{"id":55036,"date":"2025-12-15T15:39:24","date_gmt":"2025-12-15T20:39:24","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=55036"},"modified":"2025-12-15T15:42:02","modified_gmt":"2025-12-15T20:42:02","slug":"forsaken-servers-apis-apps-accounts-find-and-protect","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/forsaken-servers-apis-apps-accounts-find-and-protect\/55036\/","title":{"rendered":"Forgotten IT infrastructure: even worse than shadow IT"},"content":{"rendered":"<p>Attackers often go after <a href=\"https:\/\/www.microsoft.com\/en-us\/msrc\/blog\/2024\/01\/microsoft-actions-following-attack-by-nation-state-actor-midnight-blizzard\/\" target=\"_blank\" rel=\"noopener nofollow\">outdated and unused test account<\/a>s, or stumble upon publicly accessible <a href=\"https:\/\/www.darkreading.com\/application-security\/cloud-misconfig-exposes-3tb-sensitive-airport-data-amazon-s3-bucket\" target=\"_blank\" rel=\"noopener nofollow\">cloud storage containing critical data that\u2019s a bit dusty<\/a>. Sometimes an attack exploits a vulnerability in an app component that was actually <a href=\"https:\/\/www.theregister.com\/2023\/12\/11\/log4j_vulnerabilities\/\" target=\"_blank\" rel=\"noopener nofollow\">patched, say, two years ago<\/a>. As you read these breach reports, a common theme emerges: the attacks leveraged something outdated: a service, a server, a user account\u2026 Pieces of corporate IT infrastructure that sometimes fall off the radar of IT and security teams. They become, in essence, unmanaged, useless, and simply forgotten. These IT zombies create risks for information security, regulatory compliance, and lead to unnecessary operational costs. This is generally an element of shadow IT \u2014 with one key difference: nobody wants, knows about, or benefits from these assets.<\/p>\n<p>In this post, we try to identify which assets demand immediate attention, how to identify them, and what a response should look like.<\/p>\n<h2>Physical and virtual servers<\/h2>\n<p><strong>Priority: high.<\/strong> Vulnerable servers are entry points for cyberattacks, and they continue consuming resources while creating regulatory compliance risks.<\/p>\n<p><strong>Prevalence:<\/strong> <strong>high<\/strong>. Physical and virtual servers are commonly orphaned in large infrastructures following migration projects, or after mergers and acquisitions. Test servers no longer used after IT projects go live, as well as web servers for outdated projects running without a domain, are also frequently forgotten. The scale of the problem is illustrated by <a href=\"https:\/\/blog.apnic.net\/2025\/06\/27\/how-lets-encrypt-reduced-the-impact-of-zombie-clients\/\" target=\"_blank\" rel=\"noopener nofollow\">Lets Encrypt statistics<\/a>: in 2024, half of domain renewal requests came from devices no longer associated with the requested domain. And there are roughly a million of these devices in the world.<\/p>\n<p><strong>Detection: <\/strong>the IT department needs to implement an Automated Discovery and Reconciliation (AD&amp;R) process that combines the results of network scanning and cloud inventory with data from the Configuration Management Database (CMDB). It enables the timely identification of outdated or conflicting information about IT assets, and helps locate the forgotten assets themselves.<\/p>\n<p>This data should be supplemented by external vulnerability scans that cover all of the organization\u2019s public IPs.<\/p>\n<p><strong>Response:<\/strong> establish a formal, documented process for decommissioning\/retiring servers. This process needs to include verification of complete data migration, and verified subsequent destruction of data on the server. Following these steps, the server can be powered down, recycled, or repurposed. Until all procedures are complete, the server needs to be moved to a quarantined, isolated subnet.<\/p>\n<p>To mitigate this issue for test environments, implement an automated process for their creation and decommission. A test environment should be created at the start of a project, and dismantled after a set period or following a certain duration of inactivity. Strengthen the security of test environments by enforcing their strict isolation from the primary (production) environment, and by prohibiting the use of real, non-anonymized business data in testing.<\/p>\n<h2>Forgotten user, service, and device accounts<\/h2>\n<p><strong>Priority: critical.<\/strong> Inactive and privileged accounts are prime targets for attackers seeking to establish network persistence or expand their access within the infrastructure.<\/p>\n<p><strong>Prevalence:<\/strong> <strong>very high.<\/strong> Technical service accounts, contractor accounts, and non-personalized accounts are among the most commonly forgotten.<\/p>\n<p><strong>Detection:<\/strong> conduct regular analysis of the user directory (Active Directory in most organizations) to identify all types of accounts that have seen no activity over a defined period (a month, quarter, or year). Concurrently, it\u2019s advisable to review the permissions assigned to each account, and remove any that are excessive or unnecessary.<\/p>\n<p><strong>Response:<\/strong> after checking with the relevant service owner on the business side or employee supervisor, outdated accounts should be simply deactivated or deleted. A comprehensive <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-benefit-from-identity-security\/48399\/\" target=\"_blank\" rel=\"noopener nofollow\">Identity and Access Management system (IAM)<\/a> offers a scalable solution to this problem. In this system, the creation, deletion, and permission assignment for accounts are tightly integrated with HR processes.<\/p>\n<p>For service accounts, it\u2019s also essential to routinely review both the strength of passwords, and the expiration dates for access tokens \u2014 rotating them as necessary.<\/p>\n<h2>Forgotten data stores<\/h2>\n<p><strong>Priority: critical.<\/strong> Poorly controlled data in externally accessible databases, <a href=\"https:\/\/www.computerweekly.com\/news\/252491842\/Leaky-AWS-S3-bucket-once-again-at-centre-of-data-breach\" target=\"_blank\" rel=\"noopener nofollow\">cloud storage and recycle bins<\/a>, and <a href=\"https:\/\/www.darkreading.com\/vulnerabilities-threats\/hertz-falls-victim-cleo-zero-day-attacks\" target=\"_blank\" rel=\"noopener nofollow\">corporate file-sharing services<\/a> \u2014 even \u201csecure\u201d ones \u2014 has been a key source of major breaches in 2024\u20132025. The data exposed in these leaks often includes document scans, medical records, and personal information. Consequently, these security incidents also lead to penalties for non-compliance with regulations such as HIPAA, GDPR, and other data-protection frameworks governing the handling of personal and confidential data.<\/p>\n<p><strong>Prevalence:<\/strong> <strong>high<\/strong>. Archive data, data copies held by contractors, legacy database versions from previous system migrations \u2014 all of these often remain unaccounted for and accessible for years (even decades) in many organizations.<\/p>\n<p><strong>Detection:<\/strong> given the vast variety of data types and storage methods, a combination of tools is essential for discovery:<\/p>\n<ul>\n<li>Native audit subsystems within major vendor platforms, such as AWS Macie, and Microsoft Purview<\/li>\n<li>Specialized Data Discovery and Data Security Posture Management solutions<\/li>\n<li>Automated analysis of inventory logs, such as <a href=\"https:\/\/docs.aws.amazon.com\/AmazonS3\/latest\/userguide\/storage-inventory.html\" target=\"_blank\" rel=\"noopener nofollow\">S3 Inventory<\/a><\/li>\n<\/ul>\n<p>Unfortunately, these tools are of limited use if a contractor creates a data store within its own infrastructure. Controlling that situation requires contractual stipulations granting the organization\u2019s security team access to the relevant contractor storage, supplemented by <a href=\"https:\/\/dfi.kaspersky.com\/?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____\" target=\"_blank\" rel=\"noopener nofollow\">threat intelligence<\/a> services capable of detecting any publicly exposed or stolen datasets associated with the company\u2019s brand.<\/p>\n<p><strong>Response:<\/strong> analyze access logs and integrate the discovered storage into your DLP and CASB tools to monitor its usage \u2014 or to confirm it\u2019s truly abandoned. Use available tools to securely isolate access to the storage. If necessary, create a secure backup, then delete the data. At the organizational policy level, it\u2019s crucial to establish retention periods for different data types, mandating their automatic archiving and deletion upon expiry. Policies must also define procedures for registering new storage systems, and explicitly prohibit the existence of ownerless data that\u2019s accessible without restrictions, passwords, or encryption.<\/p>\n<h2>Unused applications and services on servers<\/h2>\n<p><strong>Priority: medium.<\/strong> Vulnerabilities in these services increase the risk of successful cyberattacks, complicate patching efforts, and waste resources.<\/p>\n<p><strong>Prevalence:<\/strong> <strong>very high.<\/strong> services are often enabled by default during server installation, remain after testing and configuration work, and continue to run long after the business process they supported has become obsolete.<\/p>\n<p><strong>Detection:<\/strong> through regular audits of software configurations. For effective auditing, servers should adhere to a role-based access model, with each server role having a corresponding list of required software. In addition to the CMDB, a broad spectrum of tools helps with this audit: tools like OpenSCAP and Lynis \u2014 focused on policy compliance and system hardening; multi-purpose tools like OSQuery; vulnerability scanners such as OpenVAS; and network traffic analyzers.<\/p>\n<p><strong>Response:<\/strong> conduct a scheduled review of server functions with their business owners. Any unnecessary applications or services found running should be disabled. To minimize such occurrences, implement the principle of least privilege organization-wide and deploy hardened base images or server templates for standard server builds. This ensures no superfluous software is installed or enabled by default.<\/p>\n<h2>Outdated APIs<\/h2>\n<p><strong>Priority: high.<\/strong> APIs are frequently exploited by attackers to exfiltrate large volumes of sensitive data, and to gain initial access into the organization. In 2024, the number of API-related attacks <a href=\"https:\/\/www.radware.com\/blog\/threat-intelligence\/2025-cyber-threat-report\/\" target=\"_blank\" rel=\"noopener nofollow\">increased by 41%<\/a>, with attackers specifically targeting outdated APIs, as these often provide data with fewer checks and restrictions. This was exemplified by the leak of <a href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/04\/01\/hacker-claims-to-have-leaked-200-million-x-user-data-records-for-free\/\" target=\"_blank\" rel=\"noopener nofollow\">200 million records<\/a> from X\/Twitter.<\/p>\n<p><strong>Prevalence:<\/strong> <strong>high<\/strong>. When a service transitions to a new API version, the old one often remains operational for an extended period, particularly if it\u2019s still used by customers or partners. These deprecated versions are typically no longer maintained, so security flaws and vulnerabilities in their components go unpatched.<\/p>\n<p><strong>Detection:<\/strong> at the WAF or NGFW level, it\u2019s essential to monitor traffic to specific APIs. This helps detect anomalies that may indicate exploitation or data exfiltration, and also identify APIs that get minimal traffic.<\/p>\n<p><strong>Response:<\/strong> for the identified low-activity APIs, collaborate with business stakeholders to develop a decommissioning plan, and migrate any remaining users to newer versions.<\/p>\n<p>For organizations with a large pool of services, this challenge is best addressed with an API management platform in conjunction with a formally approved API lifecycle policy. This policy should include well-defined criteria for deprecating and retiring outdated software interfaces.<\/p>\n<h2>Software with outdated dependencies and libraries<\/h2>\n<p><strong>Priority: high.<\/strong> This is where large-scale, critical vulnerabilities like Log4Shell hide, leading to organizational compromise and regulatory compliance issues.<\/p>\n<p><strong>Prevalence:<\/strong> <strong>Very high<\/strong>, especially in large-scale enterprise management systems, industrial automation systems, and custom-built software.<\/p>\n<p><strong>Detection:<\/strong> use a combination of vulnerability management (VM\/CTEM) systems and software composition analysis (SCA) tools. For in-house development, it\u2019s mandatory to use scanners and comprehensive security systems integrated into the CI\/CD pipeline to prevent software from being built with outdated components.<\/p>\n<p><strong>Response:<\/strong> company policies must require IT and development teams to systematically update software dependencies. When building internal software, dependency analysis should be part of the code review process. For third-party software, it\u2019s crucial to regularly audit the status and age of dependencies.<\/p>\n<p>For external software vendors, updating dependencies should be a contractual requirement affecting support timelines and project budgets. To make these requirements feasible, it\u2019s essential to maintain an up-to-date software bill of materials (SBOM).<\/p>\n<p>You can read more about <a href=\"https:\/\/www.kaspersky.com\/blog\/cvss-rbvm-vulnerability-management\/53912\/\" target=\"_blank\" rel=\"noopener nofollow\">timely and effective vulnerability remediation<\/a> in a separate blog post.<\/p>\n<h2>Forgotten websites<\/h2>\n<p><strong>Priority: medium.<\/strong> Forgotten web assets can be exploited by attackers for phishing, hosting malware, or running scams under the organization\u2019s brand, damaging its reputation. In more serious cases, they can lead to data breaches, or serve as a launchpad for attacks against the given company. A specific subset of this problem involves forgotten domains that were used for one-time activities, expired, and weren\u2019t renewed \u2014 making them available for purchase by anyone.<\/p>\n<p><strong>Prevalence:<\/strong> <strong>high<\/strong> \u2014 especially for sites launched for short-term campaigns or one-off internal activities.<\/p>\n<p><strong>Detection:<\/strong> the IT department must maintain a central registry of all public websites and domains, and verify the status of each with its owners on a monthly or quarterly basis. Additionally, scanners or DNS monitoring can be utilized to track domains associated with the company\u2019s IT infrastructure. Another layer of protection is provided by <a href=\"https:\/\/dfi.kaspersky.com\/?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____\" target=\"_blank\" rel=\"noopener nofollow\">threat intelligence<\/a> services, which can independently detect any websites associated with the organization\u2019s brand.<\/p>\n<p><strong>Response:<\/strong> establish a policy for scheduled website shutdown after a fixed period following the end of its active use. Implement an automated DNS registration and renewal system to prevent the loss of control over the company\u2019s domains.<\/p>\n<h2>Unused network devices<\/h2>\n<p><strong>Priority: high.<\/strong> Routers, firewalls, surveillance cameras, and network storage devices that are connected but left unmanaged and unpatched make for the perfect attack launchpad. These forgotten devices often harbor vulnerabilities, and almost never have proper monitoring \u2014 no EDR or SIEM integration \u2014 yet they hold a privileged position in the network, giving hackers an easy gateway to escalate attacks on servers and workstations.<\/p>\n<p><strong>Prevalence:<\/strong> <strong>medium<\/strong>. Devices get left behind during office moves, network infrastructure upgrades, or temporary workspace setups.<\/p>\n<p><strong>Detection:<\/strong> use the same network inventory tools mentioned in the forgotten servers section, as well as regular physical audits to compare network scans against what\u2019s actually plugged in. Active network scanning can uncover entire untracked network segments and unexpected external connections.<\/p>\n<p><strong>Response:<\/strong> ownerless devices can usually be pulled offline immediately. But beware: cleaning them up requires the same care as scrubbing servers \u2014 to prevent leaks of network settings, passwords, office video footage, and so on.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"mdr\"><input type=\"hidden\" class=\"placeholder_for_banner\" data-cat_id=\"mdr\" value=\"49083\">\n","protected":false},"excerpt":{"rendered":"<p>How to eliminate the threat posed to organizations by ownerless servers and services, outdated libraries, and insecure APIs. <\/p>\n","protected":false},"author":2722,"featured_media":55037,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3051],"tags":[4693,2141,4445,398,97,3954,4228,131,121],"class_list":{"0":"post-55036","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"tag-api","10":"tag-business","11":"tag-legacy","12":"tag-patches","13":"tag-security-2","14":"tag-shadow-it","15":"tag-strategy","16":"tag-tips","17":"tag-updates"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/forsaken-servers-apis-apps-accounts-find-and-protect\/55036\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/forsaken-servers-apis-apps-accounts-find-and-protect\/28878\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/forsaken-servers-apis-apps-accounts-find-and-protect\/31755\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/forsaken-servers-apis-apps-accounts-find-and-protect\/30387\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/forsaken-servers-apis-apps-accounts-find-and-protect\/41031\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/forsaken-servers-apis-apps-accounts-find-and-protect\/14163\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/forsaken-servers-apis-apps-accounts-find-and-protect\/23508\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/forsaken-servers-apis-apps-accounts-find-and-protect\/33061\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/forsaken-servers-apis-apps-accounts-find-and-protect\/30027\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/updates\/","name":"updates"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/55036","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2722"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=55036"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/55036\/revisions"}],"predecessor-version":[{"id":55038,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/55036\/revisions\/55038"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/55037"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=55036"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=55036"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=55036"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}