Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

The Hidden Risk of Orphan Accounts

Posted on January 20, 2026January 20, 2026 By CWS

The Hacker InformationJan 20, 2026Enterprise Safety / AI Safety
The Downside: The Identities Left Behind
As organizations develop and evolve, staff, contractors, providers, and methods come and go – however their accounts usually stay. These deserted or “orphan” accounts sit dormant throughout functions, platforms, belongings, and cloud consoles.
The explanation they persist is not negligence – it is fragmentation.
Conventional IAM and IGA methods are designed primarily for human customers and depend upon handbook onboarding and integration for every utility – connectors, schema mapping, entitlement catalogs, and position modeling. Many functions by no means make it that far. In the meantime, non-human identities (NHIs): service accounts, bots, APIs, and agent-AI processes are natively ungoverned, working outdoors commonplace IAM frameworks and infrequently with out possession, visibility, or lifecycle controls.
The end result? A shadow layer of untracked identities forming a part of the broader id darkish matter – accounts invisible to governance however nonetheless energetic in infrastructure.
Why They’re Not Tracked

Integration Bottlenecks: Each app requires a novel configuration earlier than IAM can handle it. Unmanaged and native methods are not often prioritized.
Partial Visibility: IAM instruments see solely the “managed” slice of id – forsaking native admin accounts, service identities, and legacy methods.
Advanced Possession: Turnover, mergers, and distributed groups make it unclear who owns which utility or account.
AI-Brokers and Automation: Agent-AI introduces a brand new class of semi-autonomous identities that act independently from their human operators, additional breaking the IAM mannequin.

Be taught extra about IAM shortcuts and the impacts that accompany them go to.

The Actual-World Danger
Orphan accounts are the unlocked again doorways of the enterprise.
They maintain legitimate credentials, usually with elevated privileges, however no energetic proprietor. Attackers know this and use them.

Colonial Pipeline (2021) – attackers entered by way of an outdated/inactive VPN account with no MFA. A number of sources corroborate the “inactive/legacy” account element.
Manufacturing firm hit by Akira ransomware (2025) – breach got here by means of a “ghost” third-party vendor account that wasn’t deactivated (i.e., an orphaned/vendor account). SOC write-up from Barracuda Managed XDR.
M&A context – throughout post-acquisition consolidation, it is common to find hundreds of stale accounts/tokens; Enterprises be aware orphaned (usually NHI) identities as a persistent post-M&A risk, citing very excessive charges of still-active former worker tokens.

Orphan accounts gas a number of dangers:

Compliance publicity: Violates least-privilege and deprovisioning necessities (ISO 27001, NIS2, PCI DSS, FedRAMP).
Operational inefficiency: Inflated license counts and pointless audit overhead.
Incident response drag: Forensics and remediation decelerate when unseen accounts are concerned.

The Approach Ahead: Steady Identification Audit
Enterprises want proof, not assumptions. Eliminating orphan accounts requires full id observability – the power to see and confirm each account, permission, and exercise, whether or not managed or not.
Trendy mitigation contains:

Identification Telemetry Assortment: Extract exercise alerts instantly from functions, managed and unmanaged.
Unified Audit Path: Correlate joiner/mover/leaver occasions, authentication logs, and utilization information to substantiate possession and legitimacy.
Position Context Mapping: File actual utilization insights and privilege context into id profiles – exhibiting who used what, when, and why.
Steady Enforcement: Routinely flag or decommission accounts with no exercise or possession, lowering threat with out ready for handbook opinions.

When this telemetry feeds right into a central id audit layer, it closes the visibility hole, turning orphan accounts from hidden liabilities into measurable, managed entities.

To study extra, go to Audit Playbook: Steady Software Stock Reporting.

The Orchid Perspective
Orchid’s Identification Audit functionality delivers this basis. By combining application-level telemetry with automated audit assortment, it supplies verifiable, steady perception into how identities – human, non-human, and agent-AI – are literally used.
It isn’t one other IAM system; it is the connective tissue that ensures IAM choices are primarily based on proof, not estimation.
Observe: This text was written and contributed by Roy Katmor, CEO of Orchid Safety.

Discovered this text fascinating? This text is a contributed piece from considered one of our valued companions. Comply with us on Google Information, Twitter and LinkedIn to learn extra unique content material we publish.

The Hacker News Tags:Accounts, Hidden, Orphan, Risk

Post navigation

Previous Post: Cloudflare Fixes ACME Validation Bug Allowing WAF Bypass to Origin Servers
Next Post: APT-Grade PDFSider Malware Used by Ransomware Groups

Related Posts

Former Black Basta Members Use Microsoft Teams and Python Scripts in 2025 Attacks The Hacker News
Qualcomm Fixes 3 Zero-Days Used in Targeted Android Attacks via Adreno GPU The Hacker News
State-Backed HazyBeacon Malware Uses AWS Lambda to Steal Data from SE Asian Governments The Hacker News
Critical Cisco ISE Auth Bypass Flaw Impacts Cloud Deployments on AWS, Azure, and OCI The Hacker News
TamperedChef Malware Disguised as Fake PDF Editors Steals Credentials and Cookies The Hacker News
Malicious Browser Extensions Infect 722 Users Across Latin America Since Early 2025 The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Chainlit Vulnerabilities May Leak Sensitive Information
  • Three Flaws in Anthropic MCP Git Server Enable File Access and Code Execution
  • TP-Link Vulnerability Allows Authentication Bypass Via Password Recovery Feature
  • APT-Grade PDFSider Malware Used by Ransomware Groups
  • The Hidden Risk of Orphan Accounts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Chainlit Vulnerabilities May Leak Sensitive Information
  • Three Flaws in Anthropic MCP Git Server Enable File Access and Code Execution
  • TP-Link Vulnerability Allows Authentication Bypass Via Password Recovery Feature
  • APT-Grade PDFSider Malware Used by Ransomware Groups
  • The Hidden Risk of Orphan Accounts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark