Study Finds A Simple Way To Exploit Browser Password Managers

The password managers built into popular browsers like Google Chrome and Mozilla Firefox can be exploited by a third-party script embedded into a page, and potentially give third parties users' passwords, if they manage to sneak such a script into a given page. An example script is hosted by tech blog Freedom To Tinker where the webmaster has set up a demo page that asks users for a fake email address and password, and can then sniff those details using the script in question and show them to the user on the page. This exploit works across a range of browsers with very little variation.

The exploit can steal passwords, but across a sample of 50,000 sites, none were found to be doing that. Instead, users were being tracked on many of these sites, with unique tracking data being collected and sent to unknown parties. This particular script is just one example of all of the possible ways that browsers' built-in password managers can be exploited, though it should be noted that it and many others don't affect third-party password managers. 1Password, for example, specifically blocks this type of attack by only filling in email and password fields when a user asks it to, rather than filling them in automatically upon a page loading. Thus far, most consumer-grade browsers have been reluctant to implement similar behaviors, leaving them vulnerable to scripts like this one.

Password security is one of the most important ways for users to protect themselves on the modern internet, and being aware of security risks like this one is a big part of that. There are many other ways that a user's data can be compromised. This script attacks browser password managers on a fairly deep level, which means that there could be other scripts out there that act in a similar fashion. There are numerous exploits for Windows, Linux, Mac, and mobile devices that use system software vulnerabilities in tandem with special software that can be pushed on a user unwittingly or bundled with software that a user actually wants. Even with users becoming more aware of security risks online and software and hardware makers bolstering security on their end, users should keep in mind that there is no way to ever truly be completely safe.

Copyright ©2019 Android Headlines. All Rights Reserved
This post may contain affiliate links. See our privacy policy for more information.
You May Like These
More Like This:
About the Author
2018/10/Daniel-Fuller-2018.jpg

Daniel Fuller

Senior Staff Writer
Daniel has been writing for Android Headlines since 2015, and is one of the site's Senior Staff Writers. He's been living the Android life since 2010, and has been interested in technology of all sorts since childhood. His personal, educational and professional backgrounds in computer science, gaming, literature, and music leave him uniquely equipped to handle a wide range of news topics for the site. These include the likes of machine learning, voice assistants, AI technology development, and hot gaming news in the Android world. Contact him at [email protected]
Android Headlines We Are Hiring Apply Now