10 comments

  • gruez32 minutes ago
    This feels like a case of &quot;It rather involved being on the other side of this airtight hatchway&quot;[1]. If you can read arbitrary process memory, you&#x27;re probably also in a position to just dump out the passwords by pretending to be the user in question.<p>&gt; If an attacker gains administrative access on a terminal server, they can access the memory of all logged‑on user processes.<p>If an attacker has administrative access, they can also attach a debugger to every chrome process and force it to decrypt all the passwords. The only difference this really makes is in coldboot attacks, but even then it&#x27;s still not clear whether it makes the attacker&#x27;s job slightly easier, or allows an attack that&#x27;s otherwise not possible.<p>[1] <a href="https:&#x2F;&#x2F;devblogs.microsoft.com&#x2F;oldnewthing&#x2F;20060508-22&#x2F;?p=31283" rel="nofollow">https:&#x2F;&#x2F;devblogs.microsoft.com&#x2F;oldnewthing&#x2F;20060508-22&#x2F;?p=31...</a>
    • Dwedit2 minutes ago
      Reading arbitrary process memory can be done as a standard user. No admin needed. Any Win32 program can do it. You just can&#x27;t access the memory from processes that are admin-level.
    • turtlebits19 minutes ago
      Security isn&#x27;t black and white. If i leave a post-it note of my logins on my monitor, that&#x27;s definitely less safe than in a unlocked drawer, and so on.
      • stouset11 minutes ago
        If I leave a post-it note of passwords on my monitor inside a vault to which only I have access, it’s not a big deal. That’s the point of the “airtight hatch” metaphor.
        • Someone12345 minutes ago
          Right; but in the scenario of this Tweek, you&#x27;ve invited someone untrustworthy into the vault and are then freaking out because they can see the post-it note of passwords. It is inherently irrational.<p>This issue is inherently unfixable by ANY password manager, because the process model of the underlying OS isn&#x27;t itself secure. No obfuscation will work, because the password manager itself needs to de-obfuscation it before use (and that memory too is dump-able).<p>All adding in-memory obfuscation does it make ignorant people feel better, while not moving the security needle even an inch.
    • wat100000 minutes ago
      There&#x27;s little hope of protecting against a snooper seeing the passwords you actually use, since they have to exist in plaintext at some point. But there&#x27;s no reason to expose <i>the entire password database when no passwords are even being used</i>.
    • dvt6 minutes ago
      This is 100% that case. Basically every form (like this very one I&#x27;m typing in) is held in userspace memory un-encrypted. And yet lawyers and doctors and CIA operatives all use forms to type very sensitive stuff in.<p>It would be stupid, wasteful, and overly-complex to encrypt forms just in case some malicious process somehow got ring0 access. In that case, a keylogger is likely more useful anyway. And you&#x27;re fucked even if you <i>are</i> encrypting stuff (as keys are likely also somewhere in memory[1] and they need to be—gasp—unencrypted). There&#x27;s no free lunch.<p>Stupid Twitter thread meant to rage-bait for engagement.<p>[1] They could also be on disk or on some peripheral, but still fully readable by a motivated-enough hacker.
  • kleiba229 minutes ago
    Does this tool access an Edge instance running on the same machine? Couldn&#x27;t you then just simply export all saved passwords anyway?<p><a href="https:&#x2F;&#x2F;support.microsoft.com&#x2F;en-us&#x2F;topic&#x2F;export-passwords-in-microsoft-edge-15c0b4f5-e490-4034-b699-1063bad0cc2d" rel="nofollow">https:&#x2F;&#x2F;support.microsoft.com&#x2F;en-us&#x2F;topic&#x2F;export-passwords-i...</a>
    • riedel16 minutes ago
      Password managers often go through quite some hassle to keep passwords &#x27;safe&#x27; in memory. However, I often do not get the attack model of many of those tools. Tools like keepass e.g. go through quite to register a browser plugin. But then anyone with normal user rights can extract that key from the browser and do everything with it. Also this whole &#x27;trust this browser&#x27; stuff of web apps seems strange if one e.g. can read the cookie store easily...
  • myHNAccount12328 minutes ago
    <a href="https:&#x2F;&#x2F;xcancel.com&#x2F;L1v1ng0ffTh3L4N&#x2F;status&#x2F;2051308329880719730" rel="nofollow">https:&#x2F;&#x2F;xcancel.com&#x2F;L1v1ng0ffTh3L4N&#x2F;status&#x2F;20513083298807197...</a>
  • dkenyser15 minutes ago
    Anyone have a link to the source code for this .exe? Would love to see _how_ it&#x27;s extracting them.
  • mfro33 minutes ago
    To be fair, &#x27;loads into memory&#x27; and &#x27;stores&#x27; are not the same thing.
    • saghm28 minutes ago
      The headline here says &quot;stores in memory&quot;, which sounds pretty much identical to me. Can you elaborate on what you consider the difference between &quot;loading&quot; and &quot;storing&quot; into memory?
      • mfro23 minutes ago
        When someone says passwords are ‘stored’, the assumption will always be ‘stored on disk’. ‘stores in memory’ is not an accurate representation because memory is inherently volatile and they are loaded there temporarily. Plaintext on disk is egregious, plaintext in memory is considerably less so.
  • thumbsup-_-14 minutes ago
    Its Microsoft doing Microsoft things
    • washingupliquid5 minutes ago
      Linux stores plenty of passwords in clear text in &#x2F;etc and $HOME and this is considered acceptable by most users. These same people also believe the TPM is a spy chip.
      • cwillu1 minute ago
        &gt; Linux stores plenty of passwords in plain text in &#x2F;etc<p>That&#x27;s gonna be a big ol&#x27; [CITATION NEEDED] from me, dawg.
  • WolfeReader22 minutes ago
    Please use a dedicated password manager, instead of a browser-based one. KeePass is likely the best going forward.
    • sedatk19 minutes ago
      @taviso had claimed the exact opposite: <a href="https:&#x2F;&#x2F;lock.cmpxchg8b.com&#x2F;passmgrs.html" rel="nofollow">https:&#x2F;&#x2F;lock.cmpxchg8b.com&#x2F;passmgrs.html</a><p>EDIT: Yes, he claimed that for online password managers, not keepass. I thought the argument was about password managers in general.
      • echelon_musk16 minutes ago
        Where?<p>&gt; <i>Good examples of simple and safe password managers are keepass and keepassx</i>
      • WolfeReader12 minutes ago
        Browser-based password management serves the purpose of locking users into a specific browser; I&#x27;d much rather have the freedom to switch browsers at will without the cognitive tax of <i>securely</i> moving all my creds every time I want to switch my main browser.
        • sedatk2 minutes ago
          I agree. It&#x27;s especially problematic when you use different browsers on different devices and operating systems.
      • busterarm15 minutes ago
        That&#x27;s not what that is saying. It&#x27;s saying don&#x27;t use an _online_ password manager instead of the browser one. In the very opening they state that simple implementations are great and even lists some. Then the rest of the article dives specifically into online password managers, which are something else.
        • sedatk11 minutes ago
          You&#x27;re right. Edited my comment.
    • 75central20 minutes ago
      Out of curiosity, why KeePass versus Bitwarden? I&#x27;ve been using Bitwarden for years, but if there&#x27;s a specific reason I should be using KeePass instead, I&#x27;m open to changing.
      • dcanelhas8 minutes ago
        KeePass is just an encrypted database file with UI around it for usability. You can keep the db on a USB drive, sync it through a cloud storage, e-mail it to yourself, whatever ... It&#x27;s really not that complicated. BitWarden is the above as a service, I reckon.<p>Nb. The above refers to KeePassX. No idea what the KeePass without the x is about. Naming things. So hard.
      • WolfeReader15 minutes ago
        Bitwarden has taken investor money, sadly. It&#x27;s still in good shape for the moment. But the time will come when they place profits above other needs; it&#x27;s a matter of when, not if.
    • Someone123416 minutes ago
      If it is a process, running in the same user context, with the ability to read&#x2F;dump arbitrary memory -- As the KeePass database is decrypted it would &quot;store all passwords in memory in plain text&quot; too.<p>The fix isn&#x27;t Edge Vs. Chrome. Vs KeePass Vs. Bitwarden, it is &quot;How do I have my passwords exist in a different execution context than [evil process able to read all memory]?&quot;<p>Android and iOS have an &quot;answer&quot; to this problem. Desktop OSs having all processes running side by side in the user&#x27;s execution context, do not. It is only as secure as the least secure process running.
      • WolfeReader11 minutes ago
        This makes me miss running Qubes a few years ago, and keeping BitWarden in a separate VM from everything else. I&#x27;ve never felt as secure as when I had that setup.
  • busterarm19 minutes ago
    For anyone that thinks this is an Edge-specific dunk, Chrome does not hash your passwords and they are cleartext in memory while Chrome is running (which for most users is always).
    • Someone12340 minutes ago
      Password hashes are one-directional lossy storage. If a password manager &quot;hashed your password&quot; it would be essentially deleting your password and replacing it with something else which cannot be used to log into anything. The password MUST be recoverable to plain-text to replay it to a website.<p>But you&#x27;re correct that Chrome, Firefox, Edge, Lastpass, BitWarden, even Keepass have the same issue. It is an Operating System limitation, not a password manager problem.
    • bobbiechen11 minutes ago
      This is generally true of every application that handles sensitive data. Unless you explicitly clear that memory, it&#x27;s likely to hang around forever.<p>For example, here is a 2019 writeup from KeePassXC with similar notes: <a href="https:&#x2F;&#x2F;keepassxc.org&#x2F;blog&#x2F;2019-02-21-memory-security&#x2F;" rel="nofollow">https:&#x2F;&#x2F;keepassxc.org&#x2F;blog&#x2F;2019-02-21-memory-security&#x2F;</a> - even though they explicitly clear sensitive data, there is still a window of opportunity.<p>During my time working on confidential computing, we had a variety of demos showing similar attacks against lots of different datastores, scripts, etc. That&#x27;s just how computers work and your options are very limited if this is part of your threat model (imo just confidential computing and, if you can handle the performance hit, fully-homomorphic encryption).
  • mghackerlady32 minutes ago
    Why wouldn&#x27;t it? What else would you expect from the p̶e̶o̶p̶l̶e̶ masochists who subjected us to internet explorer