Close Menu
  • Tech Insights
  • Laptops
  • Mobiles
  • Gaming
  • Apps
  • Money
  • Latest in Tech
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
TechzLab – Tech News, Gadgets, Mobile & IT UpdatesTechzLab – Tech News, Gadgets, Mobile & IT Updates
  • Tech Insights
  • Laptops
  • Mobiles
  • Gaming
  • Apps
  • Money
  • Latest in Tech
TechzLab – Tech News, Gadgets, Mobile & IT UpdatesTechzLab – Tech News, Gadgets, Mobile & IT Updates
Home » Dozens of organizations fall victim to infostealers after failing to enforce MFA
Tech Insights

Dozens of organizations fall victim to infostealers after failing to enforce MFA

adminBy adminJanuary 6, 2026No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest Email

  • Hacker “Zestix” (aka Sentap) is auctioning stolen data from 50 global enterprises, including Deloitte, KPMG, Samsung, and Pickett & Associates
  • Victims lacked MFA and had devices compromised by infostealers like RedLine, Lumma, or Vidar, enabling credential theft
  • Poor password hygiene and years-old credentials allowed large-scale exfiltration; Pickett alone lost ~139 GB of sensitive files

Someone is auctioning a wide range of highly sensitive data, picked up from 50 global enterprises, on the dark web. Among the victims are a couple of real heavy hitters, such as Pickett & Associates, Deloitte, KPMG, and Samsung.

The news comes from the Israeli cybersecurity startup Hudson Rock, who recently issued an in-depth report on a hacking campaign conducted by a hacker with the alias Zestix (AKA Sentap).

As per the report, all of the victims had one thing in common – they did not enforce multi-factor authentication (MFA), and allowed access to corporate cloud instances of ShareFile, OwnCloud, and Nextcloud, with nothing more than a password.

You may like

Old passwords stolen

Another thing all victims had in common was the fact that at least one of their devices was compromised with a piece of infostealing malware – either RedLine, Lumma, or Vidar.

How the devices ended up compromised is unclear, but what matters is that Zestix was able to use the credentials to access the cloud instances and exfiltrate the data. In some cases, the passwords were years old, which also means the victim organizations had poor password practices and rarely rotated their credentials.

“When an employee logs into corporate portals, they assume their password is enough. However, Zestix relies on the widespread distribution of infostealer malware to infect personal or professional devices,” Hudson Rock explained.

“A critical finding in this investigation is the latency of the threat. While some credentials were harvested from recently infected machines, others had been sitting in logs for years, waiting for an actor like Zestix to exploit them. This highlights a pervasive failure in credential hygiene; passwords were not rotated, and sessions were never invalidated, turning a years-old infection into a present-day catastrophe.”

Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

The report does not mention hard numbers, but with so many large enterprises being hit, it’s safe to assume that this is a large compromise. Just Pickett & Associates, whose news of the breach emerged earlier this week, apparently lost around 139 GB of sensitive files.

Via The Register


Best antivirus software header

The best antivirus for all budgets

Our top picks, based on real-world testing and comparisons

Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds. Make sure to click the Follow button!

And of course you can also Follow TechRadar on TikTok for news, reviews, unboxings in video form, and get regular updates from us on WhatsApp too.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
admin
  • Website

Related Posts

New Records Reveal the Mess RFK Jr. Left When He Dumped a Dead Bear in Central Park

January 7, 2026

How to find Spotify Wrapped, YouTube Recap and more as 2025 comes to a close

January 5, 2026

Belkin’s CES 2026 Lineup Can Keep Your Phone Charged for Days (and Protect Its Screen, Too)

January 4, 2026
Leave A Reply Cancel Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Latest
  • Loads of free content is coming to The Elder Scrolls Online this year — here are the four biggest additions January 7, 2026
  • Dell New Year sale slashes up to $500 off laptops — here are the 5 best deals from $299.99 January 7, 2026
  • OpenAI unveils ChatGPT Health, says 230 million users ask about health each week | TechCrunch January 7, 2026
  • Samsung Galaxy Z TriFold hands-on January 7, 2026
  • NYT Strands hints and answers for Thursday, January 8 (game #676) January 7, 2026
We are social
  • Facebook
  • Twitter
  • Pinterest
  • Instagram
  • YouTube
  • Vimeo

Subscribe to Updates

Get the latest creative news from Techzlab.

Tags
AI Alphabet Anthropic Apple Apps artificial intelligence ChatGPT cyberattack cybersecurity data centers Disney Donald Trump electric vehicles Elon Musk Equity evergreens EVs Exclusive gemini Google Grok In Brief iPhone Layoffs Meta Microsoft Netflix nvidia Openai Perplexity Pinterest robotics Softbank Solar Power SpaceX Spotify streaming TechCrunch Disrupt TechCrunch Disrupt 2025 Tesla Trump Administration Uber WordPress X YouTube
Archives
Quick Link
  • Apps (369)
  • From the Editor (4)
  • Gaming (405)
  • Laptops (406)
  • Latest in Tech (402)
  • Mobiles (409)
  • Money (236)
  • Tech Insights (387)
Don't miss

New Records Reveal the Mess RFK Jr. Left When He Dumped a Dead Bear in Central Park

January 7, 2026

Dozens of organizations fall victim to infostealers after failing to enforce MFA

January 6, 2026

How to find Spotify Wrapped, YouTube Recap and more as 2025 comes to a close

January 5, 2026
Follow us
  • Facebook
  • Twitter
  • Pinterest
  • Instagram
  • YouTube
  • Vimeo
© 2026 Techzlab.com Designed and Developed by WebExpert.
  • Home
  • From the Editor
  • Money
  • Privacy Policy
  • Contact

Type above and press Enter to search. Press Esc to cancel.