Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

New Zero-Click Attack Lets ChatGPT User Steal Data

January 8, 2026

The State of Cybersecurity in 2025: Key Segments, Insights, and Innovations 

January 8, 2026

GoBruteforcer Botnet Targets Linux Servers

January 8, 2026
Facebook X (Twitter) Instagram
Thursday, January 8
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»MFA Failure Enables Infostealer Breach At 50 Enterprises
News

MFA Failure Enables Infostealer Breach At 50 Enterprises

Team-CWDBy Team-CWDJanuary 7, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Dozens of global organizations have had highly sensitive corporate and customer information stolen and put up for sale by a threat actor because they didn’t secure cloud systems with multi-factor authentication (MFA), a new report has revealed.

The actor, known as “Zestix” (aka “Sentap”) scoured the dark web for infostealer logs containing credentials for popular cloud file sharing services ShareFile, Nextcloud and OwnCloud, according to Hudson Rock.

He was subsequently able to access, exfiltrate and auction the data stored in these accounts, due to a lack of MFA, the cybersecurity vendor said.

“A critical finding in this investigation is the latency of the threat. While some credentials were harvested from recently infected machines, others had been sitting in logs for years, waiting for an actor like Zestix to exploit them,” Hudson Rock explained.

“This highlights a pervasive failure in credential hygiene; passwords were not rotated, and sessions were never invalidated, turning a years-old infection into a present-day catastrophe.”

Read more on infostealers: Staggering 800% Rise in Infostealer Credential Theft

The credentials were originally obtained via a number of infostealer variants, including RedLine, Lumma and Vidar.

“Because the organizations […] did not enforce MFA, the attacker walks right in through the front door. No exploits, no cookies – just a password,” noted Hudson Rock.

The financially motivated threat actor apparently appears to be comfortable interacting on closed Russian cybercrime forums, where he presents as an initial access broker (IAB). However, the Sentap persona has also been linked to an Iranian national and is affiliated with the Funksec cybercrime group, the report claimed.

A Roll Call of Victims

Among the organizations caught out by Zestix and named in the report are:

  • Iberia Airlines, which had 77GB of technical safety and fleet data stolen
  • Burris & Macomber, a law firm acting as counsel for Mercedes-Benz USA, which spilled over 18GB of customer data, corporate secrets and info on litigation strategy
  • Maida Health, a Brazilian firm which had over 2TB of health records relating to the Brazilian Military Police stolen
  • Intecro Robotics, a Turkish defense manufacturer, which had over 11GB of military IP stolen

“The rise of the Zestix threat actor paints a grim picture for 2026: major enterprise breaches are succeeding without needing sophisticated zero-day exploits,” argued Xcape’s John Carberry.

“Someone can take 77 GB of flight maintenance data with a three-year-old password. That’s not ‘hacked’ security; that’s ignored security.”

Image credit: Fasttailwind / Shutterstock.com



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleRondoDox Botnet Exploits Critical React2Shell Flaw to Hijack IoT Devices and Web Servers
Next Article GhostAd Drain, macOS Attacks, Proxy Botnets, Cloud Exploits, and 12+ Stories
Team-CWD
  • Website

Related Posts

News

New Zero-Click Attack Lets ChatGPT User Steal Data

January 8, 2026
News

The State of Cybersecurity in 2025: Key Segments, Insights, and Innovations 

January 8, 2026
News

Phishing attacks exploit misconfigured emails to target Microsoft 365

January 8, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202521 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202521 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

What it is and how to protect yourself

January 8, 2026

In memoriam: David Harley

November 12, 2025

‘What happens online stays online’ and other cyberbullying myths, debunked

September 11, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.