{"id":3167,"date":"2025-06-04T02:04:50","date_gmt":"2025-06-04T02:04:50","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=3167"},"modified":"2025-06-04T02:04:50","modified_gmt":"2025-06-04T02:04:50","slug":"dont-let-dormant-accounts-develop-into-a-doorway-for-cybercriminals","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=3167","title":{"rendered":"Don\u2019t let dormant accounts develop into a doorway for cybercriminals"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p class=\"sub-title\">Do you&#8217;ve got on-line accounts you have not utilized in years? If that&#8217;s the case, a little bit of digital spring cleansing may be so as.<\/p>\n<div class=\"article-authors d-flex flex-wrap\">\n<div class=\"article-author d-flex\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/en\/our-experts\/phil-muncaster\/\" title=\"Phil Muncaster\"><picture><source srcset=\"https:\/\/web-assets.esetstatic.com\/tn\/-x45\/wls\/2021\/04\/Phil_Muncaster.jpg\" media=\"(max-width: 768px)\"\/><img decoding=\"async\" class=\"author-image me-3\" src=\"https:\/\/web-assets.esetstatic.com\/tn\/-x45\/wls\/2021\/04\/Phil_Muncaster.jpg\" alt=\"Phil Muncaster\"\/><\/picture><\/a><\/div>\n<\/div>\n<p class=\"article-info mb-5\">\n        <span>02 Jun 2025<\/span><br \/>\n        <span class=\"d-none d-lg-inline\">\u00a0\u2022\u00a0<\/span><br \/>\n        <span class=\"d-inline d-lg-none\">, <\/span><br \/>\n        <span>5 min. learn<\/span>\n    <\/p>\n<div class=\"hero-image-container\">\n        <picture><source srcset=\"https:\/\/web-assets.esetstatic.com\/tn\/-x266\/wls\/2025\/05-25\/dormant-accounts-cybercrime.png\" media=\"(max-width: 768px)\"\/><source srcset=\"https:\/\/web-assets.esetstatic.com\/tn\/-x425\/wls\/2025\/05-25\/dormant-accounts-cybercrime.png\" media=\"(max-width: 1120px)\"\/><img decoding=\"async\" class=\"hero-image\" src=\"https:\/\/web-assets.esetstatic.com\/tn\/-x700\/wls\/2025\/05-25\/dormant-accounts-cybercrime.png\" alt=\"Don\u2019t let dormant accounts become a doorway for cybercriminals\"\/><\/picture>    <\/div>\n<\/div>\n<div>\n<p>The longer our digital lives, the extra on-line accounts we\u2019re prone to accrue. Are you able to even bear in mind all of the companies you\u2019ve signed as much as through the years? It could possibly be that free trial you began and by no means cancelled. Or that app you used on vacation as soon as and by no means returned to. Account sprawl is actual. In line with <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.globenewswire.com\/news-release\/2024\/05\/21\/2885556\/0\/en\/People-have-around-170-passwords-on-average-study-shows.html\" target=\"_blank\" rel=\"noopener\">one estimate<\/a>, the common individual has 168 passwords for private accounts.<\/p>\n<p>But inactive accounts are additionally a safety threat, each from a private and a piece perspective. They characterize a probably engaging goal for opportunistic criminals, so it\u2019s price contemplating a little bit of spring cleansing now and again to maintain them below management.<\/p>\n<h2>Why are dormant accounts dangerous?<\/h2>\n<p>There are a lot of explanation why you may need numerous forgotten, inactive accounts. The possibilities are, you\u2019re bombarded by particular affords and new digital companies each day. Typically the one method to test them out is by signing up and creating a brand new account. However we\u2019re solely human \u2013 we overlook, our pursuits change over time, and generally we are able to\u2019t bear in mind the logins and transfer on. It\u2019s usually tougher to delete an account than simply go away it to develop into dormant.<\/p>\n<p>Nonetheless, that could be a mistake. Accounts which were inactive for a very long time usually tend to be compromised, in response to <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/blog.google\/technology\/safety-security\/updating-our-inactive-account-policies\/\" target=\"_blank\" rel=\"noopener\">Google<\/a>. That\u2019s as a result of there\u2019s a better likelihood that they use outdated or reused credentials which will have been caught up in a historic information breach. The tech large additionally claims that \u201cdeserted accounts are at the very least 10x much less possible than energetic accounts to have 2-step-verification arrange.\u201d<\/p>\n<p>These accounts could possibly be a magnet for hackers, who&#8217;re more and more centered on account takeover (ATO). They accomplish that by way of quite a lot of strategies, together with:<\/p>\n<ul>\n<li><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/en\/malware\/theyre-coming-data-infostealers-how-stay-safe\/\" target=\"_blank\" rel=\"noopener\">Infostealer malware<\/a> designed to reap your logins. One <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/flashpoint.io\/blog\/flashpoint-global-threat-intelligence-report-gtir-2025\/\" target=\"_blank\" rel=\"noopener\">report<\/a> claims that 3.2 billion credentials have been stolen final 12 months; most (75%) by way of infostealers<\/li>\n<li>Giant-scale <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/en\/how-to\/the-murky-world-of-password-leaks-and-how-to-check-if-youve-been-hit\/\" target=\"_blank\" rel=\"noopener\">information breaches<\/a>, the place <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/2022\/01\/05\/5-ways-hackers-steal-passwords-how-stop-them\/\" target=\"_blank\" rel=\"noopener\">hackers harvest complete databases of passwords<\/a> and usernames from third-party corporations you may need signed as much as<\/li>\n<li>Credential stuffing, the place hackers feed breached credentials into automated software program, in an try to unlock accounts the place you\u2019ve reused that very same compromised password<\/li>\n<li>Brute-force strategies, the place they use trial and error to guess your passwords<\/li>\n<\/ul>\n<h3>The results of inactive accounts<\/h3>\n<p>If an attacker features entry to your account, they might:<\/p>\n<ul>\n<li>Use it to ship spam and scams to your contacts (e.g., if it\u2019s an inactive e mail or social media account), and even launch convincing phishing assaults in your identify. These would possibly attempt to elicit delicate data out of your contacts, or trick them into putting in malware.<\/li>\n<li>Search via your dormant account for private info or saved card particulars. These could possibly be used to commit identification fraud, or to ship additional phishing emails impersonating the account service supplier with a purpose to elicit extra particulars from you. Saved playing cards might have expired, however ones that haven\u2019t could possibly be used to make fraudulent transactions in your identify.<\/li>\n<li>Promote the account on the darkish internet, if it has any worth, equivalent to a <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/2022\/01\/13\/making-loyalty-pay-how-protect-loyalty-rewards-scammers\/\" target=\"_blank\" rel=\"noopener\">loyalty or Air Miles<\/a> account you could have forgotten about.<\/li>\n<li>Drain the account of funds (e.g., if it\u2019s a crypto pockets or forgotten checking account). Within the UK, it\u2019s <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.moneysavingexpert.com\/reclaim\/reclaim-lost-assets-free\/#:~:text=It's%20thought%20there%20could%20be%20as%20much,to%20as%20lost%20assets%20or%20lost%20accounts.&amp;text=The%20Association%20of%20Investment%20Companies%20advises%20people,Account%20to%20recover%20lost%20investment%20trust%20funds.\" target=\"_blank\" rel=\"noopener\">estimated<\/a> that there could possibly be \u00a382bn ($109bn) in misplaced financial institution, constructing society, pension, and different accounts.<\/li>\n<\/ul>\n<p>Dormant enterprise accounts are additionally a lovely goal, on condition that they might give risk actors a simple pathway to delicate company information and programs. They might steal and promote this information or maintain it to ransom. Actually:<\/p>\n<ul>\n<li>The <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.govtech.com\/sponsored\/back-to-basics-a-deeper-look-at-the-colonial-pipeline-hack\" target=\"_blank\" rel=\"noopener\">Colonial Pipeline<\/a> ransomware breach of 2021 began from an inactive VPN account that was hijacked. The incident resulted in main gasoline shortages up and down the US East Coast.<\/li>\n<li>A 2020 ransomware <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/ico.org.uk\/about-the-ico\/media-centre\/news-and-blogs\/2024\/07\/london-borough-of-hackney-reprimanded-following-cyber-attack\/\" target=\"_blank\" rel=\"noopener\">assault on the London Borough of Hackney\u00a0<\/a>stemmed partially from an insecure password on a dormant account related to the council\u2019s servers.<\/li>\n<\/ul>\n<h2>Time for a spring clear?<\/h2>\n<p>So what are you able to do to mitigate the dangers outlined above? Some service suppliers now mechanically shut inactive accounts after a sure size of time, with a purpose to liberate computing assets, scale back prices and improve safety for patrons. They embrace <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/support.google.com\/accounts\/answer\/12418290?hl=en\">Google<\/a>, <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/support.microsoft.com\/en-gb\/account-billing\/reopen-your-microsoft-account-52d7f36e-4c2f-489a-8584-de5fc7918362\">Microsoft<\/a>, and <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/help.x.com\/en\/rules-and-policies\/inactive-x-accounts\">X<\/a>. \u00a0<\/p>\n<p>Nonetheless, on the subject of your digital safety, it\u2019s all the time greatest to be proactive. Contemplate the next:<\/p>\n<ul>\n<li>Periodically audit and delete any inactive accounts. A great way to search out these is to go looking your e mail inbox for key phrases like &#8220;Welcome,\u201d &#8220;Confirm account,\u201d \u201cFree trial,\u201d Thanks for signing up,\u201d \u201cValidate your account,\u201d and many others.<\/li>\n<li>Undergo your password supervisor or saved password record in your browser and delete any linked to inactive accounts \u2013 or replace the password if it has been flagged as insecure\/caught in a knowledge breach.<\/li>\n<li>It might be price checking the account supplier\u2019s deletion insurance policies to make sure that all private and monetary info will certainly be eliminated in case you shut the account<\/li>\n<li>Assume twice earlier than new sign-ups. Is it actually price creating a brand new account?<\/li>\n<\/ul>\n<p>For these accounts you wish to maintain, apart from updating the password to a powerful, distinctive credential, and storing it in a password supervisor, take into account the next:<\/p>\n<ul>\n<li>Switching on <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/2019\/12\/13\/2fa-double-down-your-security\/\">two-factor authentication<\/a> (2FA), in order that even when a hacker will get maintain of your password, they received\u2019t have the ability to compromise your account.<\/li>\n<li>By no means log-in to delicate accounts on public Wi-Fi (with out <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/en\/privacy\/buying-vpn-what-know-look-for\/\">utilizing a VPN<\/a>, anyway) as cybercriminals could possibly eavesdrop in your exercise and steal your logins.<\/li>\n<li>Concentrate on phishing messages that attempt to trick you into handing over your log-ins or downloading malware (like <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/en\/malware\/theyre-coming-data-infostealers-how-stay-safe\/\">infostealers<\/a>). By no means click on on hyperlinks in unsolicited messages, and don\u2019t fall for makes an attempt to hurry you into taking motion by, for instance, claiming you owe cash or that your account might be deleted in case you don\u2019t.<\/li>\n<\/ul>\n<p>The possibilities are that almost all of us have dozens if not scores of inactive accounts sprawled throughout the web. By taking a couple of minutes out of your day annually to wash issues up, you might make your digital life that little bit safer.<\/p>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>Do you&#8217;ve got on-line accounts you have not utilized in years? If that&#8217;s the case, a little bit of digital spring cleansing may be so as. 02 Jun 2025 \u00a0\u2022\u00a0 , 5 min. learn The longer our digital lives, the extra on-line accounts we\u2019re prone to accrue. Are you able to even bear in mind [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":3169,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[172,209,2476,3009,3008],"class_list":["post-3167","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-accounts","tag-cybercriminals","tag-dont","tag-doorway","tag-dormant"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/3167","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3167"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/3167\/revisions"}],"predecessor-version":[{"id":3168,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/3167\/revisions\/3168"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/3169"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3167"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3167"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3167"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-05-14 20:45:48 UTC -->