Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

The Hidden Risk of Orphan Accounts

Posted on January 20, 2026January 20, 2026 By CWS

The Hacker InformationJan 20, 2026Enterprise Safety / AI Safety
The Downside: The Identities Left Behind
As organizations develop and evolve, staff, contractors, providers, and methods come and go – however their accounts usually stay. These deserted or “orphan” accounts sit dormant throughout functions, platforms, belongings, and cloud consoles.
The explanation they persist is not negligence – it is fragmentation.
Conventional IAM and IGA methods are designed primarily for human customers and depend upon handbook onboarding and integration for every utility – connectors, schema mapping, entitlement catalogs, and position modeling. Many functions by no means make it that far. In the meantime, non-human identities (NHIs): service accounts, bots, APIs, and agent-AI processes are natively ungoverned, working outdoors commonplace IAM frameworks and infrequently with out possession, visibility, or lifecycle controls.
The end result? A shadow layer of untracked identities forming a part of the broader id darkish matter – accounts invisible to governance however nonetheless energetic in infrastructure.
Why They’re Not Tracked

Integration Bottlenecks: Each app requires a novel configuration earlier than IAM can handle it. Unmanaged and native methods are not often prioritized.
Partial Visibility: IAM instruments see solely the “managed” slice of id – forsaking native admin accounts, service identities, and legacy methods.
Advanced Possession: Turnover, mergers, and distributed groups make it unclear who owns which utility or account.
AI-Brokers and Automation: Agent-AI introduces a brand new class of semi-autonomous identities that act independently from their human operators, additional breaking the IAM mannequin.

Be taught extra about IAM shortcuts and the impacts that accompany them go to.

The Actual-World Danger
Orphan accounts are the unlocked again doorways of the enterprise.
They maintain legitimate credentials, usually with elevated privileges, however no energetic proprietor. Attackers know this and use them.

Colonial Pipeline (2021) – attackers entered by way of an outdated/inactive VPN account with no MFA. A number of sources corroborate the “inactive/legacy” account element.
Manufacturing firm hit by Akira ransomware (2025) – breach got here by means of a “ghost” third-party vendor account that wasn’t deactivated (i.e., an orphaned/vendor account). SOC write-up from Barracuda Managed XDR.
M&A context – throughout post-acquisition consolidation, it is common to find hundreds of stale accounts/tokens; Enterprises be aware orphaned (usually NHI) identities as a persistent post-M&A risk, citing very excessive charges of still-active former worker tokens.

Orphan accounts gas a number of dangers:

Compliance publicity: Violates least-privilege and deprovisioning necessities (ISO 27001, NIS2, PCI DSS, FedRAMP).
Operational inefficiency: Inflated license counts and pointless audit overhead.
Incident response drag: Forensics and remediation decelerate when unseen accounts are concerned.

The Approach Ahead: Steady Identification Audit
Enterprises want proof, not assumptions. Eliminating orphan accounts requires full id observability – the power to see and confirm each account, permission, and exercise, whether or not managed or not.
Trendy mitigation contains:

Identification Telemetry Assortment: Extract exercise alerts instantly from functions, managed and unmanaged.
Unified Audit Path: Correlate joiner/mover/leaver occasions, authentication logs, and utilization information to substantiate possession and legitimacy.
Position Context Mapping: File actual utilization insights and privilege context into id profiles – exhibiting who used what, when, and why.
Steady Enforcement: Routinely flag or decommission accounts with no exercise or possession, lowering threat with out ready for handbook opinions.

When this telemetry feeds right into a central id audit layer, it closes the visibility hole, turning orphan accounts from hidden liabilities into measurable, managed entities.

To study extra, go to Audit Playbook: Steady Software Stock Reporting.

The Orchid Perspective
Orchid’s Identification Audit functionality delivers this basis. By combining application-level telemetry with automated audit assortment, it supplies verifiable, steady perception into how identities – human, non-human, and agent-AI – are literally used.
It isn’t one other IAM system; it is the connective tissue that ensures IAM choices are primarily based on proof, not estimation.
Observe: This text was written and contributed by Roy Katmor, CEO of Orchid Safety.

Discovered this text fascinating? This text is a contributed piece from considered one of our valued companions. Comply with us on Google Information, Twitter and LinkedIn to learn extra unique content material we publish.

The Hacker News Tags:Accounts, Hidden, Orphan, Risk

Post navigation

Previous Post: Evelyn Stealer Malware Abuses VS Code Extensions to Steal Developer Credentials and Crypto
Next Post: APT-Grade PDFSider Malware Used by Ransomware Groups

Related Posts

NFC Fraud, Curly COMrades, N-able Exploits, Docker Backdoors & More The Hacker News
New “Cavalry Werewolf” Attack Hits Russian Agencies with FoalShell and StallionRAT The Hacker News
Ukraine Aid Groups Targeted Through Fake Zoom Meetings and Weaponized PDF Files The Hacker News
Chrome 0-Day, AI Hacking Tools, DDR5 Bit-Flips, npm Worm & More The Hacker News
Anatsa Android Banking Trojan Hits 90,000 Users with Fake PDF App on Google Play The Hacker News
1,500+ Minecraft Players Infected by Java Malware Masquerading as Game Mods on GitHub The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Study Shows GPT-5.2 Can Reliably Develop Zero-Day Exploits at Scale
  • Chainlit Vulnerabilities May Leak Sensitive Information
  • Three Flaws in Anthropic MCP Git Server Enable File Access and Code Execution
  • Hackers Use LinkedIn Messages to Spread RAT Malware Through DLL Sideloading
  • TP-Link Vulnerability Allows Authentication Bypass Via Password Recovery Feature

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Study Shows GPT-5.2 Can Reliably Develop Zero-Day Exploits at Scale
  • Chainlit Vulnerabilities May Leak Sensitive Information
  • Three Flaws in Anthropic MCP Git Server Enable File Access and Code Execution
  • Hackers Use LinkedIn Messages to Spread RAT Malware Through DLL Sideloading
  • TP-Link Vulnerability Allows Authentication Bypass Via Password Recovery Feature

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark