You probably can't trust your password manager if it's compromised

https://lemmy.ca/post/60541192

You probably can't trust your password manager if it's compromised - Lemmy.ca

cross-posted from: https://infosec.pub/post/42164102 [https://infosec.pub/post/42164102] > Researchers demo weaknesses affecting some of the most popular options Academics say they found a series of flaws affecting three popular password managers, all of which claim to protect user credentials in the event that their servers are compromised.…

Since the summary doesn’t say which three popular password managers:

As one of the most popular alternatives to Apple and Google’s own password managers, which together dominate the market, the researchers found Bitwarden was most susceptible to attacks, with 12 working against the open-source product. Seven distinct attacks worked against LastPass, and six succeeded in Dashlane.

Next do proton pass
So I chose the worst pick, eh?

No. Because the very nature of passwords and password managers make you immeasurably safer than not using one at all. Password managers in almost all markets detect password compromises and alert you to change them. Doing so is trivial and as long as you catch it in time, you’re much safer and harder to target than almost any other user.

Passwords are like physical locks. Its not about being unpickable or indestructible. Its mostly about raising the barrier of entry high enough that you are an unappealing target. Why would I spend days/weeks/months trying to crack the account of someone using a random string of 14 characters unique to every service and that can change their password within hours or days–when I could instead gain remote access to hundreds of other users that keep a ‘passwords.doc’ file in ~/documents with open permissions? They likely use passwords like ‘Snoopdog2004$’ so they’re easy to brute force, they won’t notice incursions, and can’t easily change passwords that are shared between multiple services.

And glosses over what it claims are the two that dominate market (combined market share of 55%) which negates their headline, since it’s likely the reader is using one of those two password managers.

Source

2024 Password Manager Industry Report and Statistics

Despite benefits, only 36% of U.S. adults use password managers. Google and Apple lead the market, while poor password habits increase security risks.

Security.org

People really use these apps? I mean…here are all my passwords? …just like that?

Hell, my kids tutor wanted my bank account to withdraw each month. I said, ‘fuck no…not unless we’re banging each other every night with a prenup!’

Your tutor asked for access… To your bank account?
What’s a metaphor?
Oh i thought something was weird lol
I hope I don’t sound like this when I’m 75
What do you do? Use one password for everything?

This is it. The most boomer-ass comment of 2026 so far.

Take this moment in, folks.

Bitwarden. Shit.
Which in turn is based off of KeePass, right? So double shit?
no, Bitwarden isn’t “based off” anything
Oh my mistake. Not sure why I thought that.

These attacks are more around the encryption and all require a fully malicious server. It sounds like Bitwarden is taking these seriously and personally I’d still strongly prefer it to any closed source solution where there could be many more unknown but undiscovered security concerns.

Using a local solution is always most secure, but imo you should first ask yourself if you trust your own security practices and whether you have sufficient hardware redundancy to be actually better. I managed to lose the private key to some Bitcoin about a decade ago due to trying to be clever with encryption and local redundant copies.

Further, with the prevalence of 2FA even if their server was somehow fully compromised as long as you use a different authenticator app than Bitwarden you’re not at major risk anyways. With how poorly the average person manages their password security this hurdle alone is likely enough to stop all but attacks targeted specifically at you as an individual.

I don’t have the self hosting maturity to share my db across my devices yet. I need to get on that.
With vault/bitwarden the client handles that sharing for you.

If it’s critical, don’t self host it. It’s not worth it.

I know people will argue; I just need something that works and that I don’t have to worry about patching.

Personal recommendation: Start with a selfhosting support software like Casa, Yuno or (my recommendation) Cloudron. Start hosting the app there with frequent backups and occasionally export into regular Bitwarden as a failsafe.

And when you are comfortable switch over to properly self hosted Vaultwarden.

Just adding: Passkeys do migitate a lot of these issues as well.

Yeah I use MFA on anything that matters.

It means my authenticator is just riddled with items but it is what it is.

Thats really disappointing. At least the selfhosted version means it would have to be a heavily targeted attack.
I don’t think it should be disappointing. Bitwarden welcomes third party security testing, especially given it is open source. The tests done were just tests, and the issues were already fixed.
Yeah, after seeing their response I’m quite satisfied. They’re one of the good guys and I hope it stays that way.
I know they’re convenient, but people should really stop using cloud-based password managers and start using local ones. I personally recommend KeepassXC.
And keepass is perfectly cloud ready by placing the kdbx file into your cloud storage and sync using webDav or similar.
Flat text file with gpg.
Breaking news, rain is wet.
Rain notifies you about being wet in making you wet. A compromised password store rarely notifies you about being compromised.
I store my passwords on a flash drive with KeepassXC. How about you compromise that server… Oh wait a minute, no server?

As long as your copy isn’t a trojan.

cybersecuritynews.com/hackers-weaponize-keepass-p…

Hackers Weaponize KeePass Password Manager to Deliver Malware & Steal Passwords

Threat actors are now targeting KeePass to spread malware and steal credentials, posing a major risk to users of this password manager.

Cyber Security News
So just get it from your repo.
Repos can get / have been hacked/malicious code injected.
So can anything. Then don’t use the fucking internet. What the fuck do you want to hear?
I got it from my system package manager. I didn’t download it from the web or anything. Sudo apt-get install keepassxc. I also use keepassDX on my phone, pulled from the fdroid repository.
Pass: The Standard Unix Password Manager

Pass is the standard unix password manager, a lightweight password manager that uses GPG and Git for Linux, BSD, and Mac OS X.

This is about to go belly up IIRC. openPGP is infighting, splitting into two projects, password-store hasn’t been updated in a decade. It’ll lose compatibility.
But currently all my passwords are in password store. Looking into alternatives. I like the idea of keepass because it’s still local. But I also pay for proton, so might use theirs. They weren’t susceptible in the recent attacks
I suggest KeepassXC, I like it. Can use it with TOTP too
Yess!
I store the keepass vault on my nextcloud
On iOS and macOS, I use Strongbox pro (one time purchase), as it integrates beautifully into the apple ecosystem using its APIs.
On linux and windows free KeepassXC with browser plug-ins
On Android I use the free keePassDX which, like strongbox, uses the android APIs for passwords
Same. My password database never touches a server I don’t own and my keyfile is manually copied between my devices and stored separately from the database file.
Keepass + Syncthing for cloudless sync between devices. Dreamteam.
Or if you have like $5/mo to spend on a VPS, self-host vaultwarden. It’s compatible with the bitwarden apps and browser plugins.
Security through transparency: ETH Zurich audits Bitwarden cryptography against malicious server scenarios | Bitwarden

A new in-depth security report is available, continuing the Bitwarden commitment to transparency and trusted open source security. The audit, conducted by the prestigious Applied Cryptography Group at ETH Zurich, proactively tested Bitwarden core cryptography operations against the hypothetical event of a maliciously compromised server. All issues identified in the report have been addressed by the Bitwarden team and have been included in the attached cryptography report for full transparency.

Bitwarden

Yes, although it sounds like they haven’t finished fixing some of them:

All issues have been addressed by Bitwarden. Seven of which have been resolved or are in active remediation by the Bitwarden team. The remaining three issues have been accepted as intentional design decisions necessary for product functionality.

Edit: There’s more information about the specific threats and remediation steps in the PDF report linked at the end of the Bitwarden blog post:

bitwarden.com/…/pwmgr_paper__1_-combinedÂ__1_.pdf

Looking through, it seems like for the most part these are very niche and/or require the user to be using SSO or enterprise recovery options and/or try to change and rotate keys or resync often. I think few people using this for personal would be interacting with that attack surface or accepting organizational invites, but it is serious for organizations (probably why they’re trying quickly to address this).

Honestly I think a server being incognito controlled and undetected in bitwardens fleet while also performing these attacks is, unlikely? Certainly less likely than passwords being stolen from individual site hacks or probably even banks. Like at that point, it would just be easier to do these types of manipulations directly on bank accounts or crypto wallets or email accounts than here, but then again, if you crack a wallet like this you get theoretically all the goodies to those too I suppose, for a possibly short time (assuming the user wasn’t using 2FA that wasn’t email based as well).

Not to mitigate these issues. They need to fix them, just trying to ascertain how severe and if individual users should have much cause for concern.

Regarding a malicious server acting under Bitwarden’s fleet: As I see it, the most vulnerable target would be an organization’s self-hosted Bitwarden server.
Ah, great. Carrying on…
Anyone got a good suggestion for a self hosted option? Ideally one that has a good iOS app and a web interface.
You can self-host Bitwarden. Or there’s the Vaultwarden implementation of the Bitwarden API.
Host your own open source password manager | Bitwarden

You can quickly deploy Bitwarden to your own server on Linux, macOS, or Windows using Docker containers.

Bitwarden
Built on rust you say???
I did not, in fact, say. But they did say that, yes.
Web interface and secure are two things.