
Server-side attacks undermine password managers’ ‘zero-knowledge’ assurances
A team from ETH Zurich and USI Lugano shows that provider infrastructure control can defeat many commercial “zero-knowledge” claims, allowing attackers to read or modify vaults when specific features are active. Their analysis produced 25 distinct attacks that target real-world workflows such as account recovery, group sharing, and backward compatibility.
The researchers reverse‑engineered clients and protocol flows for Bitwarden, LastPass, and Dashlane, finding a recurring weakness: critical server-supplied key material and policy data are not authenticated by the client. This allows an adversary who controls the server to substitute attacker-generated public keys or alter recovery modes, producing ciphertext that the attacker can decrypt with the corresponding private key.
Concrete chains include a group-enrollment exploit that replaces a group public key to obtain a new user’s symmetric key, a superadmin-key replacement that targets LastPass Teams flows, and a sharing-channel manipulation that exposes shared-item secrets in Dashlane. Several attacks exploit item-level encryption malleability, where different fields use the same key and ciphertexts can be swapped to force clients to reveal sensitive fields.
The paper also leverages legacy support decisions: clients accept older ciphertext formats to avoid locking out unpatched users, and that backward compatibility enables downgrade and padding-oracle attacks that can reveal plaintext produced under weaker modes such as CBC. One Dashlane chain requires roughly 125 oracle queries to recover a vault item under the crafted scenario.
Another class of high‑impact flaws targets key‑escrow and recovery. When recovery is enabled, clients sometimes send recovery ciphertexts encrypted to organization or admin keys fetched from the server; if those public keys are spoofed by an attacker, the recovery ciphertext becomes decryptable by the adversary, yielding the user key and full vault access.
The researchers further show an unauthenticated server-supplied iteration count for client-side password hashing; clients honor the server-provided count. In tested cases the default parameter can be replaced (from 600,000 iterations down to 2), dramatically reducing the computational work needed to brute-force a master password when an attacker controls the server side of the protocol.
The study emphasizes that full server compromise is a high bar, but plausible against well-resourced adversaries via supply-chain, insider, or targeted breaches. The researchers note the attacks are often feature‑gated; disabling autorecovery, minimizing legacy modes, and authenticating server-supplied keys would block many chains.
Vendors have begun remediations and pushed updates after receiving disclosures; the affected firms emphasize routine audits, red teaming, and bug bounty programs. Still, the paper calls for design changes that shift critical trust decisions into the client and for independent evaluations that include malicious‑server threat models.
This work reframes “zero‑knowledge encryption” as a spectrum rather than a binary guarantee: marketing labels do not replace protocol-level guarantees such as authenticated key distribution, per‑field key separation, and mandatory authenticated encryption. For administrators and security teams, the takeaway is to treat password manager servers as high‑value targets and to limit features that increase server‑driven trust.
- 94 million US adults reported using password managers (≈36% of US adults).
- Top three vendors analyzed serve ≈60 million users collectively.
- Researchers created 25 distinct exploit chains.
- Hashing iteration parameter observed: 600,000 → 2 (server-provided value).
- Dashlane padding-oracle estimate: ≈125 queries to recover ciphertext under the crafted attack.
Read Our Expert Analysis
Create an account or login for free to unlock our expert analysis and key takeaways for this development.
By continuing, you agree to receive marketing communications and our weekly newsletter. You can opt-out at any time.
Recommended for you

Fortinet pushes emergency patches after FortiCloud SSO zero‑day lets attackers cross account boundaries
Fortinet issued emergency fixes after attackers exploited a FortiCloud single‑sign‑on authentication bypass (CVE‑2026‑24858) to access devices across customer accounts; U.S. cyber authorities added the flaw to their Known Exploited Vulnerabilities list and set an urgent remediation date for federal agencies. The incident is part of a wider trend of rapid in‑the‑wild exploitation that compresses the window for defenders to patch and perform operational checks.
Massive 149M credential trove exposes risks from infostealer malware to crypto and government accounts
A researcher found a publicly accessible collection of roughly 149 million stolen logins harvested by credential-stealing malware, including hundreds of thousands tied to major crypto platforms and numerous government-related accounts. The exposure stems from infected end-user devices rather than platform breaches, but it raises urgent questions about account hygiene, phishing risk, and detection across the crypto and social-media ecosystems.
Six Vulnerabilities in Major JavaScript Package Managers Expose Projects to Supply-Chain RCE
Security firm Koi disclosed six vulnerabilities across NPM, PNPM, VLT, and Bun that let attackers bypass common install-time protections and potentially achieve remote code execution. PNPM, VLT and Bun issued fixes quickly while NPM declined to change the behavior, leaving many projects exposed if they rely on Git or tarball dependencies without added protections.
Critical OpenClaw Flaw Enabled Remote Hijack Through Malicious Web Page
A newly disclosed OpenClaw vulnerability (CVE-2026-25253) let a single malicious webpage steal a browser-exposed token and escalate it into full gateway access and host command execution; OpenClaw released a fix in 2026.1.29. Independent scans and research also found large-scale operational exposure—including hundreds of internet-reachable admin interfaces, unmoderated Moltbook skill posts with hidden prompt‑injection fragments, and separate misconfigurations that leaked millions of API tokens and tens of thousands of emails—so operators must patch, revoke keys, inventory reachable instances, and tighten access and content‑distribution controls immediately.
Mandiant Publishes Precomputed Tables That Slash NTLMv1 Crack Time to ~12 Hours
Cybersecurity firm Mandiant released precomputed hash tables that enable attackers to recover weak NTLMv1-derived credentials in roughly 12 hours. The release highlights persistent use of an obsolete protocol and is intended to spur organizations to disable Net-NTLMv1 and adopt modern authentication.
Machine identities missing from ransomware playbooks
Enterprise ransomware playbooks commonly treat credential resets as a human-only control, leaving service accounts, API keys, tokens and certificates intact — a blind spot that accelerates lateral movement and drives recovery costs. Market shifts toward targeted, disruption-focused extortion and faster weaponization via agentic AI make that omission more dangerous: defenders must pair machine-identity governance with identity-first detection and quicker containment to blunt modern ransomware economics.

Ledger Flags MediaTek Secure‑Boot Flaw That Exposes Android Wallet Secrets
Ledger's Donjon team disclosed a MediaTek firmware weakness that can let an attacker with physical access extract PINs and private keys from affected Android phones in under a minute. The issue may touch roughly 25% of devices using MediaTek chips and demands immediate firmware updates from vendors and operators.
Moonlock Lab: ClickFix Campaigns Leverage Fake VCs and Extension Hijack
Researchers link a coordinated ClickFix-style campaign that combines professional-identity impersonation with hijacked browser extensions to trick victims into pasting and executing clipboard payloads; the delivery chain has been observed installing a Python RAT on selected enterprise hosts and affected an estimated 7,000 extension users. The episode highlights converging supply‑chain and social‑engineering playbooks — from fake VC recruiting pages to crash‑then‑paste extension tricks — and calls for stronger extension vetting, developer-account controls and clipboard/shell telemetry.