Back to Blog

How the Louvre Lost $102M to a Password You Could Guess in 5 Seconds

Last Updated: November 7, 2025

How the Louvre Lost $102M to a Password You Could Guess in 5 Seconds (And How to Audit Your Organization Before You're Next)

The Louvre Museum guards the Mona Lisa. Priceless art. World heritage. Ten million visitors per year.

Their network password? "LOUVRE." I wish I was joking.

In 2024, French cybersecurity agency ANSSI ran a penetration test on the world's most visited museum. Their auditors walked in like digital tourists and walked out with administrative access to HVAC systems, security cameras, visitor management, and building controls.

The remediation estimate? $102 million.

And here's what keeps me up at night after a decade of consulting with Fortune 500 companies: the Louvre isn't special. They're just the museum that got audited publicly.

Your organization probably has the same password sitting on some forgotten router installed by a contractor in 2019. The same shared admin account that five people use. The same vendor credentials that haven't been changed since the system was deployed.

You just haven't been audited yet.

Let me show you how to fix that before someone else finds these gaps for you.

TL;DR: Your 90-Second Audit Reality Check

The uncomfortable truth:

What actually works:

Bottom line: The Louvre didn't fall to zero-days or nation-state hackers. They fell to "LOUVRE" typed into a login form. Your audit needs to catch the same failure before attackers do.

Why the Louvre Failed (And Why Your Organization Might Too)

I spent three months helping a manufacturing company recover from a breach. The attacker didn't use sophisticated malware or exploit an obscure vulnerability. They logged into an edge router using the default admin credentials printed in the manual.

The router was installed six years earlier by a vendor who's no longer under contract. Nobody remembered it existed. It sat there broadcasting its presence on Shodan, waiting for someone to try "admin/password." Someone did.

This is the Louvre problem at scale.

Systems get deployed. Vendors do the installation. They hand you a sticky note with temporary credentials. You mean to change them. Then production deadlines hit. Then that vendor leaves. Then the person who was supposed to change those passwords moves to a different department.

Now it's 2025 and somewhere in your network infrastructure is a device still using "admin123" that everyone forgot about.

Three structural failures I see in every credential audit:

Shadow IT proliferation: Marketing launches a SaaS platform. Sales spins up a customer portal. Facilities adds smart building controls. Nobody told IT. Nobody updated the asset inventory. Nobody changed the default credentials.

Compliance checkbox mentality: You pass your annual audit. Everyone celebrates. Then 364 unmonitored days allow temporary accounts to become permanent and shared credentials to multiply.

Decentralized ownership: IT manages network gear. Security handles user accounts. DevOps controls cloud infrastructure. Facilities owns building automation. Everyone assumes someone else is watching the credentials in their domain. The gaps live in the seams.

The Louvre showed us what happens when these structural problems meet a competent auditor:

What ANSSI Found at the Louvre What Happens at Most Organizations
Default vendor password "LOUVRE" unchanged for years Credential rotation tracked in spreadsheets nobody updates
Shared admin accounts across multiple teams Service accounts used by humans, destroying audit trails
No MFA on infrastructure management consoles "We'll add MFA next quarter" becomes "maybe next year"
Legacy systems excluded from security assessments "Too old to support modern auth" becomes a permanent excuse
Emergency credentials stored in unencrypted spreadsheets Break-glass procedures work once, then nobody tests them again

You're not protecting the Mona Lisa. But the math is the same. One default password. One shared credential. One forgotten system. That's all it takes.

What You're Actually Auditing (The 7 Areas That Matter)

A complete password audit answers three questions:

  1. Where do credentials exist in your environment?
  2. Who actually owns them?
  3. What controls prevent misuse?

Most organizations can't answer the first question, let alone all three. Here's the framework mapped to NIST SP 800-63B and CIS Controls v8 that mirrors ANSSI's Louvre audit.

Area 1: Default and Vendor Credentials (The "LOUVRE" Problem)

What you're looking for: Factory defaults on network gear, building automation with vendor credentials, cloud consoles with unchanged initial logins, IoT devices advertising baked-in passwords.

Why this kills you: Default passwords are in attacker dictionaries. If Shodan can fingerprint your device, someone is already trying them.

Audit actions: Pull the inventory, document default changes, verify policy compliance, confirm vendor credential rotation.

Pass/fail: Defaults changed within 24 hours, logged in the CMDB, with a vendor rotation plan.

Area 2: Legacy System Passwords (Windows Server 2003 Is Still Out There)

What you're looking for: End-of-life operating systems, industrial controls, proprietary apps that can't support modern auth.

Why this kills you: Legacy systems can't adopt phishing-resistant authentication, turning technical debt into credential debt.

Audit actions: Identify every legacy system, document compensating controls, enforce unique credentials, and assign a migration timeline.

Pass/fail: Legacy systems are isolated, monitored, and on a retirement or modernization track.

Area 3: Shared Credentials Across Teams

What you're looking for: Shared service accounts, admin passwords in shared vaults, API keys in repos, vendor logins everyone knows.

Why this kills you: Shared credentials erase accountability.

Audit actions: Catalog every shared credential, demand justification, store them in systems with logging, map usage to individuals.

Pass/fail: Unique credentials per user whenever possible; remaining shared access is mediated via PAM/vaults with full attribution.

Area 4: Password Age and Rotation Policies

What you're looking for: Credentials older than your security improvements, passwords belonging to former employees, API keys predating rotation policies.

Why this kills you: Old credentials predate modern monitoring.

Audit actions: Run age reports, verify rotation triggers, retire pre-improvement credentials.

Pass/fail: Rotation is event-driven per NIST SP 800-63B.

Area 5: MFA Coverage Gaps

What you're looking for: Admin consoles without MFA, remote access lacking second factors, password-only cloud management.

Why this kills you: One phished password without MFA is game over.

Audit actions: Assign risk levels, compare enrollment vs. user lists, remove bypasses, require hardware keys/FIDO2 for critical roles.

Risk Level Access Type MFA Status Acceptable Methods
CRITICAL Domain & cloud root admin Mandatory Hardware token, FIDO2, smartcard
HIGH Database & financial systems Mandatory Authenticator app, hardware token
MEDIUM VPN, remote access, email Mandatory Push notification, authenticator (SMS only as temporary fallback)
LOW Internal line-of-business apps Optional Context-based or device trust

Area 6: Privileged Account Management

What you're looking for: Inventory of privileged accounts, encrypted vaulting, session monitoring, automated rotation, just-in-time provisioning.

Why this kills you: Privileged accounts are nuclear launch codes.

Audit actions: Inventory, encrypt, monitor, rotate, and time-limit every privileged credential.

[2025-10-18 14:23:41] admin-rotate-script | SUCCESS | AWS-PROD-ROOT | Credential rotated
[2025-10-18 14:23:42] admin-rotate-script | SUCCESS | AZURE-GLOBAL-ADMIN | Credential rotated
[2025-10-18 14:23:43] john.smith@company.com | ACCESS | DB-PROD-ADMIN | Session ID: a8f7e3
[2025-10-18 14:28:19] john.smith@company.com | LOGOUT | DB-PROD-ADMIN | Duration: 4m 36s
[2025-10-18 15:47:02] ALERT | susan.jones@company.com | BREAKGLASS-01 | Emergency access
            

Area 7: Emergency Access Procedures (Break-Glass)

What you're looking for: Documented break-glass workflows, tamper-evident storage, immediate alerting, post-use reviews, forced rotation.

Why this kills you: Emergency accounts without controls become stealth backdoors.

Audit actions: Inventory, secure, alert, test, and expire every break-glass credential.

How to Actually Run This Audit (30-Day Timeline)

Week 1: Discovery and Scoping (“What do we actually have?”)

Weeks 2–3: Assessment Execution (“Ask questions, verify answers”)

Week 4: Analysis & Reporting (“What does this mean?”)

Risk severity matrix

Likelihood Critical Impact High Impact Medium Impact Low Impact
Very Likely CRITICAL HIGH HIGH MEDIUM
Likely HIGH HIGH MEDIUM LOW
Possible HIGH MEDIUM MEDIUM LOW
Unlikely MEDIUM LOW LOW LOW

Impact definitions: Critical = physical security, large-scale PII, financial systems. High = production admin control. Medium = internal applications. Low = isolated systems.

Likelihood definitions: Very likely = default credentials or missing MFA on exposed systems. Likely = weak rotation or MFA gaps. Possible = inconsistent processes. Unlikely = layered controls and strong monitoring.

Red Flags That Mean “Drop Everything and Fix This Now”

Priority guidance: Treat these as active incidents. Fix them before you resume the audit.

After the Audit: How to Actually Fix Everything

Quick Wins (Days, Not Weeks)

Strategic Improvements (This Quarter)

Long-Term Initiatives (This Year)

The Password Security Audit Checklist (Pass/Fail Criteria)

Use these questions during interviews and evidence collection. Minimum passing responses are noted for each area.

Area 1: Default & Vendor Credentials (Pass requires Q1, Q2, Q5)

Area 2: Legacy System Passwords (Pass requires Q1, Q2, Q3)

Area 3: Shared Credentials (Pass requires Q1, Q3, Q4)

Area 4: Password Age & Rotation (Pass requires Q1, Q2, Q3)

Area 5: MFA Coverage (Pass requires all five questions)

Area 6: Privileged Account Management (Pass requires Q1, Q2)

Area 7: Emergency Access Procedures (Pass requires Q1, Q2, Q3)

Scoring guidance: 28–35 "Yes" answers = mature program. 21–27 = acceptable but needs targeted improvements. 14–20 = significant vulnerabilities. Below 14 = systemic credential failure.

Important: This checklist supplements formal audits. Regulated industries still require qualified assessors.

Key Takeaways (The Stuff You Actually Need to Remember)

Your organization guards something more valuable than art: operational continuity, customer trust, and brand reputation. The math works the same. One default password. One shared credential. One forgotten system. That’s all it takes.

Need Help Closing These Gaps?

I've spent ten years helping organizations implement the recommendations in this guide. Sometimes you need an outside perspective to find the credentials everyone forgot or the controls everyone assumes someone else implemented.

Six Sense Solutions delivers enterprise observability and security audits - password manager rollout included - in 30-day engagements. We’ve helped Fortune 500 companies and small teams alike close credential gaps before they become headlines.

Schedule a consultation to protect your organization before you become the next Louvre.

Frequently Asked Questions

What is a password security audit?

A password security audit reviews how credentials are created, stored, rotated, and protected throughout your environment. It answers: Where do credentials exist? Who owns them? What controls prevent misuse?

How long does a password audit take?

Medium-sized enterprises (500–5,000 employees) typically complete the assessment in about 30 days: discovery in week one, execution in weeks two and three, analysis and reporting in week four. Larger organizations often run parallel workstreams per business unit.

What did ANSSI actually find at the Louvre?

Auditors logged in with default passwords - including "LOUVRE" - and found shared vendor credentials plus missing MFA on systems controlling physical security, HVAC, and visitor operations. The remediation cost exceeded $102M.

Which findings require immediate remediation?

Default credentials on exposed systems, privileged accounts without MFA, plaintext shared passwords, service accounts with interactive logon rights, and break-glass usage without alerts all justify emergency changes.

Sources & Further Reading

Disclaimer: This guide is for educational purposes and general security improvement. Engage qualified security professionals for compliance-driven or regulated assessments.