{"id":28178,"date":"2025-09-17T22:33:11","date_gmt":"2025-09-17T22:33:11","guid":{"rendered":"https:\/\/www.adminbyrequest.com\/?p=28178"},"modified":"2026-01-24T22:44:31","modified_gmt":"2026-01-24T22:44:31","slug":"dormant-admin-accounts-fuel-tomorrows-security-breaches","status":"publish","type":"post","link":"https:\/\/www.adminbyrequest.com\/en\/blogs\/dormant-admin-accounts-fuel-tomorrows-security-breaches","title":{"rendered":"Dormant Admin Accounts Fuel Tomorrow&#8217;s Security Breaches"},"content":{"rendered":"\n<p>Admin accounts don&#8217;t disappear when employees leave or projects end. They just sit there, fully privileged and forgotten, until someone with bad intentions finds them. Even as your security team monitors active threats and current users, dormant admin accounts stay largely invisible while being every bit as dangerous.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why These Accounts Are Security Goldmines<\/h2>\n\n\n\n<p>Dormant admin accounts give attackers everything they want but generate no expected activity, so compromise often goes undetected for weeks or months. They typically have weak or unchanged passwords from when they were created.<\/p>\n\n\n\n<p>When was the last time you checked on that admin account created for a contractor who left six months ago? Or the backup domain admin account that hasn&#8217;t been used since the last emergency? <\/p>\n\n\n\n<p>The risk compounds when you consider that many dormant accounts were created with excessive permissions to begin with. Emergency situations and tight deadlines often lead to &#8220;just give them domain admin&#8221; decisions that never get revisited.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/09\/inline-1-4-1024x576.png\" alt=\"\" class=\"wp-image-28180\" srcset=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/09\/inline-1-4-1024x576.png 1024w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/09\/inline-1-4-300x169.png 300w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/09\/inline-1-4-768x432.png 768w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/09\/inline-1-4-1536x864.png 1536w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/09\/inline-1-4-800x450.png 800w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/09\/inline-1-4.png 1820w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">How Attackers Find and Use Them<\/h2>\n\n\n\n<p>The methods attackers use to identify dormant accounts are surprisingly straightforward.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Credential stuffing with stolen data<\/strong> \u2013 Attackers cross-reference leaked username and password combinations from other breaches against your systems. Dormant accounts rarely have updated passwords, making this surprisingly effective.<\/li>\n\n\n\n<li><strong>Post-breach reconnaissance<\/strong> \u2013 Once inside your network through any means, attackers enumerate accounts to find ones with admin privileges but no recent activity.<\/li>\n\n\n\n<li><strong>Social engineering former employees<\/strong> \u2013 LinkedIn research may turn up former staff usernames, which attackers combine with common passwords or data from previous breaches.<\/li>\n<\/ol>\n\n\n\n<p>Once they gain access, attackers can operate with legitimate admin credentials, making their network activity blend with normal administrative tasks. Security logs show authorized access rather than intrusion attempts.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Where These Accounts Hide<\/h2>\n\n\n\n<p>Active Directory serves as the primary repository for forgotten power. Former employee accounts get disabled rather than deleted, often keeping their original group memberships intact. Service accounts created for long-dead applications maintain domain admin rights nobody remembers granting.<\/p>\n\n\n\n<p>Local systems present different challenges. Windows servers accumulate local admin accounts from various troubleshooting sessions, while Linux systems run legacy applications with sudo access tied to former developers. Network devices store admin credentials for staff who left years ago.<\/p>\n\n\n\n<p>Cloud environments multiply these problems because provisioning happens so quickly that proper documentation and cleanup processes get skipped. A startup that grew from 10 to 100 employees might discover 15-20 dormant cloud admin accounts from former staff, contractors, and over-provisioned service accounts.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Cost of Compromise<\/h2>\n\n\n\n<p>When dormant accounts get compromised, attackers gain undetected lateral movement capabilities using legitimate admin credentials. This access reaches sensitive repositories, customer databases, and intellectual property without triggering data loss prevention systems designed to catch unauthorized access patterns.<\/p>\n\n\n\n<p>Admin access also accelerates ransomware campaigns. Attackers can disable security tools, delete backups, and deploy malware across entire networks more efficiently than other compromise methods.<\/p>\n\n\n\n<p>The financial impact includes extended downtime, customer notification requirements, and regulatory penalties when audits reveal poor access governance practices. Organizations often face compliance violations specifically because dormant accounts demonstrate inadequate access management.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why Access Reviews Don&#8217;t Always Work<\/h2>\n\n\n\n<p>Most organizations handle dormant accounts through quarterly or annual access reviews, but manual reviews don&#8217;t scale when you&#8217;re examining hundreds or thousands of accounts across multiple systems. <a href=\"https:\/\/www.nist.gov\/news-events\/news\/2016\/10\/security-fatigue-can-cause-computer-users-feel-hopeless-and-act-recklessly\" target=\"_blank\" rel=\"noopener\" title=\"\">IT teams get overwhelmed<\/a> and rubber-stamp renewals rather than investigating thoroughly.<\/p>\n\n\n\n<p>Context also matters more than most reviews provide. Without proper documentation, determining whether an account is genuinely dormant or just used infrequently becomes guesswork. Business continuity fears lead to &#8220;better safe than sorry&#8221; decisions that keep questionable accounts active.<\/p>\n\n\n\n<p>Timing creates blind spots too. Quarterly reviews mean dormant accounts can exist for months between checks, giving attackers plenty of opportunity to discover and exploit them.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/09\/inline-2-4-1024x576.png\" alt=\"\" class=\"wp-image-28181\" srcset=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/09\/inline-2-4-1024x576.png 1024w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/09\/inline-2-4-300x169.png 300w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/09\/inline-2-4-768x432.png 768w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/09\/inline-2-4-1536x864.png 1536w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/09\/inline-2-4-800x450.png 800w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/09\/inline-2-4.png 1820w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">A Better Approach: Just-in-Time Access<\/h2>\n\n\n\n<p>Instead of managing which accounts should have permanent admin rights, it\u2019s much better to manage which users can request temporary elevation for approved tasks. <a href=\"\/en\/blogs\/just-in-time-access-the-key-to-balancing-security-and-productivity\" target=\"_blank\" rel=\"noopener\" title=\"\">Just-in-time privilege models<\/a> eliminate dormant account risks by removing permanent privileges entirely.<\/p>\n\n\n\n<p>Users request elevation for specific tasks, receive temporary admin rights, then return to standard user status. There are no long-term admin accounts sitting around waiting to be discovered.<\/p>\n\n\n\n<p><a href=\"\/en\/endpoint-privilege-management\" target=\"_blank\" rel=\"noopener\" title=\"\">Admin By Request&#8217;s EPM solution<\/a> implements this model effectively. The security question shifts from &#8220;who can be an admin&#8221; to &#8220;who can become an admin temporarily when needed.&#8221; This approach eliminates most dormant account attack vectors while maintaining operational efficiency.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Taking Action<\/h2>\n\n\n\n<p>Most organizations discover they have far more dormant admin accounts than expected once they start looking systematically. The key is approaching this methodically rather than hoping periodic access reviews will catch everything.<\/p>\n\n\n\n<p>Start by identifying what you&#8217;re dealing with:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Run automated discovery tools across all systems to find admin accounts<\/li>\n\n\n\n<li>Cross-reference account lists with recent activity logs<\/li>\n\n\n\n<li>Document which accounts have business justification for existing<\/li>\n\n\n\n<li>Flag accounts with no activity in the past 90 days for immediate review<\/li>\n<\/ul>\n\n\n\n<p>Prioritize cleanup based on privilege level and system criticality. A dormant domain admin account poses more risk than a dormant local admin on a test server. For ongoing protection, implement time-based access controls for new admin accounts so they expire automatically rather than requiring manual cleanup.<\/p>\n\n\n\n<p>The long-term solution involves transitioning to just-in-time privilege models. Instead of maintaining emergency admin accounts that sit dormant until needed, implement processes where authorized staff can quickly elevate privileges during actual emergencies. This eliminates the dormant account problem while maintaining operational capabilities.<\/p>\n\n\n\n<p>Ready to eliminate dormant admin account risks? <a href=\"\/en\/freeplandownload\" target=\"_blank\" rel=\"noopener\" title=\"\">Start with our free plan<\/a> to see how Admin By Request EPM works in your environment, or <a href=\"https:\/\/www.adminbyrequest.com\/en\/book-a-live-demo\" target=\"_blank\" rel=\"noopener\" title=\"\">book a demo<\/a>. <\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Frequently Asked Questions<\/h2>\n\n\n\n<div data-schema-only=\"false\" class=\"wp-block-aioseo-faq\"><h3 class=\"aioseo-faq-block-question\">How long should an admin account be inactive before it&#8217;s considered dormant?<\/h3><div class=\"aioseo-faq-block-answer\">\n<p>Most security experts recommend flagging accounts with no activity for 90 days, but the timeframe depends on your organization&#8217;s needs. Contractor accounts might be considered dormant after 30 days, while emergency accounts could have longer thresholds.<\/p>\n<\/div><\/div>\n\n\n\n<div data-schema-only=\"false\" class=\"wp-block-aioseo-faq\"><h3 class=\"aioseo-faq-block-question\">Can&#8217;t we just disable accounts instead of deleting them?<\/h3><div class=\"aioseo-faq-block-answer\">\n<p>Disabled accounts still pose risks if attackers find ways to re-enable them or if they retain certain permissions. Complete removal is safer, but make sure you have proper backups and documentation before deletion.<\/p>\n<\/div><\/div>\n\n\n\n<div data-schema-only=\"false\" class=\"wp-block-aioseo-faq\"><h3 class=\"aioseo-faq-block-question\">How do we identify dormant accounts in cloud environments?<\/h3><div class=\"aioseo-faq-block-answer\">\n<p>Most cloud platforms provide activity logs and last-login timestamps. Use AWS CloudTrail, Azure Activity Logs, or Google Cloud Audit Logs to identify accounts with no recent activity. Automated tools can scan multiple cloud environments simultaneously.<\/p>\n<\/div><\/div>\n\n\n\n<div data-schema-only=\"false\" class=\"wp-block-aioseo-faq\"><h3 class=\"aioseo-faq-block-question\">Why don&#8217;t standard security tools catch dormant account abuse?<\/h3><div class=\"aioseo-faq-block-answer\">\n<p>Security tools look for unusual behavior patterns, but dormant accounts have no established baseline of normal activity. When attackers use them, there&#8217;s no &#8220;usual&#8221; pattern to compare against, so the activity appears legitimate.<\/p>\n<\/div><\/div>\n\n\n\n<div data-schema-only=\"false\" class=\"wp-block-aioseo-faq\"><h3 class=\"aioseo-faq-block-question\"><strong>How quickly can attackers find dormant accounts after getting network access?<\/strong>\u00a0<\/h3><div class=\"aioseo-faq-block-answer\">\n<p>Automated tools can enumerate all accounts with admin privileges in minutes. Attackers often prioritize accounts with login dates in the past but no current activity, indicating they&#8217;re likely forgotten but still functional.<\/p>\n\n\n\n<p><\/p>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Privileged accounts with no recent activity often escape audits. Attackers identify and exploit them, posing major risks to your environment.<\/p>\n","protected":false},"author":16,"featured_media":28182,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[21,148,518,67,68],"ppma_author":[428],"class_list":["post-28178","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogs","tag-admin-rights","tag-cybersecurity","tag-dormant-admin-accounts","tag-pam","tag-privileged-access-management","entry","has-media"],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.9.5.2 - aioseo.com -->\n\t<meta name=\"description\" content=\"Privileged accounts with no recent activity often escape audits. Attackers identify and exploit them, posing major risks to your environment.\" \/>\n\t<meta name=\"robots\" content=\"max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n\t<meta name=\"author\" content=\"Pocholo Legaspi\"\/>\n\t<meta name=\"keywords\" content=\"admin rights,cybersecurity,dormant admin accounts,pam,privileged access management\" \/>\n\t<link rel=\"canonical\" href=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/dormant-admin-accounts-fuel-tomorrows-security-breaches\" \/>\n\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.9.5.2\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Admin By Request \u00bb Local Admin Rights, Managed.\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"Dormant Admin Accounts Fuel Tomorrow\u2019s Security Breaches\" \/>\n\t\t<meta property=\"og:description\" content=\"Privileged accounts with no recent activity often escape audits. Attackers identify and exploit them, posing major risks to your environment.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/dormant-admin-accounts-fuel-tomorrows-security-breaches\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2025-09-17T22:33:11+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2026-01-24T22:44:31+00:00\" \/>\n\t\t<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/adminbyrequest\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:site\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Dormant Admin Accounts Fuel Tomorrow\u2019s Security Breaches\" \/>\n\t\t<meta name=\"twitter:description\" content=\"Privileged accounts with no recent activity often escape audits. Attackers identify and exploit them, posing major risks to your environment.\" \/>\n\t\t<meta name=\"twitter:creator\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"BlogPosting\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/dormant-admin-accounts-fuel-tomorrows-security-breaches#blogposting\",\"name\":\"Dormant Admin Accounts Fuel Tomorrow\\u2019s Security Breaches\",\"headline\":\"Dormant Admin Accounts Fuel Tomorrow&#8217;s Security Breaches\",\"author\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/pocholo-editor#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/main-6.png\",\"width\":1820,\"height\":1024},\"datePublished\":\"2025-09-17T22:33:11+00:00\",\"dateModified\":\"2026-01-24T22:44:31+00:00\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/dormant-admin-accounts-fuel-tomorrows-security-breaches#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/dormant-admin-accounts-fuel-tomorrows-security-breaches#webpage\"},\"articleSection\":\"Blogs, admin rights, Cybersecurity, Dormant Admin Accounts, PAM, Privileged Access Management, Pocholo Legaspi\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/dormant-admin-accounts-fuel-tomorrows-security-breaches#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"name\":\"Blogs\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"position\":2,\"name\":\"Blogs\",\"item\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/dormant-admin-accounts-fuel-tomorrows-security-breaches#listItem\",\"name\":\"Dormant Admin Accounts Fuel Tomorrow&#8217;s Security Breaches\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/dormant-admin-accounts-fuel-tomorrows-security-breaches#listItem\",\"position\":3,\"name\":\"Dormant Admin Accounts Fuel Tomorrow&#8217;s Security Breaches\",\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"name\":\"Blogs\"}}]},{\"@type\":\"FAQPage\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/dormant-admin-accounts-fuel-tomorrows-security-breaches#faq\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/dormant-admin-accounts-fuel-tomorrows-security-breaches\",\"mainEntity\":[{\"@type\":\"Question\",\"name\":\"How long should an admin account be inactive before it's considered dormant?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Most security experts recommend flagging accounts with no activity for 90 days, but the timeframe depends on your organization's needs. Contractor accounts might be considered dormant after 30 days, while emergency accounts could have longer thresholds.\"}},{\"@type\":\"Question\",\"name\":\"Can't we just disable accounts instead of deleting them?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Disabled accounts still pose risks if attackers find ways to re-enable them or if they retain certain permissions. Complete removal is safer, but make sure you have proper backups and documentation before deletion.\"}},{\"@type\":\"Question\",\"name\":\"How do we identify dormant accounts in cloud environments?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Most cloud platforms provide activity logs and last-login timestamps. Use AWS CloudTrail, Azure Activity Logs, or Google Cloud Audit Logs to identify accounts with no recent activity. Automated tools can scan multiple cloud environments simultaneously.\"}},{\"@type\":\"Question\",\"name\":\"Why don't standard security tools catch dormant account abuse?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Security tools look for unusual behavior patterns, but dormant accounts have no established baseline of normal activity. When attackers use them, there's no \\\"usual\\\" pattern to compare against, so the activity appears legitimate.\"}},{\"@type\":\"Question\",\"name\":\"How quickly can attackers find dormant accounts after getting network access?\\u00a0\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Automated tools can enumerate all accounts with admin privileges in minutes. Attackers often prioritize accounts with login dates in the past but no current activity, indicating they're likely forgotten but still functional.\"}}],\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/dormant-admin-accounts-fuel-tomorrows-security-breaches#breadcrumblist\"}},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\",\"name\":\"Admin By Request\",\"description\":\"Local Admin Rights, Managed.\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"telephone\":\"+12622994600\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Circle-Tick-24.svg\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/dormant-admin-accounts-fuel-tomorrows-security-breaches\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/dormant-admin-accounts-fuel-tomorrows-security-breaches\\\/#organizationLogo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/adminbyrequest\",\"https:\\\/\\\/twitter.com\\\/AdminByRequest\",\"https:\\\/\\\/www.instagram.com\\\/AdminByRequest\\\/\",\"https:\\\/\\\/www.tiktok.com\\\/@adminbyrequest\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCwq1wlbT9m_z3YH-EPaZqKw\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/adminbyrequest\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/pocholo-editor#author\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/pocholo-editor\",\"name\":\"Pocholo Legaspi\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/dormant-admin-accounts-fuel-tomorrows-security-breaches#webpage\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/dormant-admin-accounts-fuel-tomorrows-security-breaches\",\"name\":\"Dormant Admin Accounts Fuel Tomorrow\\u2019s Security Breaches\",\"description\":\"Privileged accounts with no recent activity often escape audits. Attackers identify and exploit them, posing major risks to your environment.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/dormant-admin-accounts-fuel-tomorrows-security-breaches#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/pocholo-editor#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/pocholo-editor#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/main-6.png\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/dormant-admin-accounts-fuel-tomorrows-security-breaches\\\/#mainImage\",\"width\":1820,\"height\":1024},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/dormant-admin-accounts-fuel-tomorrows-security-breaches#mainImage\"},\"datePublished\":\"2025-09-17T22:33:11+00:00\",\"dateModified\":\"2026-01-24T22:44:31+00:00\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"name\":\"Admin By Request\",\"alternateName\":\"ABR\",\"description\":\"Local Admin Rights, Managed.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<script type=\"text\/javascript\">\n\t\t\t(function(c,l,a,r,i,t,y){\n\t\t\tc[a]=c[a]||function(){(c[a].q=c[a].q||[]).push(arguments)};t=l.createElement(r);t.async=1;\n\t\t\tt.src=\"https:\/\/www.clarity.ms\/tag\/\"+i+\"?ref=aioseo\";y=l.getElementsByTagName(r)[0];y.parentNode.insertBefore(t,y);\n\t\t})(window, document, \"clarity\", \"script\", \"n4woz8og40\");\n\t\t<\/script>\n\t\t<script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src='https:\/\/www.googletagmanager.com\/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f);})(window,document,'script','dataLayer',\"GTM-PGQ6572W\");<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Dormant Admin Accounts Fuel Tomorrow\u2019s Security Breaches<\/title>\n\n","aioseo_head_json":{"title":"Dormant Admin Accounts Fuel Tomorrow\u2019s Security Breaches","description":"Privileged accounts with no recent activity often escape audits. Attackers identify and exploit them, posing major risks to your environment.","canonical_url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/dormant-admin-accounts-fuel-tomorrows-security-breaches","robots":"max-snippet:-1, max-image-preview:large, max-video-preview:-1","keywords":"admin rights,cybersecurity,dormant admin accounts,pam,privileged access management","webmasterTools":{"miscellaneous":""},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BlogPosting","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/dormant-admin-accounts-fuel-tomorrows-security-breaches#blogposting","name":"Dormant Admin Accounts Fuel Tomorrow\u2019s Security Breaches","headline":"Dormant Admin Accounts Fuel Tomorrow&#8217;s Security Breaches","author":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/pocholo-editor#author"},"publisher":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/09\/main-6.png","width":1820,"height":1024},"datePublished":"2025-09-17T22:33:11+00:00","dateModified":"2026-01-24T22:44:31+00:00","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/dormant-admin-accounts-fuel-tomorrows-security-breaches#webpage"},"isPartOf":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/dormant-admin-accounts-fuel-tomorrows-security-breaches#webpage"},"articleSection":"Blogs, admin rights, Cybersecurity, Dormant Admin Accounts, PAM, Privileged Access Management, Pocholo Legaspi"},{"@type":"BreadcrumbList","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/dormant-admin-accounts-fuel-tomorrows-security-breaches#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","position":1,"name":"Home","item":"https:\/\/www.adminbyrequest.com\/en","nextItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","name":"Blogs"}},{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","position":2,"name":"Blogs","item":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs","nextItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/dormant-admin-accounts-fuel-tomorrows-security-breaches#listItem","name":"Dormant Admin Accounts Fuel Tomorrow&#8217;s Security Breaches"},"previousItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","name":"Home"}},{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/dormant-admin-accounts-fuel-tomorrows-security-breaches#listItem","position":3,"name":"Dormant Admin Accounts Fuel Tomorrow&#8217;s Security Breaches","previousItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","name":"Blogs"}}]},{"@type":"FAQPage","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/dormant-admin-accounts-fuel-tomorrows-security-breaches#faq","url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/dormant-admin-accounts-fuel-tomorrows-security-breaches","mainEntity":[{"@type":"Question","name":"How long should an admin account be inactive before it's considered dormant?","acceptedAnswer":{"@type":"Answer","text":"Most security experts recommend flagging accounts with no activity for 90 days, but the timeframe depends on your organization's needs. Contractor accounts might be considered dormant after 30 days, while emergency accounts could have longer thresholds."}},{"@type":"Question","name":"Can't we just disable accounts instead of deleting them?","acceptedAnswer":{"@type":"Answer","text":"Disabled accounts still pose risks if attackers find ways to re-enable them or if they retain certain permissions. Complete removal is safer, but make sure you have proper backups and documentation before deletion."}},{"@type":"Question","name":"How do we identify dormant accounts in cloud environments?","acceptedAnswer":{"@type":"Answer","text":"Most cloud platforms provide activity logs and last-login timestamps. Use AWS CloudTrail, Azure Activity Logs, or Google Cloud Audit Logs to identify accounts with no recent activity. Automated tools can scan multiple cloud environments simultaneously."}},{"@type":"Question","name":"Why don't standard security tools catch dormant account abuse?","acceptedAnswer":{"@type":"Answer","text":"Security tools look for unusual behavior patterns, but dormant accounts have no established baseline of normal activity. When attackers use them, there's no \"usual\" pattern to compare against, so the activity appears legitimate."}},{"@type":"Question","name":"How quickly can attackers find dormant accounts after getting network access?\u00a0","acceptedAnswer":{"@type":"Answer","text":"Automated tools can enumerate all accounts with admin privileges in minutes. Attackers often prioritize accounts with login dates in the past but no current activity, indicating they're likely forgotten but still functional."}},{"@type":"Question","name":"How long should an admin account be inactive before it's considered dormant?","acceptedAnswer":{"@type":"Answer","text":"Most security experts recommend flagging accounts with no activity for 90 days, but the timeframe depends on your organization's needs. Contractor accounts might be considered dormant after 30 days, while emergency accounts could have longer thresholds."}},{"@type":"Question","name":"Can't we just disable accounts instead of deleting them?","acceptedAnswer":{"@type":"Answer","text":"Disabled accounts still pose risks if attackers find ways to re-enable them or if they retain certain permissions. Complete removal is safer, but make sure you have proper backups and documentation before deletion."}},{"@type":"Question","name":"How do we identify dormant accounts in cloud environments?","acceptedAnswer":{"@type":"Answer","text":"Most cloud platforms provide activity logs and last-login timestamps. Use AWS CloudTrail, Azure Activity Logs, or Google Cloud Audit Logs to identify accounts with no recent activity. Automated tools can scan multiple cloud environments simultaneously."}},{"@type":"Question","name":"Why don't standard security tools catch dormant account abuse?","acceptedAnswer":{"@type":"Answer","text":"Security tools look for unusual behavior patterns, but dormant accounts have no established baseline of normal activity. When attackers use them, there's no \"usual\" pattern to compare against, so the activity appears legitimate."}},{"@type":"Question","name":"How quickly can attackers find dormant accounts after getting network access?\u00a0","acceptedAnswer":{"@type":"Answer","text":"Automated tools can enumerate all accounts with admin privileges in minutes. Attackers often prioritize accounts with login dates in the past but no current activity, indicating they're likely forgotten but still functional."}}],"inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#website"},"breadcrumb":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/dormant-admin-accounts-fuel-tomorrows-security-breaches#breadcrumblist"}},{"@type":"Organization","@id":"https:\/\/www.adminbyrequest.com\/en\/#organization","name":"Admin By Request","description":"Local Admin Rights, Managed.","url":"https:\/\/www.adminbyrequest.com\/en\/","telephone":"+12622994600","logo":{"@type":"ImageObject","url":"\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/dormant-admin-accounts-fuel-tomorrows-security-breaches\/#organizationLogo"},"image":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/dormant-admin-accounts-fuel-tomorrows-security-breaches\/#organizationLogo"},"sameAs":["https:\/\/www.facebook.com\/adminbyrequest","https:\/\/twitter.com\/AdminByRequest","https:\/\/www.instagram.com\/AdminByRequest\/","https:\/\/www.tiktok.com\/@adminbyrequest","https:\/\/www.youtube.com\/channel\/UCwq1wlbT9m_z3YH-EPaZqKw","https:\/\/www.linkedin.com\/company\/adminbyrequest\/"]},{"@type":"Person","@id":"https:\/\/www.adminbyrequest.com\/en\/author\/pocholo-editor#author","url":"https:\/\/www.adminbyrequest.com\/en\/author\/pocholo-editor","name":"Pocholo Legaspi"},{"@type":"WebPage","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/dormant-admin-accounts-fuel-tomorrows-security-breaches#webpage","url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/dormant-admin-accounts-fuel-tomorrows-security-breaches","name":"Dormant Admin Accounts Fuel Tomorrow\u2019s Security Breaches","description":"Privileged accounts with no recent activity often escape audits. Attackers identify and exploit them, posing major risks to your environment.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#website"},"breadcrumb":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/dormant-admin-accounts-fuel-tomorrows-security-breaches#breadcrumblist"},"author":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/pocholo-editor#author"},"creator":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/pocholo-editor#author"},"image":{"@type":"ImageObject","url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/09\/main-6.png","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/dormant-admin-accounts-fuel-tomorrows-security-breaches\/#mainImage","width":1820,"height":1024},"primaryImageOfPage":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/dormant-admin-accounts-fuel-tomorrows-security-breaches#mainImage"},"datePublished":"2025-09-17T22:33:11+00:00","dateModified":"2026-01-24T22:44:31+00:00"},{"@type":"WebSite","@id":"https:\/\/www.adminbyrequest.com\/en\/#website","url":"https:\/\/www.adminbyrequest.com\/en\/","name":"Admin By Request","alternateName":"ABR","description":"Local Admin Rights, Managed.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#organization"}}]},"og:locale":"en_US","og:site_name":"Admin By Request \u00bb Local Admin Rights, Managed.","og:type":"article","og:title":"Dormant Admin Accounts Fuel Tomorrow\u2019s Security Breaches","og:description":"Privileged accounts with no recent activity often escape audits. Attackers identify and exploit them, posing major risks to your environment.","og:url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/dormant-admin-accounts-fuel-tomorrows-security-breaches","og:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","og:image:secure_url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","article:published_time":"2025-09-17T22:33:11+00:00","article:modified_time":"2026-01-24T22:44:31+00:00","article:publisher":"https:\/\/www.facebook.com\/adminbyrequest","twitter:card":"summary_large_image","twitter:site":"@AdminByRequest","twitter:title":"Dormant Admin Accounts Fuel Tomorrow\u2019s Security Breaches","twitter:description":"Privileged accounts with no recent activity often escape audits. Attackers identify and exploit them, posing major risks to your environment.","twitter:creator":"@AdminByRequest","twitter:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg"},"aioseo_meta_data":{"post_id":"28178","title":"#post_title","description":"#post_excerpt","keywords":null,"keyphrases":{"focus":{"keyphrase":"dormant admin accounts","score":60,"analysis":{"keyphraseInTitle":{"score":9,"maxScore":9,"error":0},"keyphraseInDescription":{"score":3,"maxScore":9,"error":1},"keyphraseLength":{"score":9,"maxScore":9,"error":0,"length":3},"keyphraseInURL":{"score":5,"maxScore":5,"error":0},"keyphraseInIntroduction":{"score":9,"maxScore":9,"error":0},"keyphraseInSubHeadings":{"score":3,"maxScore":9,"error":1},"keyphraseInImageAlt":{"score":3,"maxScore":9,"error":1},"keywordDensity":{"score":0,"type":"low","maxScore":9,"error":1}}},"additional":[]},"primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":null,"og_article_tags":null,"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[{"hidden":false,"schemaBlockId":"aioseo-mfq1wsn7","tagName":"h3","answer":"Most security experts recommend flagging accounts with no activity for 90 days, but the timeframe depends on your organization's needs. Contractor accounts might be considered dormant after 30 days, while emergency accounts could have longer thresholds.","type":"aioseo\/faq","question":"How long should an admin account be inactive before it's considered dormant?"},{"hidden":false,"schemaBlockId":"aioseo-mfq1xe0z","tagName":"h3","answer":"Disabled accounts still pose risks if attackers find ways to re-enable them or if they retain certain permissions. Complete removal is safer, but make sure you have proper backups and documentation before deletion.","type":"aioseo\/faq","question":"Can't we just disable accounts instead of deleting them?"},{"hidden":false,"schemaBlockId":"aioseo-mfq1y8gp","tagName":"h3","answer":"Most cloud platforms provide activity logs and last-login timestamps. Use AWS CloudTrail, Azure Activity Logs, or Google Cloud Audit Logs to identify accounts with no recent activity. Automated tools can scan multiple cloud environments simultaneously.","type":"aioseo\/faq","question":"How do we identify dormant accounts in cloud environments?"},{"hidden":false,"schemaBlockId":"aioseo-mfq1yv5v","tagName":"h3","answer":"Security tools look for unusual behavior patterns, but dormant accounts have no established baseline of normal activity. When attackers use them, there's no \"usual\" pattern to compare against, so the activity appears legitimate.","type":"aioseo\/faq","question":"Why don't standard security tools catch dormant account abuse?"},{"hidden":false,"schemaBlockId":"aioseo-mfq20qnb","tagName":"h3","answer":"Automated tools can enumerate all accounts with admin privileges in minutes. Attackers often prioritize accounts with login dates in the past but no current activity, indicating they're likely forgotten but still functional.","type":"aioseo\/faq","question":"How quickly can attackers find dormant accounts after getting network access?\u00a0"}],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"ProductReview":[],"Car":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"BlogPosting","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":null,"pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"seo_analyzer_scan_date":"2026-01-24 22:44:46","breadcrumb_settings":null,"limit_modified_date":false,"reviewed_by":null,"open_ai":null,"ai":{"faqs":[],"keyPoints":[],"titles":[],"descriptions":[],"socialPosts":{"email":[],"linkedin":[],"twitter":[],"facebook":[],"instagram":[]}},"created":"2025-09-18 22:33:11","updated":"2026-01-24 22:44:47"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.adminbyrequest.com\/en\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.adminbyrequest.com\/en\/category\/blogs\" title=\"Blogs\">Blogs<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\tDormant Admin Accounts Fuel Tomorrow\u2019s Security Breaches\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.adminbyrequest.com\/en"},{"label":"Blogs","link":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs"},{"label":"Dormant Admin Accounts Fuel Tomorrow&#8217;s Security Breaches","link":"https:\/\/www.adminbyrequest.com\/en\/blogs\/dormant-admin-accounts-fuel-tomorrows-security-breaches"}],"authors":[{"term_id":428,"user_id":16,"is_guest":0,"slug":"pocholo-editor","display_name":"Pocholo Legaspi","avatar_url":{"url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/04\/Pocholo-Headshot.jpg","url2x":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/04\/Pocholo-Headshot.jpg"},"author_category":"1","user_url":"","last_name":"Legaspi","first_name":"Pocholo","job_title":"","description":"Pocholo Legaspi is a seasoned content marketer and SEO specialist with over nine years of experience crafting digital content that drives engagement and growth. With a background in tech and a Master\u2019s in Business Informatics, he brings a data-driven approach to content strategy and storytelling."}],"_links":{"self":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/28178","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/comments?post=28178"}],"version-history":[{"count":2,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/28178\/revisions"}],"predecessor-version":[{"id":28184,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/28178\/revisions\/28184"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/media\/28182"}],"wp:attachment":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/media?parent=28178"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/categories?post=28178"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/tags?post=28178"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/ppma_author?post=28178"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}