Home > Threat Library > User account with old passwords

User account with old passwords

Cayosoft Threat Definition CTD-000072

Protect Your Active Directory

Tune into Guardians of the Directory Podcast.

Guardians of the Directory

Stop AD Threats As They Happen

Cayosoft Protector provides continuous monitoring and real-time alerts across your entire Microsoft Identity stack

Like This Article?​

Subscribe to our LinkedIn Newsletter to receive more educational content

Risk Summary

An Active Directory user account whose password is not changed periodically can be easily compromised. Long-lived passwords enable password spraying, reuse across systems, and undetected persistence. Regular rotation shortens the window in which a stolen credential remains valid. 

  • Severity: Low 
  • Platform: Active Directory
  • Category: Account protection
  • MITRE ATT&CK Tactics: Credential Access, Persistence
  • MITRE D3FEND Tactics: Credential Rotation 

Description

An account that has not changed its password within policy increases the chance of compromise and subsequent privilege escalation. Regular password rotation reduces the risk and effectiveness of password-based attacks by limiting credential lifetime. 
Note: Cayosoft Guardian defines privileged users in Active Directory as users with adminCount=1 (used by AD to protect members of administrative groups). 

Cayosoft Guardian Protector™

Real-World Scenario

An attacker performs password spraying against VPN and OWA using a small set of common passwords. A helpdesk account whose password hasn’t changed in many months matches the attacker’s spray. With the foothold, the attacker harvests shares, dumps cached creds from a workstation, and schedules tasks to maintain access. Cayosoft Guardian flags User account with old passwords (CTD-000072), surfacing the domain and last password change so responders can rotate the credential and investigate lateral movement. 

Stop Privilege Escalation—Then Undo It with Cayosoft Guardian Audit & Restore

Real-time alerts across AD & Entra ID with one-click rollback.

Detect this and other threats with Cayosoft Guardian Protector (Free of Charge)

1.) Download Cayosoft Guardian Protector for free real-time threat detection and monitoring of your hybrid AD and Microsoft 365 environment. Once downloaded, sign in and navigate to the Threat Detection Dashboard. 

2.) Open All Alerts and search for CTD-000072 or “User account with old passwords.” 

3.) Open any alert and Click for details (from Raise Threat Alert action).

4.) Evidence:

  • AD domain 
  • Last password change 

Remediation Steps

Using the remediation advice in Cayosoft Guardian, follow these steps to remove the vulnerability:

Change the password of the account. Implement regular password rotation.

How to Prevent It

Cayosoft Guardian can proactively detect and alert on User account with old passwords. It continuously monitors Active Directory, Entra ID, Microsoft 365, and Intune for 200+ misconfigurations, providing early warning before attackers can exploit them. 

FAQ

They greatly increase the chance of compromise via password spraying, brute-force attempts, credential reuse, or stolen-password persistence. The longer a password remains unchanged, the more opportunities an attacker has.

Abnormal sign-in patterns, unexpected Kerberos tickets, lateral movement, recent privilege elevation, or new sessions created outside normal hours.

Guardian flags users with adminCount=1 as privileged. This aligns with Active Directory’s model for protecting administrative accounts (AdminSDHolder/SDProp).

Yes—native AD tools such as PowerShell (Get-ADUser with pwdLastSet), dsquery, and open-source reporting scripts can identify old passwords. Free tools can detect but typically cannot continuously monitor, alert, correlate, or track changes historically.

Guardian continuously monitors for accounts exceeding password-age thresholds, highlights privileged users first, provides historic evidence, and alerts in real time so teams can rotate credentials before attackers exploit them.

References

Final Thought

Proactive monitoring and timely remediation of configuration risks is essential to maintaining a secure Active Directory and Microsoft 365 environment. By addressing issues like User account with old passwords, you reduce attack surfaces and strengthen your organization’s overall security posture.