Case Study: A Password Almost Cost This Company Everything

March 18, 2026

Share this article

If you ended an IT vendor relationship three years ago, how do you know for certain their access is gone? If there's any hesitation in your answer, keep reading.


Our NOC caught it at 2:00 AM before a single file moved. 


The client profile



  • Industry: Large-Scale Professional Services/Manufacturing
  • Scale: 100+ Users

The problem:

A high-growth environment with a decade of accumulated vendor relationships and "ghost" access. The kind of company that had grown fast, onboarded a lot of outside help along the way, and (like most companies at that stage) had never had the time or process to properly unwind any of it.

The lesson here:

Vendor risk won’t always show up in a highly chaotic attack. In fact, it often hides in plain sight. It is a quiet, 10-year-old account that stays active just because "it has always been that way."


Here's exactly how it happened, how Hyperion took action, and why most companies wouldn't have been so lucky.


1. The Discovery: A 3:1 Account-to-User Ratio


When the Hyperion team started onboarding this client, we did what we always do first: pull a full audit of their Active Directory.


We expected to find around 100 accounts. We found 317. All active and ALL with remote access enabled.


It sounds alarming and very surprising, but it's more common than most companies would like to admit. Vendors come and go, employees turn over, systems get migrated... it’s inevitable. Nobody wants to touch accounts that seem to just work. It’s not malfunctioning anyway.


But over a decade, that avoidance is extremely dangerous. What can first start as a reasonable caution (
don't break what isn't broken) turns into an attack surface three times larger than it should be, filled with accounts nobody can confidently vouch for.


In long-established environments, this "Account Sprawl" is a silent killer. It creates a massive Attack Surface, making it nearly impossible to distinguish a legitimate login from a malicious one.


2. The Red Flag: The "Untouchable" Accounts


Buried in the documentation were accounts flagged with notes like "DO NOT CHANGE" or "DO NOT ROTATE PASSWORD."


To an untrained eye, these look like essential system accounts.  Touch them, and something “breaks”. That's exactly what those notes imply, and it's exactly why they work. It does not work as protection, but as a deterrent to anyone who might otherwise ask questions.


The truth is usually less interesting. These notes get added for a specific reason at a specific moment, the reason gets forgotten, and eventually the note itself becomes the justification. Nobody touches it because the note says not to. The note stays because nobody's touched it. Years pass.


To our surprise, one of those accounts belonged to a vendor the company had fired ten years ago. The vendor was gone. The relationship had ended badly, apparently. But the account was still there (still active, still enabled for remote access) because it had a note on it, and because offboarding, at that company, had never been a documented process. It lived in someone's memory. That person had probably left years ago.


3. The Hidden Vulnerability: Password Reuse


Here's where it gets worse. 


Neither the client nor Hyperion knew the most dangerous detail: The fired vendor had reused the same password across multiple clients.


It's an incredibly common habit, especially among smaller vendors and contractors who are managing access to dozens of environments and leaning on muscle memory to get through their day.


When their credentials eventually surfaced somewhere else (through a breach at another client, a leaked database, or a successful phishing attempt) that same password still worked perfectly on our client's network. Valid credentials with a clean login, no failed attempts, and no brute force. None of it looked like an attack from the outside.


30% of breaches involve a third-party compromise (Verizon DBIR).


Even if your company’s security is tight, you are only as secure as your vendor's worst habit. Because that account was excluded from password rotations for a decade, a single leaked credential from that vendor’s other clients became a valid key to our client’s network.


4. The 2:00 AM Intervention


At Hyperion, our Stability, Security, and Operations pillars are active around the clock. When the compromise finally happened, it didn't look like a hack.


The attackers didn't have to "guess." They had a valid, 10-year-old credential.


How we caught it: At 2:00 AM, our Network Operations Center (NOC) flagged a successful VPN login.


But we had context. During onboarding, we had specifically flagged that account, documented it as an unresolved risk, and noted that it should never generate activity. 


When it did, we knew exactly what we were looking at, and we didn't wait.


We treated it as an active incident, terminated the session, and locked down the environment before any data could be exfiltrated.

Our Three-Pillar Breakdown: How We Work

Pillar The Risk We Found The Hyperion Solution
Stability 300+ accounts made permissions impossible to troubleshoot. Cleaned up stale accounts, making the network predictable.
Security A 10-year-old password bypasses all perimeter defense. Layered MFA and mandatory rotation. No "permanent exceptions."
Operations Offboarding was a "memory test," not a process. Implemented a repeatable Vendor Offboarding SOP.

The Critical Question for Your Business

If you ended a contract with a vendor five years ago, are you 100% sure their access is gone? Not "probably." Not "I think so." Sure.


Because if the answer is anything other than yes (if there's even a moment of hesitation) you have the same exposure this client had. An open door from a relationship that ended years ago, attached to a password you didn't create, can't see, and have no way to control.


If you have even one "Do Not Change" account in your environment, you are betting your business on a password you didn't create and cannot verify.

Recent Posts

March 18, 2026
Case Study: When the Pick-Lists Failed
Team members in a factory office discuss a project strategy written on a whiteboard, overlooking a production floor.
By Danny Crumpton March 17, 2026
The "Hyperion Tabletop": A Simple Way to Start If your organization isn't ready to undertake a full resilience review, we encourage you to run one simple exercise before the end of the month. It costs nothing, requires no outside help, and will tell you more about your real vulnerabilities than most formal assessments. Get the right people in a room: IT leadership, operations, plant management. Give them one constraint: the primary network is completely inaccessible and will remain so for the next six hours. Then present three questions and listen carefully to the responses. Just listen. Access: Do we have the vendor phone numbers written down physically? Priorities: Does IT know that "Line 4" is more important than "Accounting" right now? Workarounds: Does the shift lead know how to run the plant without the ERP? The places where people go quiet, look at each other, or start to argue…. those are your gaps. They are not hypothetical risks. They are real ones—specific to your building, your team, your operation. The good news is they're all fixable. The only question is whether you find them in a conference room on a Tuesday, or at 2:00 AM when it actually matters. Talk to Hyperion about building a plan your plant floor can actually use when it counts.
Smart factory floor with digital cybersecurity overlays
March 17, 2026
Learn why smart factories in Tennessee struggle with cybersecurity. Discover the common mistakes in IT/OT convergence and how to secure your production line.
A vintage computer server glows red in a cluttered, dimly lit tech lab.
March 9, 2026
A 15-year-old ERP system can expose your business to security risks, downtime, and costly failures. Discover how to safely harbor legacy ERP infrastructure.
Woman in pink shirt using a laptop in a server room, with reflections in the glass.
March 3, 2026
Outdated IT can stop your production line. See how IT lifecycle management helps East Tennessee manufacturers prevent downtime and protect throughput.
Children and adult sitting in circle, raising hands in a park.
February 16, 2026
See how a unified IT strategy elevated performance for a youth non‑profit in Lenoir City by standardizing systems, improving visibility, and reducing tech friction across its multi‑site environment.
Glowing circuit path through mountainous terrain, leading to a stylized outline of Tennessee, with technology icons.
February 14, 2026
Discover the 6-step technology maturity roadmap for Tennessee manufacturers and learn how to stop chasing shiny objects by building a clear, strategic path to smarter tech adoption.
Man in suit stands before glowing blue portal in a tech-filled, industrial room.
February 13, 2026
Explore why smart manufacturers often stay silent about IT problems, the hidden costs of unresolved tech issues, and how strategic IT planning can drive long‑term growth and stability.
Industrial conveyor belt in a large warehouse.
February 13, 2026
Learn the real cost of manufacturing downtime and how a frozen shop floor can cost thousands per hour, plus strategies to reduce outages and improve operational stability.
Woman with curly hair in black sweater, leaning against a glass wall while using a laptop in an office hallway.
January 27, 2026
Explore why there’s no single “magic bullet” in IT and how Hyperion Networks embraces complexity to deliver reliable, secure, and strategic technology solutions for real business outcomes.
Show More