{"id":21537,"date":"2023-08-15T11:00:32","date_gmt":"2023-08-15T07:00:32","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/?p=21537"},"modified":"2023-08-14T16:56:13","modified_gmt":"2023-08-14T12:56:13","slug":"how-to-store-passwords-securely","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/how-to-store-passwords-securely\/21537\/","title":{"rendered":"How to store passwords securely"},"content":{"rendered":"<p>Browser-stored passwords save you from having to re-enter them each time, which is a real time-saver. But how safe is it? This post explores three reasons you shouldn\u2019t store passwords in your browser, and why you should use a much more secure storage method: a password manager.<\/p>\n<h2>1. Password stealers<\/h2>\n<p>The core problem with storing passwords in browsers is that they sacrifice security for usability. This holds true for at least the three most popular browsers: Google Chrome, Mozilla Firefox, and Microsoft Edge, all of which store user passwords in a highly insecure way.<\/p>\n<p>The reason is that all browsers store passwords in a very predictable place, in a folder whose path is no secret to anyone. And although the passwords themselves are encrypted, the encryption key is stored close by and readily accessible. Armed with this key, an attacker can decrypt and steal passwords. A farcical situation: the door appears to be securely locked, but the key is under the doormat, and the whole world knows it.<\/p>\n<p>In fact, browsers use this state of affairs to compete with each other: to make it easier for users to switch, they often offer to import all saved data from the old browser, including stored passwords.<\/p>\n<p>Any guesses who else is using this feature? That\u2019s right. There is an entire class of malware (appropriately called <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/trojan-psw-psw-password-stealing-ware\/\" target=\"_blank\" rel=\"noopener\">password stealers<\/a>) dedicated to credential theft. This malware sifts through folders known to contain browser-stored passwords, finds the key under the doormat, then decrypts the passwords and uploads the loot to the cybercriminals\u2019 server. Later, these passwords are usually databased and sold in bulk on the dark web to other crooks who use them to hijack accounts (narrow specialization has long been the norm in the cybercriminal world).<\/p>\n<p>To understand how easy it is to steal passwords stored in a browser, we recommend watching a demo video that clearly shows how to <a href=\"https:\/\/fractionalciso.com\/browser-password-managers-flawed-security-by-design\/\" target=\"_blank\" rel=\"nofollow noopener\">quickly extract passwords from Chrome, Firefox, and Edge<\/a> using nothing more than a Python script.<\/p>\n<div id=\"attachment_48807\" style=\"width: 1362px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2023\/08\/14164513\/why-it-is-not-safe-to-store-passwords-in-browsers-01.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-48807\" class=\"size-full wp-image-48807\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2023\/08\/14164513\/why-it-is-not-safe-to-store-passwords-in-browsers-01.jpg\" alt=\"Extracting passwords from Google Chrome, Mozilla Firefox, and Microsoft Edge\" width=\"1352\" height=\"725\"><\/a><p id=\"caption-attachment-48807\" class=\"wp-caption-text\">Demonstration of how to extract passwords stored in Google Chrome, Mozilla Firefox, and Microsoft Edge. <a href=\"https:\/\/fractionalciso.com\/browser-password-managers-flawed-security-by-design\/\" target=\"_blank\" rel=\"nofollow noopener\">(Source)<\/a><\/p><\/div>\n<h2>2. Physical access to the computer<\/h2>\n<p>It\u2019s not just specially trained malware that can get up to this sort of mischief, but anyone with physical access to your computer. And no sophisticated hacking skills are required \u2013 scripts for exfiltrating browser-stored passwords are readily available online. All that is required is to run them.<\/p>\n<p>Even an overly curious relative or work colleague could do this if you leave your computer unlocked. Or a hacker visiting your office on a scouting mission. Basically, anyone. The important point is that all your passwords stored in the browser will end up in potentially hostile hands.<\/p>\n<p>And even if the intruder doesn\u2019t have the right script to extract passwords from the browser-saved file, they can scour the settings for the list of sites for which passwords are stored, and then log in to one of them to read your correspondence, for example, or find out other secrets about you.<\/p>\n<p>The world\u2019s most popular browser (Google Chrome, in case you didn\u2019t know) doesn\u2019t even have a basic mechanism to prevent such actions. And while the Firefox developers were good enough to let users protect saved passwords with a primary password, they left this option disabled by default. The primary password must be explicitly enabled and configured, and it is unlikely that many Firefox users even know about it.<\/p>\n<h2>3. Browser account hijacking<\/h2>\n<p>The following problem is common to all browsers that allow users, <em>for their convenience<\/em>, to create an account to synchronize browsers on different devices. This means that bookmarks, browser sessions, extensions, settings, as well as saved passwords are all synchronized and stored in the cloud. And if a hacker gets inside your browser account, all they have to do is log in on another computer using the same account. Then all your accounts whose passwords are stored in the browser \u2013 from social networks to online banks \u2013 are there for the taking.<\/p>\n<h2>Why a password manager beats a browser<\/h2>\n<p>Like browsers, <a href=\"https:\/\/me-en.kaspersky.com\/password-manager?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">Kaspersky Password Manager<\/a> remembers your credentials and lets you auto-populate them when logging in to websites. But unlike browser developers, we don\u2019t compromise on security. In our password manager, the primary password is used by default and cannot be disabled \u2013 <em>all<\/em> your saved passwords are protected at <em>all<\/em> times. So even if someone gains physical access to your computer, they will not be able to simply log in to sites using the credentials stored in the manager. To do that, they would need the primary password, which no one but you knows (unless you stuck it to your screen on a sticky note).<\/p>\n<p>Another advantage of <a href=\"https:\/\/me-en.kaspersky.com\/password-manager?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">Kaspersky Password Manager<\/a> is, of course, that all passwords are stored only in encrypted form. And, crucially, we don\u2019t keep the decryption key \u201cunder a doormat\u201d. The encryption key is generated on the fly using the AES-256 algorithm on the basis of the primary password, which allows us not to store it at all. Anywhere. Ever. So even if a stealer manages to get onto your computer, it won\u2019t be able to steal anything \u2013 all your passwords are securely encrypted. Incidentally, if you use <a href=\"https:\/\/me-en.kaspersky.com\/password-manager?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">Kaspersky Password Manager<\/a> as part of <a href=\"https:\/\/me-en.kaspersky.com\/premium?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">Kaspersky Premium<\/a>, we won\u2019t even let the malware in.<\/p>\n<p>One last thing. Naturally, we use the cloud to synchronize passwords between devices \u2013 all your passwords are linked to your <a href=\"https:\/\/my.kaspersky.com\/\" target=\"_blank\" rel=\"noopener nofollow\">My Kaspersky<\/a> account. But even if an intruder were to somehow gain access to this account, your passwords stored in <a href=\"https:\/\/me-en.kaspersky.com\/password-manager?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">Kaspersky Password Manager<\/a> would still be perfectly safe. That\u2019s because in the cloud they are stored exclusively in encrypted form, and the decryption key is generated on the basis of the primary password, which only you know and without which attackers are toothless.<\/p>\n<p>We\u2019ve also recently updated <a href=\"https:\/\/me-en.kaspersky.com\/password-manager?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">Kaspersky Password Manager<\/a> to support the Opera and Opera GX browsers, which continue to win over new users. That means we now support all the most popular browsers: Chrome (and Chromium-based browsers), Safari, Firefox, Edge, and Opera.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kpm-download\">\n","protected":false},"excerpt":{"rendered":"<p>Where to store credentials: browser or password manager? The latter, of course. Here\u2019s why.<\/p>\n","protected":false},"author":2747,"featured_media":21539,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[7,9],"tags":[1047,1636,16,22,1021,1183,405,187,499,97],"class_list":{"0":"post-21537","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-products","8":"category-tips","9":"tag-2fa","10":"tag-browsers","11":"tag-chrome","12":"tag-google","13":"tag-kaspersky-password-manager","14":"tag-leaks","15":"tag-password-manager","16":"tag-passwords","17":"tag-products-2","18":"tag-security-2"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/how-to-store-passwords-securely\/21537\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/how-to-store-passwords-securely\/26075\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/how-to-store-passwords-securely\/10950\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/how-to-store-passwords-securely\/26631\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/how-to-store-passwords-securely\/29106\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/how-to-store-passwords-securely\/27972\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/how-to-store-passwords-securely\/11684\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/how-to-store-passwords-securely\/20917\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/how-to-store-passwords-securely\/21696\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/how-to-store-passwords-securely\/30389\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/how-to-store-passwords-securely\/34558\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/how-to-store-passwords-securely\/28882\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/products-2\/","name":"products"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/21537","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2747"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=21537"}],"version-history":[{"count":2,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/21537\/revisions"}],"predecessor-version":[{"id":21540,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/21537\/revisions\/21540"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/21539"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=21537"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=21537"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=21537"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}