Skip to content

Secure IT

Stay Secure. Stay Informed.

Primary Menu
  • Home
  • Sources
    • Krebs On Security
    • Security Week
    • The Hacker News
    • Schneier On Security
  • Home
  • The Hacker News
  • Think Your IdP or CASB Covers Shadow IT? These 5 Risks Prove Otherwise
  • The Hacker News

Think Your IdP or CASB Covers Shadow IT? These 5 Risks Prove Otherwise

[email protected] The Hacker News Published: June 9, 2025 | Updated: June 9, 2025 4 min read
0 views

Jun 09, 2025The Hacker News

You don’t need a rogue employee to suffer a breach.

All it takes is a free trial that someone forgot to cancel. An AI-powered note-taker quietly syncing with your Google Drive. A personal Gmail account tied to a business-critical tool. That’s shadow IT. And today, it’s not just about unsanctioned apps, but also dormant accounts, unmanaged identities, over-permissioned SaaS tools, and orphaned access. Most of it slips past even the most mature security solutions.

Think your CASB or IdP covers this? It doesn’t.

They weren’t built to catch what’s happening inside SaaS: OAuth sprawl, shadow admins, GenAI access, or apps created directly in platforms like Google Workspace or Slack. Shadow IT is no longer a visibility issue – it’s a full-blown attack surface.

Wing Security helps security teams uncover these risks before they become incidents.

Here are 5 real-world examples of shadow IT that could be quietly bleeding your data.

1. Dormant access you can’t see, that attackers love to exploit

  • The risk: Employees sign up for tools using just a username and password, without SSO or centralized visibility. Over time, they stop using the apps, but access stays, and worse, it is unmanaged.
  • The impact: These zombie accounts become invisible entry points into your environment. You can’t enforce MFA, monitor usage, or revoke access during offboarding.
  • Example: CISA and global cyber agencies issued a joint advisory warning in 2024 that Russian state-sponsored group APT29 (part of the SVR) actively targets dormant accounts to gain access to enterprise and government systems. These accounts often serve as ideal footholds since they go unnoticed, lack MFA, and remain accessible long after they’re no longer in use.

2. Generative AI quietly reading your emails, files, and strategy

  • The risk: SaaS apps powered by Generative AI usually request broad OAuth permissions with full access to read inboxes, files, calendars, and chats.
  • The impact: These SaaS apps often grant more access than required, exfiltrate sensitive data to third parties with unclear data retention and model training policies. Once access is granted, there’s no way to monitor how your data is stored, who has access internally, or what happens if the vendor is breached or misconfigures access.
  • Example: In 2024, DeepSeek accidentally exposed internal LLM training files containing sensitive data due to a misconfigured storage bucket, highlighting the risk of giving third-party GenAI tools broad access without oversight around data security.

3. Former employees still hold admin access, months after leaving

  • The risk: When employees onboard new SaaS tools (especially outside your IdP), they often are the sole admin. Even after they leave the company, their access remains.
  • The impact: These accounts can have persistent, privileged access to company tools, files, or environments, posing a long-term insider risk.
  • Real-life example: A contractor set up a time-tracking app and linked it to the company’s HR system. Months after their contract ended, they still had admin access to employee logs.

See what Wing uncovers in your SaaS environment. Talk with a security expert and get a demo.

4. Business-critical apps tied to personal accounts you don’t control

  • The risk: Employees sometimes use their personal Gmail, Apple ID, or other unmanaged accounts to sign up for business apps like Figma, Notion, or even Google Drive.
  • The impact: These accounts exist entirely outside of IT visibility. If they get compromised, you can’t revoke access or enforce security policies.
  • Example: In the 2023 Okta customer support breach, hackers exploited a service account without MFA that had access to Okta’s support system. The account was active, unmonitored, and not tied to a specific person. Even companies with mature identity systems can miss these blind spots.

5. Shadow SaaS with app-to-app connectivity to your crown jewels

  • The risk: Employees connect unsanctioned SaaS apps directly to trusted platforms like Google Workspace, Salesforce, or Slack—without IT involvement or review. These app-to-app connections often request broad API access and stay active long after use.
  • The impact: These integrations create hidden pathways into critical systems. If compromised, they can enable lateral movement, allowing attackers to pivot across apps, exfiltrate data, or maintain persistence without triggering traditional alerts.
  • Example: A product manager connected a roadmap tool to Jira and Google Drive. The integration requested broad access but was forgotten after the project ended. When the vendor was later breached, attackers used the lingering connection to pull files from Drive and pivot into Jira, accessing internal credentials and escalation paths. This type of lateral movement was seen in the 2024 Microsoft breach by Midnight Blizzard, where attackers leveraged a legacy OAuth app with mailbox access to evade detection and maintain persistent access to internal systems.

What are you doing about it?

Shadow IT isn’t just a governance problem—it’s a real security gap. And the longer it goes unnoticed, the bigger the risk and the more exposed your SaaS environment becomes.

Wing Security automatically discovers SaaS apps, users, and integrations—mapping human and non-human identities, permissions, and MFA status—without agents or proxies. Once the unknown becomes known, Wing delivers multi-layered SaaS security in one platform, unifying misconfigurations, identity threats, and SaaS risks into a single source of truth. By correlating events across apps and identities, Wing cuts through the noise, prioritizes what matters, and enables proactive, continuous security.

👉 Get a demo and take control of your SaaS environment – before hackers do.

Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Twitter  and LinkedIn to read more exclusive content we post.

About The Author

[email protected] The Hacker News

See author's posts

Original post here

What do you feel about this?

  • The Hacker News

Post navigation

Previous: OpenAI Bans ChatGPT Accounts Used by Russian, Iranian and Chinese Hacker Groups
Next: ⚡ Weekly Recap: Chrome 0-Day, Data Wipers, Misused Tools and Zero-Click iPhone Attacks

Author's Other Posts

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse whatsapp-sim.jpg

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

December 2, 2025 0 0
Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera korean.jpg

Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

December 2, 2025 0 1
GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools hacked.jpg

GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools

December 2, 2025 0 0
Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools npm-mal.jpg

Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools

December 2, 2025 0 1

Related Stories

whatsapp-sim.jpg
  • The Hacker News

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

[email protected] The Hacker News December 2, 2025 0 0
korean.jpg
  • The Hacker News

Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

[email protected] The Hacker News December 2, 2025 0 1
hacked.jpg
  • The Hacker News

GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools

[email protected] The Hacker News December 2, 2025 0 0
npm-mal.jpg
  • The Hacker News

Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools

[email protected] The Hacker News December 2, 2025 0 1
iran-hacking.jpg
  • The Hacker News

Iran-Linked Hackers Hits Israeli Sectors with New MuddyViper Backdoor in Targeted Attacks

[email protected] The Hacker News December 2, 2025 0 0
SecAlerts.jpg
  • The Hacker News

SecAlerts Cuts Through the Noise with a Smarter, Faster Way to Track Vulnerabilities

[email protected] The Hacker News December 2, 2025 0 0

Trending Now

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill 1

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill

December 6, 2025 0 0
SMS Phishers Pivot to Points, Taxes, Fake Retailers SMS Phishers Pivot to Points, Taxes, Fake Retailers 2

SMS Phishers Pivot to Points, Taxes, Fake Retailers

December 4, 2025 0 0
India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse whatsapp-sim.jpg 3

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

December 2, 2025 0 0
Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera korean.jpg 4

Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

December 2, 2025 0 1

Connect with Us

Social menu is not set. You need to create menu and assign it to Social Menu on Menu Settings.

Trending News

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill 1
  • Uncategorized

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill

December 6, 2025 0 0
SMS Phishers Pivot to Points, Taxes, Fake Retailers SMS Phishers Pivot to Points, Taxes, Fake Retailers 2
  • Uncategorized

SMS Phishers Pivot to Points, Taxes, Fake Retailers

December 4, 2025 0 0
India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse whatsapp-sim.jpg 3
  • The Hacker News

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

December 2, 2025 0 0
Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera korean.jpg 4
  • The Hacker News

Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

December 2, 2025 0 1
GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools hacked.jpg 5
  • The Hacker News

GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools

December 2, 2025 0 0
Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools npm-mal.jpg 6
  • The Hacker News

Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools

December 2, 2025 0 1
Iran-Linked Hackers Hits Israeli Sectors with New MuddyViper Backdoor in Targeted Attacks iran-hacking.jpg 7
  • The Hacker News

Iran-Linked Hackers Hits Israeli Sectors with New MuddyViper Backdoor in Targeted Attacks

December 2, 2025 0 0

You may have missed

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill
  • Uncategorized

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill

Sean December 6, 2025 0 0
SMS Phishers Pivot to Points, Taxes, Fake Retailers
  • Uncategorized

SMS Phishers Pivot to Points, Taxes, Fake Retailers

Sean December 4, 2025 0 0
whatsapp-sim.jpg
  • The Hacker News

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

[email protected] The Hacker News December 2, 2025 0 0
korean.jpg
  • The Hacker News

Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

[email protected] The Hacker News December 2, 2025 0 1
Copyright © 2026 All rights reserved. | MoreNews by AF themes.