Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
AiTM Phishing Attacks Target SharePoint, HubSpot, Google
May 2, 2026
Attackers Abuse AppSheet, Netlify, Telegram for Google Facebook
May 2, 2026
cPanelSniper PoC Exploit for cPanel Vulner Disclosed Vulnerability
May 2, 2026
Home/Threats/Hackers Breached Companies via Leaked Cloud Cred Threat Actors
Threats

Hackers Breached Companies via Leaked Cloud Cred Threat Actors

A deceptively simple yet highly effective attack vector—stolen credentials harvested by infostealer malware—has led to breaches across dozens of major global enterprises. A threat actor operating...

Sarah simpson
Sarah simpson
January 6, 2026 3 Min Read
8 0

A deceptively simple yet highly effective attack vector—stolen credentials harvested by infostealer malware—has led to breaches across dozens of major global enterprises.

A threat actor operating under the nickname “Zestix” and his alias “Sentap” has been systematically accessing corporate cloud storage platforms, including ShareFile, Nextcloud, and OwnCloud, belonging to approximately 50 international organizations.

The breaches span critical sectors such as aviation, defense robotics, healthcare, finance, and government infrastructure, exposing terabytes of sensitive data.

The attack chain reveals a troubling reality in modern cybersecurity. Employees inadvertently download malicious files that execute infostealers like RedLine, Lumma, and Vidar.

These malware variants silently harvest all saved credentials and browser history from infected devices. Once extracted, these logs are aggregated into massive databases on the dark web.

Zestix then searches through these repositories specifically looking for corporate cloud URLs and uses the stolen credentials to gain unauthorized access to enterprise systems.

The digital persona of 'Zestix,' a threat actor specializing in auctioning corporate cloud access (Source - Infostealers)
The digital persona of ‘Zestix,’ a threat actor specializing in auctioning corporate cloud access (Source – Infostealers)

InfoStealers analysts and researchers noted that the most critical vulnerability enabling these breaches was not a sophisticated zero-day exploit, but rather the fundamental absence of Multi-Factor Authentication (MFA).

Organizations failed to implement this standard security control, allowing attackers to walk through the front door using only a valid username and password.

Some credentials had been sitting in infostealer logs for years, creating a window of opportunity that organizations completely missed.

The 'Sentap' profile, an alias used by Zestix to sell additional compromised datasets (Source - Infostealers)
The ‘Sentap’ profile, an alias used by Zestix to sell additional compromised datasets (Source – Infostealers)

The scale of the compromises is alarming. Pickett and Associates, an engineering firm serving U.S. utility companies, lost 139.1 gigabytes including classified LiDAR files and transmission line maps.

The Pickett & Associates portal, accessed via stolen credentials (Source - Infostealers)
The Pickett & Associates portal, accessed via stolen credentials (Source – Infostealers)

Intecro Robotics exposed 11.5 gigabytes of ITAR-controlled defense blueprints for military aircraft components. Iberia Airlines had 77 gigabytes leaked, containing aircraft maintenance programs and critical flight safety documentation.

Brazilian military police health records belonging to Maida Health—2.3 terabytes in total—were exposed, along with personal identification and medical information for active-duty personnel and their families.

The Credential Harvesting Mechanism

The infection cycle operates through a five-stage process that cybersecurity professionals must understand. First, an employee receives a seemingly legitimate file through email or downloads what appears to be standard software.

Stolen blueprints for defense robotics components (Source - Infostealers)
Stolen blueprints for defense robotics components (Source – Infostealers)

Second, the infostealer executes in memory, often avoiding detection by security tools because it operates within legitimate processes. Third, the malware enumerates browser storage, password managers, and cached credentials from applications like Outlook and Teams.

Fourth, all harvested data is encrypted and transmitted to command-and-control servers. Finally, threat actors parse through thousands of stolen credential databases, filtering specifically for corporate infrastructure like cloud file shares and ERP systems.

What makes this approach particularly dangerous is its scale and low cost. Zestix operates as an Initial Access Broker, selling corporate access credentials for Bitcoin or Monero on underground forums.

Exposed legal and financial directories (Source - Infostealers)
Exposed legal and financial directories (Source – Infostealers)

Organizations have failed not because they lack security awareness programs, but because they have not enforced mandatory multi-factor authentication across all critical systems.

The remedy is straightforward: immediate MFA deployment combined with monitoring for compromised credentials in infostealer logs before attackers exploit them.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackBreachCybersecurityExploitHackerMalwareSecurityThreatVulnerabilityzero-day

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

LastPass Data Breach Led to $35 Cryptocurrency Theft

Next Post

AI-Enhanced Tuoni C2 Malware Targets Stealthy Major

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Attackers Abuse CAPTCHA, ClickFix for Cred Tactics Boost
May 1, 2026
DDoS Malware Exploits Jenkins to Attack Source Engine Games
May 1, 2026
DDoS Attack Hits Ubuntu Website & Canonical Web Services
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us