Over 60 million users
On February 16, 2026, researchers from ETH Zurich and Università della Svizzera italiana published a study that challenges the security guarantees of major cloud-based password managers. The research focused on Bitwarden, LastPass, and Dashlane, which collectively have over 60 million users, and also included analysis of 1Password. By operating under a "malicious server threat model," the study found that despite promises of zero-knowledge encryption, a compromised backend server could, in many cases, trick the client-side application into revealing user secrets. The findings highlight that the practical implementation of security features can undermine theoretical cryptographic strength.
This is not a regulatory report, but a summary of academic security research. The core of the study is the malicious server threat model. This model assumes an attacker has gained complete control over the password manager's backend infrastructure. This is a powerful assumption, but one that reflects a worst-case scenario that security-conscious users and enterprises must consider, especially in light of past breaches at password manager companies.
The study's goal was to determine if the "zero-knowledge" claim—that the provider can never see your unencrypted data—holds true if the provider itself becomes malicious or is fully compromised.
The study directly examined and found vulnerabilities in:
1Password was also analyzed and fared the best, with only two theoretical and difficult-to-exploit attack scenarios identified. The vendors were notified of the findings prior to publication and are reportedly working on mitigations.
There are no direct compliance requirements for users. The onus is on the password manager vendors to address these architectural flaws. The study's findings create a set of implicit requirements for vendors wishing to make credible zero-knowledge claims:
The vendors have acknowledged the findings and are working on patches. However, fixing these architectural issues may be more complex than patching a simple bug and could require significant redesigns of their client-server protocols. Users should monitor security bulletins from their respective password manager providers for updates.
The study's findings have a significant impact on user trust. While password managers are still considered far safer than reusing passwords, this research shows that the "zero-knowledge" marketing claim is often more of an aspiration than a reality. The practical impact is that a sufficiently powerful attacker (one who can compromise the provider's servers) could potentially:
For example, the "malicious auto-enrolment" attack against Bitwarden could give an attacker full, persistent, and undetected access to a new user's vault from the moment of its creation.
This is academic research, so there are no direct penalties. However, the reputational damage to the affected vendors could be significant. Furthermore, if a future data breach were to occur by exploiting these described methods, vendors could face regulatory fines (e.g., under GDPR) and class-action lawsuits for making deceptive security claims.
For users and organizations, the guidance is nuanced:
Enabling MFA on the password manager account itself adds a critical layer of protection against unauthorized access, even if credentials are stolen.
Training users to be skeptical of unusual prompts or requests from their password manager can help them avoid falling for server-side trickery.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats