Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Holy shit, Microsoft.

Holy shit, Microsoft.

Scheduled Pinned Locked Moved Uncategorized
infosecfacepalmclowncar
7 Posts 6 Posters 17 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • kaidenshi@exquisite.socialK This user is from outside of this forum
    kaidenshi@exquisite.socialK This user is from outside of this forum
    kaidenshi@exquisite.social
    wrote last edited by
    #1

    Holy shit, Microsoft. Whoever made this decision should be fired. Into the Sun.

    Link Preview Image
    Microsoft Edge loads all your saved passwords into memory in cleartext — even when you’re not using them; Microsoft will not fix, says the behavior is "by design" - Lemmy.World

    Hacker News [https://news.ycombinator.com/item?id=48012735]. > When you save passwords in Edge, the browser decrypts every credential at startup and keeps them resident in process memory. This happens even if you never visit a site that uses those credentials. > > At the same time, Edge requires you to re‑authenticate before showing those same passwords in the Password Manager UI — yet the browser process already has them all in plaintext. > > Edge is the only Chromium‑based browser I’ve tested that behaves this way. By contrast, Chrome uses a design that makes it far harder for attackers to extract saved passwords by simply reading process memory. > > It decrypts credentials only when needed, instead of keeping all passwords in memory at all times. App‑Bound Encryption (ABE) adds another layer by binding decryption to an authenticated Chrome process, preventing other processes from reusing Chrome’s encryption keys. > > Because of these controls, plaintext passwords appear only briefly during autofill or when the user views them, making broad memory scraping far less effective. The risk of keeping the passwords in cleartext in memory becomes evident in shared environments. > > If an attacker gains administrative access on a terminal server, they can access the memory of all logged‑on user processes. In the video the attacker has compromised a user account with administrative rights and is able to view stored credentials for two other logged on > > (or even disconnected) users with Edge running. I reported this to Microsoft, and the official response was that the behavior is “by design”. They have been informed that I would be sharing this as a responsible disclosure so users and organizations can make informed decisions > > about how they manage credentials. Last wednesday (April 29th) I disclosed this on BigBiteOfTech by Norway Simple, educational proof of concept [https://github.com/L1v1ng0ffTh3L4N/Proof-of-Concepts/tree/main/EdgeSavedPasswordsDumper], to show that the passwords are stored in cleartext in memory. Source [https://farside.link/nitter/L1v1ng0ffTh3L4N/status/2051308329880719730].

    favicon

    (lemmy.world)

    #infosec #facepalm #clowncar

    cienmilojos@infosec.exchangeC mycotropic@beige.partyM microplastics101@mstdn.socialM gh0stlym0use@mastodon.socialG 4 Replies Last reply
    2
    0
    • zak@infosec.exchangeZ zak@infosec.exchange shared this topic
    • kaidenshi@exquisite.socialK kaidenshi@exquisite.social

      Holy shit, Microsoft. Whoever made this decision should be fired. Into the Sun.

      Link Preview Image
      Microsoft Edge loads all your saved passwords into memory in cleartext — even when you’re not using them; Microsoft will not fix, says the behavior is "by design" - Lemmy.World

      Hacker News [https://news.ycombinator.com/item?id=48012735]. > When you save passwords in Edge, the browser decrypts every credential at startup and keeps them resident in process memory. This happens even if you never visit a site that uses those credentials. > > At the same time, Edge requires you to re‑authenticate before showing those same passwords in the Password Manager UI — yet the browser process already has them all in plaintext. > > Edge is the only Chromium‑based browser I’ve tested that behaves this way. By contrast, Chrome uses a design that makes it far harder for attackers to extract saved passwords by simply reading process memory. > > It decrypts credentials only when needed, instead of keeping all passwords in memory at all times. App‑Bound Encryption (ABE) adds another layer by binding decryption to an authenticated Chrome process, preventing other processes from reusing Chrome’s encryption keys. > > Because of these controls, plaintext passwords appear only briefly during autofill or when the user views them, making broad memory scraping far less effective. The risk of keeping the passwords in cleartext in memory becomes evident in shared environments. > > If an attacker gains administrative access on a terminal server, they can access the memory of all logged‑on user processes. In the video the attacker has compromised a user account with administrative rights and is able to view stored credentials for two other logged on > > (or even disconnected) users with Edge running. I reported this to Microsoft, and the official response was that the behavior is “by design”. They have been informed that I would be sharing this as a responsible disclosure so users and organizations can make informed decisions > > about how they manage credentials. Last wednesday (April 29th) I disclosed this on BigBiteOfTech by Norway Simple, educational proof of concept [https://github.com/L1v1ng0ffTh3L4N/Proof-of-Concepts/tree/main/EdgeSavedPasswordsDumper], to show that the passwords are stored in cleartext in memory. Source [https://farside.link/nitter/L1v1ng0ffTh3L4N/status/2051308329880719730].

      favicon

      (lemmy.world)

      #infosec #facepalm #clowncar

      cienmilojos@infosec.exchangeC This user is from outside of this forum
      cienmilojos@infosec.exchangeC This user is from outside of this forum
      cienmilojos@infosec.exchange
      wrote last edited by
      #2

      @kaidenshi “by design”

      kaidenshi@exquisite.socialK 1 Reply Last reply
      0
      • cienmilojos@infosec.exchangeC cienmilojos@infosec.exchange

        @kaidenshi “by design”

        kaidenshi@exquisite.socialK This user is from outside of this forum
        kaidenshi@exquisite.socialK This user is from outside of this forum
        kaidenshi@exquisite.social
        wrote last edited by
        #3

        @cienmilojos yep. "You will be pwned by script kiddies and skilled adversaries alike, by design, and you will like it" ~ Microchud

        1 Reply Last reply
        0
        • kaidenshi@exquisite.socialK kaidenshi@exquisite.social

          Holy shit, Microsoft. Whoever made this decision should be fired. Into the Sun.

          Link Preview Image
          Microsoft Edge loads all your saved passwords into memory in cleartext — even when you’re not using them; Microsoft will not fix, says the behavior is "by design" - Lemmy.World

          Hacker News [https://news.ycombinator.com/item?id=48012735]. > When you save passwords in Edge, the browser decrypts every credential at startup and keeps them resident in process memory. This happens even if you never visit a site that uses those credentials. > > At the same time, Edge requires you to re‑authenticate before showing those same passwords in the Password Manager UI — yet the browser process already has them all in plaintext. > > Edge is the only Chromium‑based browser I’ve tested that behaves this way. By contrast, Chrome uses a design that makes it far harder for attackers to extract saved passwords by simply reading process memory. > > It decrypts credentials only when needed, instead of keeping all passwords in memory at all times. App‑Bound Encryption (ABE) adds another layer by binding decryption to an authenticated Chrome process, preventing other processes from reusing Chrome’s encryption keys. > > Because of these controls, plaintext passwords appear only briefly during autofill or when the user views them, making broad memory scraping far less effective. The risk of keeping the passwords in cleartext in memory becomes evident in shared environments. > > If an attacker gains administrative access on a terminal server, they can access the memory of all logged‑on user processes. In the video the attacker has compromised a user account with administrative rights and is able to view stored credentials for two other logged on > > (or even disconnected) users with Edge running. I reported this to Microsoft, and the official response was that the behavior is “by design”. They have been informed that I would be sharing this as a responsible disclosure so users and organizations can make informed decisions > > about how they manage credentials. Last wednesday (April 29th) I disclosed this on BigBiteOfTech by Norway Simple, educational proof of concept [https://github.com/L1v1ng0ffTh3L4N/Proof-of-Concepts/tree/main/EdgeSavedPasswordsDumper], to show that the passwords are stored in cleartext in memory. Source [https://farside.link/nitter/L1v1ng0ffTh3L4N/status/2051308329880719730].

          favicon

          (lemmy.world)

          #infosec #facepalm #clowncar

          mycotropic@beige.partyM This user is from outside of this forum
          mycotropic@beige.partyM This user is from outside of this forum
          mycotropic@beige.party
          wrote last edited by
          #4

          @kaidenshi

          This is why I close every Edge process at least two or three times per day!

          1 Reply Last reply
          0
          • kaidenshi@exquisite.socialK kaidenshi@exquisite.social

            Holy shit, Microsoft. Whoever made this decision should be fired. Into the Sun.

            Link Preview Image
            Microsoft Edge loads all your saved passwords into memory in cleartext — even when you’re not using them; Microsoft will not fix, says the behavior is "by design" - Lemmy.World

            Hacker News [https://news.ycombinator.com/item?id=48012735]. > When you save passwords in Edge, the browser decrypts every credential at startup and keeps them resident in process memory. This happens even if you never visit a site that uses those credentials. > > At the same time, Edge requires you to re‑authenticate before showing those same passwords in the Password Manager UI — yet the browser process already has them all in plaintext. > > Edge is the only Chromium‑based browser I’ve tested that behaves this way. By contrast, Chrome uses a design that makes it far harder for attackers to extract saved passwords by simply reading process memory. > > It decrypts credentials only when needed, instead of keeping all passwords in memory at all times. App‑Bound Encryption (ABE) adds another layer by binding decryption to an authenticated Chrome process, preventing other processes from reusing Chrome’s encryption keys. > > Because of these controls, plaintext passwords appear only briefly during autofill or when the user views them, making broad memory scraping far less effective. The risk of keeping the passwords in cleartext in memory becomes evident in shared environments. > > If an attacker gains administrative access on a terminal server, they can access the memory of all logged‑on user processes. In the video the attacker has compromised a user account with administrative rights and is able to view stored credentials for two other logged on > > (or even disconnected) users with Edge running. I reported this to Microsoft, and the official response was that the behavior is “by design”. They have been informed that I would be sharing this as a responsible disclosure so users and organizations can make informed decisions > > about how they manage credentials. Last wednesday (April 29th) I disclosed this on BigBiteOfTech by Norway Simple, educational proof of concept [https://github.com/L1v1ng0ffTh3L4N/Proof-of-Concepts/tree/main/EdgeSavedPasswordsDumper], to show that the passwords are stored in cleartext in memory. Source [https://farside.link/nitter/L1v1ng0ffTh3L4N/status/2051308329880719730].

            favicon

            (lemmy.world)

            #infosec #facepalm #clowncar

            microplastics101@mstdn.socialM This user is from outside of this forum
            microplastics101@mstdn.socialM This user is from outside of this forum
            microplastics101@mstdn.social
            wrote last edited by
            #5

            @kaidenshi Wait. People actualy use Edge?

            1 Reply Last reply
            0
            • float13@masto.hackers.townF This user is from outside of this forum
              float13@masto.hackers.townF This user is from outside of this forum
              float13@masto.hackers.town
              wrote last edited by
              #6

              @jargoggles @kaidenshi

              Ah yes, Intelligent Design 🤣

              1 Reply Last reply
              0
              • kaidenshi@exquisite.socialK kaidenshi@exquisite.social

                Holy shit, Microsoft. Whoever made this decision should be fired. Into the Sun.

                Link Preview Image
                Microsoft Edge loads all your saved passwords into memory in cleartext — even when you’re not using them; Microsoft will not fix, says the behavior is "by design" - Lemmy.World

                Hacker News [https://news.ycombinator.com/item?id=48012735]. > When you save passwords in Edge, the browser decrypts every credential at startup and keeps them resident in process memory. This happens even if you never visit a site that uses those credentials. > > At the same time, Edge requires you to re‑authenticate before showing those same passwords in the Password Manager UI — yet the browser process already has them all in plaintext. > > Edge is the only Chromium‑based browser I’ve tested that behaves this way. By contrast, Chrome uses a design that makes it far harder for attackers to extract saved passwords by simply reading process memory. > > It decrypts credentials only when needed, instead of keeping all passwords in memory at all times. App‑Bound Encryption (ABE) adds another layer by binding decryption to an authenticated Chrome process, preventing other processes from reusing Chrome’s encryption keys. > > Because of these controls, plaintext passwords appear only briefly during autofill or when the user views them, making broad memory scraping far less effective. The risk of keeping the passwords in cleartext in memory becomes evident in shared environments. > > If an attacker gains administrative access on a terminal server, they can access the memory of all logged‑on user processes. In the video the attacker has compromised a user account with administrative rights and is able to view stored credentials for two other logged on > > (or even disconnected) users with Edge running. I reported this to Microsoft, and the official response was that the behavior is “by design”. They have been informed that I would be sharing this as a responsible disclosure so users and organizations can make informed decisions > > about how they manage credentials. Last wednesday (April 29th) I disclosed this on BigBiteOfTech by Norway Simple, educational proof of concept [https://github.com/L1v1ng0ffTh3L4N/Proof-of-Concepts/tree/main/EdgeSavedPasswordsDumper], to show that the passwords are stored in cleartext in memory. Source [https://farside.link/nitter/L1v1ng0ffTh3L4N/status/2051308329880719730].

                favicon

                (lemmy.world)

                #infosec #facepalm #clowncar

                gh0stlym0use@mastodon.socialG This user is from outside of this forum
                gh0stlym0use@mastodon.socialG This user is from outside of this forum
                gh0stlym0use@mastodon.social
                wrote last edited by
                #7

                @kaidenshi ahahahaahahahaahaha

                1 Reply Last reply
                0
                • R relay@relay.publicsquare.global shared this topic
                Reply
                • Reply as topic
                Log in to reply
                • Oldest to Newest
                • Newest to Oldest
                • Most Votes


                • Login

                • Login or register to search.
                • First post
                  Last post
                0
                • Categories
                • Recent
                • Tags
                • Popular
                • World
                • Users
                • Groups