Search
Close this search box.
Search
Close this search box.

Why You Shouldn’t Save Your Passwords in Google Chrome?

Shouldn't Save Your Passwords in Google Chrome

Listen to the Podcast:

When registering into a website like Facebook or Twitter, Google Chrome frequently displays a pop-up prompting the user to save their password. At we describe the mechanism used to store and protect passwords and indicate whether it’s safe to select “Save.”

Is It Safe to Save Your Passwords in Google Chrome?

The Google Chrome storage mechanism poses a security risk only if the computer has been previously compromised or exposed, although the use of a database called SQLite3 adds an additional attack vector that could be exploited by cybercriminals, according to ESET, a cyber security firm.

The only known risk associated with this mechanism is the theft of stored credentials. Therefore, it is advised not to use such a database and, if you do, not to retain passwords for essential services that contain personal information, such as:

  • On line bank
  • Social media
  • medical websites

What Happens When You Allow “Store” Your Passwords?

By clicking “accept” when Google Chrome asks “Do you want to save the password? “, the user consents to the saving of the username and password submitted in a website’s login form. This information can be specifically stored in an SQLite3 database located at the following address:

  • %LocalAppData%\Google\Chrome\User Data\Default\Login Data.

This database’s tables contain a variety of fields, with the ” logins ” table containing the most sensitive data, including the ” username value ” and ” password value ” fields. These fields are meaningless without the “origin_url” field, which informs Google Chrome which website the credentials correspond to.

The other fields contribute to the mechanism’s correct operation to a lesser extent. Because of fundamental security concerns, passwords are not stored in plain text. On Windows systems, the browser employs an encryption feature provided by the operating system, CryptProtectData (Crypt32.dll), per ESET.

Is There a Real Danger with This Mechanism in Google Chrome?

Google Chrome’s “Save Password” feature is designed so that encrypted data can only be decrypted by the same user who was logged in at the time the password was encrypted. Additionally, it can be configured to only decrypt data on the same computer on which it was encrypted.

The technological behemoth does not use a password set by the user, but rather the user’s operating system credentials. Therefore, a cybercriminal would be compelled to decrypt them by logging in as the same user who created them and transmitting them.

If an attacker gains access to the computer, they could readily obtain and decrypt the plaintext passwords if this mechanism is used to store them.

This type of behavior has been observed in multiple malicious codes, including Latin America-specific banking Trojans designed to capture login credentials for online banking sites.

How Do Attacks with Your Passwords Work?

In these attacks, the cybercriminal can obtain both the structure and the contents of the tables. For instance, they could attempt to log in to Facebook using false credentials and then select the option for Google Chrome to store the credentials.

Once the username and password have been saved to the browser’s database, the user can locate the file that contains this information and access it with a database-viewing program, such as DB Browser for SQL Lite.

From there, they can locate the entries in the ” logins ” table that contain login information, such as:

  • URL
  • Username
  • Encrypted password.

The stored password is encrypted in a BLOB structure (binary large objects, such as images or audio files), and the program displays its hexadecimal representation when the user clicks on that field.

The perpetrator now has the encrypted username, website, and password, and only needs to decrypt it. Since the active user is likely to be the same one who previously saved the password, an attacker with access to the computer in question can easily decrypt the password using Crypt Unprotect Data as opposed to DB Browser.

Anyone with physical or remote access to the computer can perform these actions, so it’s important to use a strong and unique password for each account, enable two-factor authentication, exercise caution when allowing Google Chrome to save passwords, and keep your computer’s security up to date, according to ESET.


Subscribe to Our Newsletter

Related Articles

Top Trending

What Causes Sewer Line Backups
What Causes Sewer Line Backups? (6 Warning Signs to Watch For)
Best Pipe Materials for Plumbing
Best Pipe Materials for Plumbing in 2025: Complete Guide
How to Create a Kid-Friendly Yet Stylish Home
How to Create a Kid-Friendly Yet Stylish Home: 5 Easy Tips
What’s Next for Bitcoin and the Crypto Market
Get Ready for What’s Next in Bitcoin and the Crypto Market
How TikTok and Instagram Are Shaping 2025 Bathroom Aesthetics
How TikTok and Instagram Are Shaping 2025 Bathroom Aesthetics?

LIFESTYLE

12 Budget-Friendly Activities That Won’t Cost a Penny
12 Fun and Budget-Friendly Activities That Are Completely Free
lovelolablog code
Unlock Exclusive Lovelolablog Code For Discount Deals in 2025
Sustainable Kiwi Beauty Products
10 Sustainable Kiwi Beauty Products You Should Try for a Greener Routine
Best E-Bikes for Seniors
Best E-Bikes for Seniors with Comfort and Safety in Mind
wellhealthorganic.com effective natural beauty tips
Top 5 Well Health Organic Beauty Tips for Glowing Skin

Entertainment

Rhea Ripley Husband Revealed
Rhea Ripley Husband Revealed: The Story of Her Journey With Buddy Matthews
jack doherty net worth
Jack Doherty Net Worth: From Flipping Markers To Making Big Bucks
Yodayo
Discover The Magic of Yodayo: AI-Powered Anime At Yodayo Tavern
netflix 2025 q1 results revenue up 13 percent
Netflix Surpasses Q1 Forecast with 13% Revenue Growth
selena gomez x rated photo background shocks fans
Selena Gomez Leaves Fans Shocked by Risqué Photo Background

GAMING

Which Skins Do Pro Players Use Most Often
Which Skins Do Pro Players Use Most Often in 2025?
Major Security Risks When Visiting iGaming Platforms
12 Major Security Risks When Visiting iGaming Platforms (And Proper Remedies)
Familiarity with Online Casino Games Builds Gameplay Confidence
How Familiarity with Online Casino Games Builds Gameplay Confidence?
Pixel Art Games
Why Pixel Art Games Are Still Thriving in 2025?
Most Unfair Levels In Gaming History
The Most Unfair Levels In Gaming History

BUSINESS

What’s Next for Bitcoin and the Crypto Market
Get Ready for What’s Next in Bitcoin and the Crypto Market
IRA Rollover vs Transfer
IRA Rollover vs Transfer: Key Differences, Benefits, and Choosing the Right Option
optimizing money6x real estate
Money6x Real Estate: The Power of Real Estate Without the Headaches
Crypto Tax Strategies for Investor
Don't Miss Out: Learn the Top 15 Crypto Tax Strategies for Investors in 2025
Flexible Trailer Leasing
How Flexible Trailer Leasing Supports Seasonal Demand and Inventory Surges?

TECHNOLOGY

The Rise of EcoTech Startups
The Rise of EcoTech Startups: Meet the Founders Changing the Climate Game
Smart Gadgets For An Eco-Friendly Home
Living With Less, Powered By Tech: 7 Smart Gadgets For An Eco-Friendly Home
Beta Character ai
What Makes Beta Character AI Such a Promising AI Platform?
Google Ads Safety report 2024
Google Ads Crackdown 2024: 5.1B Blocked, 39M Accounts Suspended
katy perry bezos fiancee not real astronauts
Trump Official Says Katy Perry, Bezos’ Fiancée Not Real Astronauts

HEALTH

How to Identify and Manage Burnout in the Workplace
How to Identify and Manage Burnout in the Workplace?
How to Start a Mental Wellness Program at Work
How to Start a Mental Wellness Program at Your Office?
Tips For Mentally Healthy Leadership
10 Tips For Mentally Healthy Leadership
Back Pain In Athletes
Back Pain In Athletes: Prevention And Recovery Strategies
Sinclair Method
What is the Sinclair Method?