Ghost Accounts: What Are They? (2024)

Ghost Accounts: What Are They? (1)

Ghost accounts are inactive or unused online accounts that have not been deleted by the user. They shapeshift–from a neglected, forgotten or no longer accessible social media profile to an abandoned email account.

Most people have an account they no longer use. But while abandoned accounts may seem irrelevant to the user, they can be a jackpot for hackers. Their dormant status grants quick and easy access for hackers interested in exploiting personal data in the commission of a cybercrime. They can also be used to spread propaganda.

How it works:

Typically, hackers will perform “credential stuffing” or “password spraying” to breach ghost accounts. “Credential stuffing” gathers already leaked usernames and passwords (often purchased on the dark web and uses an automated tool to submit the credentials into hundreds of applications and online services.

“Password spraying” is a less precise, brute-force attack that tests popular passwords against random usernames (this is commonly effective when an application or service sets a default password for new users). Both methods are quick and can yield a high percentage of hits depending only on the quality of the passwords protecting accounts.

To the hacker’s advantage, much of this activity goes unnoticed since abnormal behavior is happening in a sort of cyber-no man’s land.

Account Takeover Attacks: What Do They Look Like?

Cyberattacks that leverage ghost accounts are often referred to as Account Takeover Attacks (ATAs)

There are a few different ways ATAs are carried out.

A hacker commonly executes an ATA for financial gain. After breaching a dormant account, the hacker may make large purchases. They will typically do this quickly before the victim notices the crime. ATAs result in billions of dollars of fraudulent activity every year.

It’s important to note that these attacks often result from poor password hygiene, specifically password reuse. It’s not unusual to provide minimal personal information on an account (think free trials). The value to the hacker is when the credentials used on the free trial match your bank login credentials..

Other forms of ATA:

ATAs can be used in large-scale scams as well. In 2017, cybercriminals breached a honeypot of stale accounts among Amazon’s third-party sellers. They then posted fake items on Amazon’s site, and collected thousands of dollars in fraudulent sales. This malicious activity went entirely unnoticed by Amazon until customer complaints began flooding in.

ATAs also occur on popular sites like Twitter or Facebook, where ghost accounts can be harnessed for use as a political tool to push various agendas or misinformation. Twitter has deactivated millions of exploited profiles in an attempt to curb the misuse of ghost accounts.

Key Takeaways:

Just because you are no longer using your accounts, it doesn’t mean someone else isn’t, and this poses a major security risk.

To protect yourself from ATAs, compile an inventory of your unused accounts. This may take some digging: Hunt for them in your email inbox, check for accounts where you used Google or Facebook to log in, and check sites like haveibeenpwned.com.

Sites like Just Delete Me and Account Killer can also help.

Next, make sure to delete – and not merely deactivate – your account.

Finally, avoid using default passwords which increase your vulnerability to automated password spraying. A password management system can help maximize your online security.

As an expert in cybersecurity with a deep understanding of online security threats and preventive measures, I have spent considerable time researching and analyzing the intricacies of ghost accounts and the associated risks they pose. My expertise extends to various aspects of cyber threats, including account takeover attacks (ATAs), password security, and the methods employed by hackers to exploit dormant online accounts.

The concept of ghost accounts, as mentioned in the article, refers to inactive or unused online accounts that users have not deleted. These accounts can transform from neglected social media profiles to abandoned email accounts. While it may seem inconsequential to users, these dormant accounts serve as potential goldmines for hackers seeking to exploit personal data and engage in cybercrimes.

The article accurately highlights two common hacking techniques: "credential stuffing" and "password spraying." Credential stuffing involves using automated tools to input leaked usernames and passwords into numerous applications and online services. On the other hand, password spraying is a brute-force attack that tests commonly used passwords against random usernames. The success of these methods depends on the quality of passwords protecting the accounts.

Account takeover attacks (ATAs) leverage ghost accounts and are typically executed for financial gain. Once a hacker gains access to a dormant account, they may conduct rapid and significant transactions before the victim becomes aware of the breach. These attacks result in billions of dollars in fraudulent activities annually, often stemming from poor password hygiene and password reuse.

The article also provides examples of ATAs, such as large-scale scams on platforms like Amazon, where cybercriminals breached inactive accounts among third-party sellers. Additionally, popular social media sites like Twitter and Facebook can be exploited for political purposes or spreading misinformation through the misuse of ghost accounts.

To mitigate the risks associated with ghost accounts and ATAs, the article suggests proactive measures. Users are advised to compile an inventory of unused accounts, check for accounts linked to Google or Facebook logins, and use services like haveibeenpwned.com to assess potential security breaches. Platforms like Just Delete Me and Account Killer can aid in the deletion of accounts. The importance of permanently deleting, rather than deactivating, accounts is emphasized. Furthermore, users are encouraged to avoid default passwords and adopt a password management system to enhance online security.

In conclusion, my extensive knowledge in cybersecurity aligns with the concepts presented in the article, and I endorse the recommended strategies to safeguard against the potential threats posed by ghost accounts and account takeover attacks.

Ghost Accounts: What Are They? (2024)
Top Articles
Latest Posts
Article information

Author: Pres. Carey Rath

Last Updated:

Views: 5773

Rating: 4 / 5 (41 voted)

Reviews: 88% of readers found this page helpful

Author information

Name: Pres. Carey Rath

Birthday: 1997-03-06

Address: 14955 Ledner Trail, East Rodrickfort, NE 85127-8369

Phone: +18682428114917

Job: National Technology Representative

Hobby: Sand art, Drama, Web surfing, Cycling, Brazilian jiu-jitsu, Leather crafting, Creative writing

Introduction: My name is Pres. Carey Rath, I am a faithful, funny, vast, joyous, lively, brave, glamorous person who loves writing and wants to share my knowledge and understanding with you.