Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityLogical SecuritySecurity & Business Resilience

The bad actor’s best friend: Dormant service accounts

By Tim Eades
Old computer in a large room

Image via Unsplash

July 29, 2024

Dormant accounts, also known as inactive accounts, are accounts that haven’t been used or updated in at least 90 days. This extended period of inactivity gives them their “dormant” classification. 

Since these accounts are not being actively used, it’s common for application owners not to know they exist. The lack of knowledge can be attributed to the fact that these accounts aren’t being accessed or updated, meaning they don’t appear in system logs or trigger any security alerts. They go unnoticed and essentially become invisible within the system, slipping under the radar. Inactive accounts are a hotbed of opportunity for attackers, even more so if accounts remain dormant for long periods of time. 

An attacker can leverage the inactivity to their advantage, as the account’s lack of use means that any unauthorized activities are less likely to be noticed immediately. This provides a window of opportunity for nefarious activities to go undetected, making dormant accounts a significant security risk an attacker can easily take advantage of.

Risks involved with dormant accounts

A dormant account’s biggest weakness is the age of its password, and because credential reuse (specifically passwords) is a widespread issue, cybercriminals look for these signs to attack. Password reuse is the number one enabler of breaches. This essential security issue can be found across all companies, from the smallest organizations to multi-billion dollar corporations employing some of the brightest minds in the world. 

Let’s consider the tech giant, Microsoft. In January of 2024, Microsoft detected a significant breach within its internal systems. The perpetrators of this breach zeroed in on a non-production administrator account, which was specifically used for testing. By deploying a password spray attack, they were able to crack the account’s weak password. The absence of multi-factor authentication (MFA) on this account provided an unobstructed path for the attacker to log in. 

Once the attacker had infiltrated the system, they had access to a wealth of sensitive information. Emails and valuable data pertaining to high-ranking Microsoft leadership and their cybersecurity and legal teams were now at the attacker’s disposal. 

One month later, in February of 2024, Tangerine, the Australian telecom company, announced that they had suffered a cyberattack, which resulted in the loss of 232,000 customers’ personal data. This data encompassed a wide range of sensitive information, such as names, email addresses, birth dates and account numbers. 

According to Tangerine, the root cause of this devastating breach was a “legacy customer base” accessed by “login credentials of a single user engaged by Tangerine on a contract basis.”

In both of these massive companies, the underlying cause of the breach was the same: dormant accounts with weak passwords.

What can organizations do? 

The first step in protecting dormant accounts is being able to discover them in the organization’s environment. Leveraging a dynamic identity vulnerability solution that discovers and monitors all accounts and their access chains can help reveal dormant accounts in systems that are being improperly managed or used. 

Once they are revealed, organizations should deactivate or delete accounts that do not serve a current business function. Then, they should take the time to establish a strong password policy.

While preventing users from reusing their passwords can be challenging, accounts can be configured to rotate passwords every 90 days or automatically “lock” if they go unused after a certain period of time. 

To further impede attacks like spraying, stuffing and brute force attacks, it is advisable to implement a password complexity requirement, which makes the password less susceptible to guessing. 

Finally, multi-factor authentication (MFA) should be enabled for every account. This will prevent attackers from accessing the account even if they guess (or know) the password. 

Robust security posture requires robust identity security tools 

Dormant accounts remain a significant risk to organizations of all sizes and are low-hanging fruit for attackers, providing an easy, often overlooked entry point. Couple their nature as prime targets with detrimental practices such as password reuse and the non-implementation of MFA, and these accounts become the epicenter of security risks. 

Fortunately, there are identity vulnerability solutions that help to discover all dormant accounts easily and monitor environments for them. These solutions can track password rotation to ensure all accounts are complying with password policies, protecting an organization from an easily avoidable attack.

KEYWORDS: credentials organizational resilience organizational risks risk mitigation unauthorized access

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Tim eades headshot

Tim Eades is Co-Founder and CEO at Anetac. Image courtesy of Eades 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • the cloud

    CISA: Hackers bypassed MFA to access cloud service accounts

    See More
  • green and pink pyramid on blue background

    94% of organizations don't have full visibility into service accounts

    See More
  • Phone home screen with 20 AI applications

    Breaking bad: How bad actors can corrupt the morals of generative AI

    See More

Related Products

See More Products
  • The Database Hacker's Handboo

  • 150 things.jpg

    The Handbook for School Safety and Security

  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing