A global cybercrime campaign led by the threat actor “Zestix” (also known as “Sentap”) has compromised over 50 multinational companies by exploiting stolen cloud credentials harvested through infostealer malware. The attackers did not use sophisticated exploits; instead, they logged directly into corporate ShareFile, OwnCloud, and Nextcloud systems using valid credentials stolen from infected employee endpoints. This campaign highlights a systemic weakness across industries – the failure to enforce Multi-Factor Authentication (MFA) and to detect credential exposure from Infostealer infections.
Over 50 organizations across aviation, defense, healthcare, energy, construction, real estate, and legal sectors were breached.The total exposed data volume exceeds 5 terabytes.
Each breach originated from compromised employee credentials stored in infostealer logs, not system exploits.
The primary failure was credential hygiene – reuse, lack of rotation, and no MFA enforcement.Even modern EDR and SIEM tools failed to detect the threat since infections occurred on personal or contractor devices used to access corporate systems (“third-space devices”).
Hudson Rock’s analysis shows thousands of companies, including Deloitte, Samsung, Honeywell, Walmart, and the CDC, have exposed credentials circulating in infostealer logs, indicating potential future compromises.
Enjoyed reading this Threat Intelligence Advisory? Stay updated with our latest exclusive content by following us on Twitter and LinkedIn
No related posts found.
This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.
This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.
Keeping this cookie enabled helps us to improve our website.
This website uses the following additional cookies:
(List the cookies that you are using on the website here.)
More information about our Cookie Policy