Researchers explore how ‘ghost’ accounts can become targets for threat actors.