A malicious server attack: ETH Zurich investigation

About
Nieuws
Improve
A malicious server attack: ETH Zurich investigation
ETH Zurich recently identified a serious vulnerability class in popular password managers. In MindYourPass, the confidentiality of your secrets remains intact. In this article, we explain why.
Panja Sae-Ui
Co-Founder & CTO
Nieuws
Improve
A malicious server attack: ETH Zurich investigation
ETH Zurich recently identified a serious vulnerability class in popular password managers. In MindYourPass, the confidentiality of your secrets remains intact. In this article, we explain why.
Panja Sae-Ui
Co-Founder & CTO

Start making vulnerable passwords impossible today

Thank you for your request! We will contact you within 1 business day.
Please fill in all fields before submitting the form

What ETH Zurich's research has shown

In February 2026, researchers from ETH Zurich's Applied Cryptography Group published a peer reviewed paper- accepted at USENIX Security 2026 - showing that three popular password managers Bitwarden, LastPass, and Dashlane) are vulnerable to a fully compromised, malicious server. Under this threat model, an attacker controlling the server can access and even modify passwords stored in user vaults. All three store complete encrypted vaults server-side. Even with strong encryption, a malicious server can manipulate enough of the client interaction to expose or tamper with what a user decrypts — using nothing more than routine actions like logging in or syncing.

How MindYourPass is fundamentally Different

The ETH Zurich attacks work because the servers under investigation contain everything necessary to deduce secrets, except for the decryption step. MindYourPass, on the other hand, was designed from the ground up so that the servers never contain everything. No party - including MindYourPass - has sufficient information to reconstruct user secrets.

  • Passwords are never stored. Passwords are not stored anywhere - not on our servers, not in a vault. They are regenerated from a combination of factors each time the user needs them.
  • What we store is incomplete by design. We do store factors that make this password regeneration reproducible on all devices. But these factors are deliberately incomplete. By themselves, they are cryptographically worthless - they cannot be used to reconstruct a password.
  • The crucial part is only known to the user. The missing element required to complete regeneration only exists in the user's memory. Without it, what we own has no value for anyone - including us.

What we do store - and why that doesn't matter here

We want to be fully transparent about what MindYourPass stores, and why it's completely outside the scope of the ETH findings.

In addition to the regeneration factors, we store the following in an end-to-end encrypted vault, separate from the password regeneration process:

  • User names and site information - for convenience, so you don't have to remember it. They play no role in regenerating your passwords.
  • PassKey metadata (credential IDs, RPIDs) - enough to locate a passkey, but not the passkey itself. Like passwords, passkeys are generated over and over again and never stored.
  • A TOTP input factor - one of several input elements required to regenerate a TOTP seed. The seed itself is never stored.

None of this, individually or combined, is sufficient to reconstruct any of the user's secrets. What we store is always incomplete by design - the missing piece is only known to the user.

Architecture comparison

Architecture Comparison
Criterion Vault-based managers (ETH research) MindYourPass
Passwords stored on server? Yes (encrypted) No - recalculated each time
Is stored data sufficient to reconstruct secrets? Yes - if decrypted No - intentionally incomplete
Where is the missing piece? Nowhere - all data on server Only in the user's mind
Key Escrow functionality? Yes - enables recovery and sharing No - deliberately excluded
Can a malicious server expose secrets? Yes - core of the ETH finding No - incomplete data is cryptographically useless
Vulnerable to ETH Zurich attack class? Yes Structurally no

Our commitment

The ETH Zurich research is a timely reminder that architecture matters - and that "zero-knowledge" is a promise that must be backed by design, not just policy. MindYourPass was built around the principle that no single party, including ourselves, should ever hold enough information to reconstruct a user's secrets. The specific vulnerability class identified by the researchers does not compromise the confidentiality of secrets in MindYourPass.

That said, no system is without its own challenges, and we do not claim to be impenetrable. We see this research as an opportunity to reflect and improve.

Heading 1

Heading 2

Heading 3

Heading 4

Heading 5
Heading 6

Lorem ipsum by sit amet, consectetur adipiscing elit, sed do eusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Dis aute irure door in reprehenderit in voluptate velit se cillum dolore eu fugiat nulla pariatur.

“Juist de collega’s die in het begin sceptisch waren, werden later de grootste ambassadeurs,”- addsadasd

Ordered list

  1. Item 1
  2. Item 2
  3. Item 3

Unordered list

  • Item A
  • Item B
  • Item C

Text link

Bold text

Emphasis

Superscript

Subscript

Get in touch with us.

Let MindYourPass make your organization safe.

Thank you for your request! We will contact you within 1 business day.
Please fill in all fields before submitting the form
Want to read more?
See other articles
More articles
The MindYourPass Solution

Log in securely with ease.
At home and at work.

Triple-i™ improvement method

De kluisloze wachtwoordmanager van MindYourPass

Met de wachtwoordmanager van MindYourPass maak je eenvoudig al je wachtwoorden ijzersterk en uniek. De wachtwoordmanager beheert jouw wachtwoorden, waarmee jij dagelijks kunt inloggen op al je accounts. Zonder dat jij je wachtwoorden hoeft in te typen. Dat doet MindYourPass voor je.

Learn more about Triple-i™

Learn more about cybersecurity

See all articles
Nieuws
From checking to weighing: what makes BIO 2 different from BIO 1
Nieuws
More than half of municipal web applications run on US cloud infrastructure
Nieuws
Bas Hoorn: 'A good password manager makes safe behavior a matter of course'
Resource
A year of innovations: this is what we built for you in 2025