OSINT
Do You Check for ShadowIT Risks?
Robin Hill
June 9, 2025
Summary
ShadowIT is often misunderstood, yet it remains one of the biggest blind spots in cyber security today. Whether it is unauthorised apps or forgotten infrastructure, the common thread is that these assets exist outside the visibility of IT. With the right tools — like DarkInvader’s EASM solution — organisations can detect and respond to ShadowIT before attackers do.

Let’s start with a simple truth, the term “ShadowIT” means different things to different people. And that’s a bit of a problem. Depending on who you talk to, ShadowIT could mean anything from employees signing up to apps without telling IT, to whole servers exposed to the public internet that no one in the organisation remembers deploying.

Technically, both are right, but they are not quite the same. That distinction matters more than most people realise.

Some people in cyber security circles treat ShadowIT as a human problem. It is about people bypassing controls, taking shortcuts, or just trying to get things done quickly. They sign up for free trials, connect Google Docs to Notion, or spin up a Slack workspace without asking. None of it seems malicious, but it’s rarely tracked, almost never logged, and often forgotten.

Others take a more infrastructure-focused view. To them, ShadowIT includes orphaned domains, forgotten staging environments, exposed APIs, or cloud assets that were spun up temporarily and never decommissioned. The common thread is that no one is monitoring these systems. No patches, no MFA, no visibility — and that’s exactly what attackers love.

Now, you might be wondering, does it really matter how we define ShadowIT? Absolutely. Because misunderstanding it means we risk missing it. And missed systems are missed risks.

Take a recent story involving a Fortune 500 firm. They suffered a breach not through their main site or official email, but through a forgotten subdomain used for a recruitment event two years prior. It was still live, running an old CMS with known vulnerabilities. Nobody had updated it because nobody remembered it existed. That’s ShadowIT in action. And it is more common than people think.

Or consider when attackers breached Uber in part due to leaked credentials giving access to a forgotten admin panel. Again, forgotten infrastructure, classic ShadowIT.

So why does ShadowIT matter now more than ever? Because the attack surface is no longer a tidy list of assets managed in a spreadsheet or CMDB. It’s sprawling, elastic, and shaped by cloud-first workflows and a remote workforce that moves fast. Every tool that makes things easier for users also makes it easier for attackers to find cracks.

And that’s where modern External Attack Surface Management (EASM) comes in. It’s not just about scanning what’s known, it is about discovering the unknown. A good EASM platform should behave a bit like an attacker. It should map what is publicly exposed, check for related assets, monitor DNS changes, analyse certificates, and piece together clues from the open web. All without needing internal access.

This is exactly the kind of work we do at DarkInvader. Our EASM solution is designed to uncover what others miss, from rogue login pages to abandoned cloud buckets. And we’re not just showing you a list of problems. We show you how and why they matter, how they’re connected, and how they can be exploited if left alone.

Tools like this are crucial because ShadowIT is not going away. In fact, as GenAI tools and SaaS apps continue to grow, it is only going to get worse. The solution is not to clamp down or block innovation, it is to illuminate what is currently hidden.

So the next time someone tells you “we’ve got everything under control,” ask them this, when was the last time you looked at your attack surface from the outside?

Robin Hill

Robin Hill, a co-founder of DarkInvader, brings over 20 years of success in corporate sales, primarily within the enterprise sector. He previously co-founded RandomStorm, a cybersecurity company that was successfully acquired by Accumuli PLC in 2014. Throughout his career, Robin has demonstrated a strong sales focus, driving growth and building lasting client relationships. His deep expertise in sales and his experience leading innovative security firms have positioned him as a key figure in both the business and cybersecurity landscapes.

Sign Up for Your Free Account

Unlock continuous, real-time security monitoring with DarkInsight. Sign up for your free account today and start protecting your external attack surface from potential threats.

Create My Free Account