{"id":20634,"date":"2023-01-31T19:51:38","date_gmt":"2023-01-31T15:51:38","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/how-secure-is-your-password-manager\/20634\/"},"modified":"2023-01-31T19:51:38","modified_gmt":"2023-01-31T15:51:38","slug":"how-secure-is-your-password-manager","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/how-secure-is-your-password-manager\/20634\/","title":{"rendered":"How secure is your password manager?"},"content":{"rendered":"<p>This past year we saw a flurry of news reports about leaks of personal data from various online services and even from popular password managers. If you use a digital vault, when you read about such a data leak, you\u2019ll probably start imagining a nightmare scenario: attackers have accessed all your accounts whose passwords are stored in your password manager.<\/p>\n<p>How justified are these fears? Using the example of <a href=\"https:\/\/me-en.kaspersky.com\/password-manager?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">Kaspersky Password Manager<\/a>, we\u2019ll tell you how the multiple layers of defense of password managers work, and what you can do to make them stronger.<\/p>\n<h2>General principles<\/h2>\n<p>To start, let\u2019s review why password managers are a good idea. The number of internet services we use is constantly growing, and that means that we\u2019re entering a lot of usernames and passwords. It\u2019s hard to remember them, but writing them down in random places is risky. The obvious solution is to save all your login credentials in one secure place, and then lock that vault with a single key. Then you\u2019ll only need to remember one main password.<\/p>\n<p>When you first activate <a href=\"https:\/\/me-en.kaspersky.com\/password-manager?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">Kaspersky Password Manager<\/a>, it prompts you to create a main password that you\u2019ll use to open your digital vault. Then you can enter in this vault the data for each internet service you use: URL, username and password. You can do this manually, or you can set up a password manager browser extension and use a special command to transfer all the passwords saved in the browser to the vault. Besides passwords, you may add other personal documents to the vault, e.g., ID scan, insurance data, bank card data and important photos.<\/p>\n<p>When you need to visit a website, you open the vault, and then you can either manually copy the data you need into the login form, or allow the password manager to autofill the saved login credentials for the website. After that, all you need do is lock the vault.<\/p>\n<h2>Digital vault and self-locking<\/h2>\n<p>Now let\u2019s look at the protection mechanisms. The vault file is encrypted using a symmetric key algorithm based on the Advanced Encryption Standard (AES-256), which is commonly used around the world to protect confidential data. To access the vault, you use a key based on your main password. If the password is strong, attackers would need a lot of time to crack the cipher without the key.<\/p>\n<p>Also, <a href=\"https:\/\/me-en.kaspersky.com\/password-manager?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">our password manager<\/a> automatically locks the vault after the user is inactive for a certain length of time. If an attacker happens to get hold of your device and manages to bypass the operating system\u2019s protection and reach the vault file, they won\u2019t be able to read what\u2019s in it if they don\u2019t have the main password.<\/p>\n<p>But it\u2019s up to you to configure the self-locker. The default setting in the app might not lock the vault until after a rather long period of inactivity. But if you\u2019re in the habit of using a laptop or smartphone in a location that may not be completely safe, you can configure the self-locking to kick in after a minute.<\/p>\n<p>There\u2019s another potential loophole though: if an attacker has planted a Trojan or used another method to install a remote-access protocol on your computer, they may try to extract passwords from the vault while you\u2019re logged in to it. In 2015, such a hacker tool was created for the <a href=\"https:\/\/arstechnica.com\/information-technology\/2015\/11\/hacking-tool-swipes-encrypted-credentials-from-password-manager\/\" target=\"_blank\" rel=\"nofollow noopener\">KeePass<\/a> Password manager. It decrypted and stored as a separate file an entire archive with passwords that was running on a computer with an open instance of KeePass.<\/p>\n<p>However, <a href=\"https:\/\/me-en.kaspersky.com\/password-manager?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">Kaspersky Password Manager<\/a> is typically used along with the <a href=\"https:\/\/me-en.kaspersky.com\/premium?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">antivirus solutions by Kaspersky<\/a>, and that makes it much less likely that a password manager will run on an infected computer.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-generic\">\n<h2>Zero knowledge<\/h2>\n<p>The encrypted file with passwords can be saved not only on your device but also in Kaspersky\u2019s cloud infrastructure \u2014 this allows you to use the vault from different devices, including home computers and mobile phones. A special option in the settings enables data syncing across all your devices with the installed <a href=\"https:\/\/me-en.kaspersky.com\/password-manager?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">Kaspersky Password Manager<\/a>. You can also use the web version of the password manager from any device through the <a href=\"https:\/\/my.kaspersky.com\/\" target=\"_blank\" rel=\"noopener nofollow\">My Kaspersky<\/a> website.<\/p>\n<p>How likely is a data leak if you\u2019re using cloud storage? First, it\u2019s important to understand that we\u2019re operating on the zero-knowledge principle. This means that your password vault is as encrypted for Kaspersky as it is for everyone else. Kaspersky developers won\u2019t be able to read the file \u2014 only someone who knows the main password can open it.<\/p>\n<p>Many \u2014 but not all \u2014 of today\u2019s services that store passwords and other secrets adhere to a similar principle. So, if you see a news report about a data leak from a cloud storage service, don\u2019t panic immediately: it doesn\u2019t necessarily mean that the attackers were able to decrypt the stolen data. This sort of breach is like stealing an armed safe from a bank without having the combination to the lock.<\/p>\n<p>In this case, the combination is your main password. Here\u2019s another important security principle: <a href=\"https:\/\/me-en.kaspersky.com\/password-manager?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">Kaspersky Password Manager<\/a> doesn\u2019t save your main password on your devices or in the cloud. Even if a hacker accesses your computer or the cloud storage service, they won\u2019t be able to steal your main password from the product itself. Only you know this password.<\/p>\n<h2>A strong main password<\/h2>\n<p>However, a leak of an encrypted file with passwords can also create problems. Once attackers swipe a vault, they may try to hack it.<\/p>\n<p>There are <strong>two principal attack methods<\/strong>. The <strong>first<\/strong> is brute force. In general, this is very time consuming. If your password is made up of a dozen random characters and includes both lowercase and capital letters, numbers and special characters, brute forcing all the combinations takes more than a sextillion operations \u2014 that\u2019s\u2026 a whole number with 21 figures folks!<\/p>\n<p>But if you had decided to make your life easier and used a weak password \u2014 such as a single word or a simple combination of numbers like \u201c123456\u201d \u2014 the automatic scanner will pick it out in less than a second because in this case the brute forcing is based not on individual symbols but on a dictionary of popular combinations. Despite this, to this day many users pick dictionary passwords (combinations of symbols that have long been in the dictionaries of hackers\u2019 scanners).<\/p>\n<p>Users of the password manager <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/lastpass-hackers-stole-customer-vault-data-in-cloud-storage-breach\/\" target=\"_blank\" rel=\"nofollow noopener\">LastPass <\/a>were warned about this potential problem in December 2022. When the account of a LastPass developer was hacked, the attackers gained access to the cloud-hosting the company uses. Among other data, the attackers got hold of backups of users\u2019 vault passwords. The company told users that if they followed all the recommendations to create a strong and unique main password, they wouldn\u2019t have anything to worry about because \u201cit would take millions of years\u201d to brute force such a password. People who used weaker passwords were advised to change them immediately.<\/p>\n<p>Fortunately, many password managers, including <a href=\"https:\/\/me-en.kaspersky.com\/password-manager?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">Kaspersky Password Manager<\/a>, now automatically check the strength of your main password. If it\u2019s weak or only of medium strength, the password manager gives you a warning and you sure should heed it.<\/p>\n<h2>Unique main password<\/h2>\n<p>The <strong>second hacking method<\/strong> counts on the fact that people often use the same login credentials for different internet services. If one of the services is breached, attackers will automatically brute force the username and password combinations in other services in an attack known as \u201ccredential stuffing\u201d. This kind of attack is often successful.<\/p>\n<p>Users of <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/nortonlifelock-warns-that-hackers-breached-password-manager-accounts\/\" target=\"_blank\" rel=\"nofollow noopener\">Norton Password Manager<\/a> were warned about this kind of attack in the first weeks of this year. The company NortonLifeLock (formerly known as Symantec) announced that there were no breaches of its infrastructure. But in early December 2022, mass attempts to enter Norton Password Manager accounts using passwords that hackers had stolen because of a breach on another service were documented. Investigations by NortonLifeLock found that the hackers were able to use this attack to access the accounts of some of its customers.<\/p>\n<p>The obvious lesson from this story is that you shouldn\u2019t use the same password for different accounts. As for technical ways to protect yourself from these kinds of attacks, <a href=\"https:\/\/me-en.kaspersky.com\/password-manager?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">Kaspersky Password Manager<\/a> can perform two important checks of your password database\u2026<\/p>\n<p>First, it checks for uniqueness: the app warns you if one of your saved passwords is being used in multiple accounts.<\/p>\n<p>Second, our password manager checks whether your passwords are in a database of breaches. To perform this password-check securely, it uses the SHA-256 cryptographic hash algorithm. This means that the app doesn\u2019t send the passwords themselves to be checked; rather, it calculates a checksum for each password and compares these hashes to the checksums in the database of compromised passwords. If the checksums match, the app warns you that the password is compromised, and you should change it.<\/p>\n<p>But remember that these checks are done only with passwords you are saving in the vault. It\u2019s up to you to make sure that the main password is unique: you\u2019re the only one who knows it and it should be different from your other passwords.<\/p>\n<h2>Memorable main password<\/h2>\n<p>There are other ways to leak main passwords \u2014 and this is where the dreaded human factor comes into play. For example, some people note their main password in a place where it can be stolen, such as in an unencrypted file on their desktop or on a Post-It they stick on their office wall.<\/p>\n<p>Instead of writing it down, try to remember it. It\u2019s true that security rules say that a password should be long and complicated \u2014 sometimes we\u2019re even prompted to generate a random combination of 12 to 16 characters. It\u2019s hard to remember a password like that. That\u2019s why many people try to use simpler passwords, and then they become targets of hacks.<\/p>\n<p>So how do you make your main password both strong and memorable? A good strategy is to come up with a password based on three or four secret words. For example, you can take the name of the city where you had the best vacation of your life, tack on the name of the best bar you went to on that vacation, and then add the name and number of cocktails you drank. A password like that will be long and unique, as well as easy to remember \u2014 that is, of course, if you <span style=\"text-decoration: line-through\">didn\u2019t have too many cocktails and<\/span> still remember all those facts separately.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kpm-download\">\n","protected":false},"excerpt":{"rendered":"<p>We look at how secure password managers are against hacks, and how to protect your passwords as much as possible.<\/p>\n","protected":false},"author":2497,"featured_media":20635,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1225,7,1226,9],"tags":[1021,405,187,43],"class_list":{"0":"post-20634","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-privacy","8":"category-products","9":"category-technology","10":"category-tips","11":"tag-kaspersky-password-manager","12":"tag-password-manager","13":"tag-passwords","14":"tag-privacy"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/how-secure-is-your-password-manager\/20634\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/how-secure-is-your-password-manager\/25138\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/how-secure-is-your-password-manager\/10405\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/how-secure-is-your-password-manager\/27769\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/how-secure-is-your-password-manager\/25470\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/how-secure-is-your-password-manager\/25854\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/how-secure-is-your-password-manager\/28367\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/how-secure-is-your-password-manager\/27577\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/how-secure-is-your-password-manager\/34606\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/how-secure-is-your-password-manager\/11247\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/how-secure-is-your-password-manager\/47034\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/how-secure-is-your-password-manager\/20091\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/how-secure-is-your-password-manager\/20722\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/how-secure-is-your-password-manager\/29725\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/how-secure-is-your-password-manager\/33192\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/how-secure-is-your-password-manager\/25813\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/how-secure-is-your-password-manager\/31511\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/how-secure-is-your-password-manager\/31224\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/passwords\/","name":"passwords"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/20634","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2497"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=20634"}],"version-history":[{"count":0,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/20634\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/20635"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=20634"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=20634"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=20634"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}