全性而非便利性。

## 密码管理器安全问题 近期一项研究(ethz.ch)指出,流行的基于云的密码管理器(如Bitwarden、LastPass和Dashlane)存在安全漏洞,尽管它们声称具有“零知识加密”。研究人员演示了针对Bitwarden的12次攻击,针对LastPass的7次攻击,以及针对Dashlane的6次攻击,攻击范围从针对性的保险库泄露到完整的组织安全漏洞。 核心问题在于恶意服务器可能在密钥交换过程中破坏保险库。虽然攻击需要完全控制服务器,但评论员指出这并非不可能发生。1Password发布了回应,解决了这些担忧,并且有人认为其更大的市场份额并未产生类似的报告。 许多用户提倡使用离线解决方案,如KeePass(和KeePassXC),以获得更大的控制权和安全性,但承认对于不太懂技术的用户来说存在易用性挑战。讨论强调了便利性和安全性之间的权衡,一些人更喜欢自托管解决方案或加密的本地文件。
相关文章

原文

People who regularly use online services have between 100 and 200 passwords. Very few can remember every single one. Password managers are therefore extremely helpful, allowing users to access all their passwords with just a single master password.

Most password managers are cloud based. A major advantage this offers users is the ability to access their passwords from different devices and also share them with friends and family members. Security is the most important feature of these password managers since, ultimately, users store sensitive data in these encrypted storage platforms, commonly called “vaults”. This can also include login details for online banking or credit cards. 

Most service providers therefore promote their products with the promise of “zero-knowledge encryption”. This means they assure users that their stored passwords are encrypted and even the providers themselves have “zero knowledge” of them and no access to what has been stored. “The promise is that even if someone is able to access the server, this does not pose a security risk to customers because the data is encrypted and therefore unreadable. We have now shown that this is not the case”, explains Matilda Backendal.

Backendal conducted the study together with Matteo Scarlata, Kenneth Paterson and Giovanni Torrisi from the Applied Cryptography Group at ETH Zurich. Backendal and Torrisi are currently working at the Università della Svizzera italiana in Lugano. 

Complete access to passwords 

The team conducted a study to scrutinise the security architecture of three popular password manager providers: Bitwarden, Lastpass and Dashlane. Between them, they serve around 60 million users and have a 23 per cent market share. The researchers demonstrated 12 attacks on Bitwarden, 7 on LastPass and 6 on Dashlane.

To do this, they set up their own servers that behave like a hacked password manager server. They proceeded on the assumption that, following an attack, the servers behave maliciously (malicious server threat model), and when interacting with clients, such as a web browser, they deviate arbitrarily from the expected behaviour.  

Their attacks ranged from integrity violations affecting specific, targeted user vaults to the complete compromise of all vaults within an organisation using the service. In most cases, the researchers were able to gain access to the passwords – and even make changes to them.  

All they needed to achieve this were simple interactions that users or their browsers routinely perform when using the password manager – for example, logging into the account, opening the vault, viewing passwords or synchronising data. “Due to the large amount of sensitive data they contain, password managers are likely targets for experienced hackers who are capable of penetrating the servers and launching attacks from there,” says Paterson, Professor of Computer Science at ETH Zurich. Attacks like this have already occurred in the past. 

Confusing code 

“We were surprised by the severity of the security vulnerabilities,” says Paterson. His team had already discovered similar vulnerabilities in other cloud-based services but had assumed a significantly higher standard of security for password managers due to the critical data they store. “Since end-to-end encryption is still relatively new in commercial services, it seems that no one had ever examined it in detail before.”  

Matteo Scarlata, PhD student at the Applied Cryptography Group, carried out some of the attacks. As he began to analyse how the various password managers were coded, he quickly came across some very strange code architecture. In his view, these companies are attempting to provide their customers with the most user-friendly service possible, for example offering the ability to recover passwords or share their account with family members.  

“As a result, the code becomes more complex and confusing, and it expands the potential attack surface for hackers,” Scarlata explains. Such attacks do not require particularly powerful computers or servers – just small programs capable of impersonating the server.”  

As is common with “friendly” attacks, Paterson’s team contacted the providers of the systems concerned before publishing their findings. They were given 90 days to fix their security vulnerabilities. “For the most part, the providers were cooperative and appreciative, but not all were as quick when it came to fixing the security vulnerabilities,” says Paterson.  

Discussions with the developers of these password managers showed that they are very hesitant when it comes to system updates, as they worry that their customers could lose access to their passwords and other personal data. Alongside millions of private individuals, this customer base also includes thousands of companies that entrust the providers with all of their password management. It is not difficult to imagine what would happen if they suddenly lost access to their data. Many providers therefore stick to cryptographic technologies from the 90s, even though these have long been obsolete, says Scarlata. 

Update systems with modern cryptography 

The researchers have now made concrete suggestions for how the security of these systems could be improved. Scarlata proposes updating the systems for new customers in line with the latest cryptographic standards. Existing customers could then have the choice of migrating to the new, more secure system and transferring their passwords across, or sticking with the old system – with full knowledge of the existing security vulnerabilities. 

And what can the millions of people who rely on their password manager every day do to make the most of online services? Paterson recommends choosing a password manager that is transparent about potential security vulnerabilities, undergoes external audits and, at the very least, has end-to-end encryption enable by default. 

“We want our work to help bring about change in this industry,” says Paterson. “The providers of password managers should not make false promises to their customers about security but instead communicate more clearly and precisely what security guarantees their solutions actually offer.”  

联系我们 contact @ memedata.com