LingVo.club
Level
Study finds flaws in cloud password managers — Level B2 — a combination combination lock attached to a fence

Study finds flaws in cloud password managersCEFR B2

24 Feb 2026

Adapted from ETH Zurich, Futurity CC BY 4.0

Photo by Stan Hutter, Unsplash

Level B2 – Upper-intermediate
5 min
299 words

Researchers from the Applied Cryptography Group at ETH Zurich analysed three popular cloud-based password managers—Bitwarden, LastPass, and Dashlane. The team, composed of Matilda Backendal, Matteo Scarlata, Kenneth Paterson and Giovanni Torrisi, tested what happens if a server is compromised and acts maliciously. They set up servers that behaved like hacked servers and assumed a malicious-server threat model. The researchers demonstrated 12 attacks on Bitwarden, 7 on LastPass, and 6 on Dashlane; the attacks ranged from targeting individual user vaults to fully compromising all vaults in an organisation. In many cases the attackers could access users' passwords and sometimes change them. All attacks used simple user actions such as logging in, opening the vault, viewing passwords or synchronising data.

The team said they were surprised by the severity of the vulnerabilities. Scarlata pointed to unusual code architecture and said efforts to add user-friendly features, like password recovery and sharing, made the code more complex and increased the attack surface. The researchers also noted that many providers still rely on cryptographic technologies from the 1990s. Paterson warned that password managers are likely targets for experienced hackers and that similar attacks have occurred in the past. Most providers were cooperative after disclosure, but not all acted quickly, and developers worry that some updates could cause customers to lose access to their data.

The researchers followed common responsible-disclosure practice and contacted the providers before publishing, giving the companies 90 days to fix the issues. Their recommendations include:

  • Update systems for new customers and offer existing customers a choice to migrate.
  • Be transparent about security and development plans.
  • Prefer managers that undergo external audits and enable end-to-end encryption by default.

Paterson said, "We want our work to help bring about change in this industry." Source: ETH Zurich.

Difficult words

  • compromiseto take control of a computer or server
    compromised
  • maliciouslyin a harmful or intentionally bad way
  • vaulta secure digital storage place for passwords
    vaults
  • vulnerabilitya weakness that attackers can exploit
    vulnerabilities
  • attack surfaceall parts that an attacker could target
  • synchroniseupdating data to match across devices
    synchronising
  • migratemove accounts or data to a new system
  • auditan independent review of security and code
    audits
  • end-to-end encryptiondata protection where only users can read content

Tip: hover, focus or tap highlighted words in the article to see quick definitions while you read or listen.

Discussion questions

  • What risks do users face if a cloud password manager's server is compromised? Give examples from the article.
  • How should password manager providers balance adding user-friendly features with maintaining strong security?
  • Would you prefer a password manager that enables end-to-end encryption by default? Why or why not?

Related articles

Why Rechargeable Batteries Lose Performance — Level B2
20 Dec 2025

Why Rechargeable Batteries Lose Performance

Researchers found that repeated charging and discharging makes batteries expand and contract, causing tiny shape changes and stress. This “chemomechanical degradation” and spreading strain reduce performance and shorten battery life, and imaging revealed how it happens.