Data from ~50 large enterprises
A threat actor known as Zestix (also tracked as 'Sentap') is auctioning sensitive data from approximately 50 major global companies after gaining unauthorized access to their corporate file-sharing systems. The campaign, detailed by cybersecurity firm Hudson Rock, highlights a critical and widespread security gap: the failure to enforce multi-factor authentication (MFA). The actor utilized credentials stolen by common infostealer malware to simply 'walk through the front door' of enterprise file synchronization and sharing (EFSS) platforms, including Progress ShareFile, Nextcloud, and OwnCloud. The breaches affected organizations in critical sectors like aviation, housing, and government infrastructure, with victims including Iberia Airlines and Sekisui House. This incident serves as a stark reminder that in an era of rampant infostealer infections, password-only security is obsolete, and MFA is an essential baseline control.
The Zestix campaign epitomizes the opportunistic nature of modern cybercrime, which leverages the massive underground economy for stolen credentials. The threat actor, an initial access broker active since at least 2021, did not need to develop or purchase exploits. Instead, they capitalized on a pre-existing and growing problem: employee devices infected with infostealer malware. These malware families, such as RedLine, Lumma, and Vidar, are designed to steal a wide range of data from infected computers, with a primary focus on credentials saved in web browsers.
Once Zestix acquires these logs from dark web marketplaces, they systematically test the stolen username/password pairs against high-value corporate targets, specifically EFSS portals. These platforms are treasure troves of sensitive data, often containing intellectual property, financial records, customer PII, and strategic plans. The success of the campaign across 50 different organizations demonstrates that the lack of MFA on externally-facing, data-rich applications is not an isolated issue but a systemic failure.
The attack is brutally simple and effective:
T1078 - Valid Accounts: The core of the attack is the use of legitimate, stolen credentials to access systems.T1537 - Transfer Data to Cloud Account: While the actor exfiltrates from a cloud account, the principle of abusing cloud storage for malicious ends applies.T1567.002 - Exfiltration to Cloud Storage: The attacker exfiltrates data from the compromised corporate cloud storage to their own storage.T1119 - Automated Collection: The initial credential theft is performed by automated infostealer malware.The impact on the 50 breached companies is multifaceted and severe. Direct financial losses can result from regulatory fines (e.g., GDPR), incident response costs, and potential extortion demands. The theft of dozens or hundreds of gigabytes of data per victim exposes them to intellectual property loss, competitive disadvantage, and reputational damage. For victims like Iberia Airlines and Pickett and Associates (a utility engineering firm), the breach could have implications for operational security and critical infrastructure. This campaign demonstrates that a single, low-sophistication actor can cause widespread damage by exploiting a common, basic security oversight.
D3-LAM: Local Account Monitoring and D3-DAM: Domain Account Monitoring to identify suspicious login attempts and patterns against cloud services.M1032 - Multi-factor Authentication.M1027 - Password Policies.M1017 - User Training.The most critical defense. Enforcing MFA on all internet-facing services would have prevented these breaches entirely.
Mapped D3FEND Techniques:
While not a direct prevention, monitoring account usage for anomalies (e.g., impossible travel, unusual access times) can detect compromised accounts.
Mapped D3FEND Techniques:
Using EDR/AV solutions to detect and remove infostealer malware from endpoints prevents the initial credential theft.
Mapped D3FEND Techniques:
Educating users about the risks of phishing and malware, and the importance of not reusing passwords or saving them in browsers.
The Zestix campaign is a textbook case for the mandatory implementation of MFA. Organizations must immediately conduct an audit of all internet-facing applications, with a priority on data repositories like ShareFile, Nextcloud, and OwnCloud, to identify all accounts lacking MFA. A project should be initiated to enforce MFA across 100% of user accounts for these services. While any MFA is better than none, prioritize phishing-resistant options like FIDO2 security keys for administrators and users with access to highly sensitive data. For a broader rollout, app-based authenticators (TOTP) provide a significant security uplift over password-only access. This single defensive measure would have nullified the threat actor's primary attack vector, rendering the stolen credentials useless for accessing these specific platforms. There is no valid business reason for a sensitive, internet-facing data portal to lack MFA in the current threat environment.
To address the root cause of the credential theft, organizations must improve their endpoint security posture to detect infostealer malware like RedLine and Lumma. Deploy a modern Endpoint Detection and Response (EDR) solution across all corporate and BYOD devices that access company data. Configure the EDR to monitor for suspicious process behaviors indicative of infostealers, such as processes that query browser credential stores (Login Data files for Chrome), capture screenshots, or make connections to known malicious C2 domains. Process analysis can identify the malware's execution chain, allowing security teams to block it before it successfully exfiltrates data. This proactive defense breaks the attack chain at the earliest possible stage, preventing the credentials from ever reaching the hands of actors like Zestix.
For detective controls, organizations should implement robust monitoring of their cloud file-sharing platforms. This involves establishing a baseline of normal user behavior. Use a Cloud Access Security Broker (CASB) or the platform's native security tools to analyze resource access patterns. Create alerts for anomalous activities such as: a user logging in from a new or suspicious IP address and immediately downloading gigabytes of data; access occurring outside of normal business hours; or a user accessing files and folders unrelated to their job function. These patterns are strong indicators of a compromised account being used for data exfiltration. By analyzing these access patterns, security teams can quickly identify a breach in progress and take action to terminate the session and lock the account, limiting the extent of the data loss.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats