Dozens of Global Companies in Aviation, Defense, Engineering, and More Breached via Infostealer Credentials 

Published
Written by:
Lore Apostol
Lore Apostol
Cybersecurity Writer
Key Takeaways
  • Attack Vector: Access to 50 companies' cloud storage portals (ShareFile, Nextcloud, OwnCloud) is auctioned using infostealer-harvested credentials.
  • Root Cause: The breaches were enabled by a combination of infected employee devices and the lack of multi-factor authentication.
  • Affected Sectors: Alleged victims include aviation (Iberia Airlines), defense (Intecro Robotics), engineering (Pickett & Associates), and government infrastructure (CRRC MA).

A threat actor using the aliases "Zestix" and "Sentap" is auctioning access to the corporate cloud file-sharing instances of dozens of global enterprises. The campaign abuses a common cloud security gap, leveraging credentials stolen via infostealers used against portals without MFA.

The actor is not using sophisticated exploits but rather logging in directly with valid usernames and passwords. This infostealer cloud credential breach has exposed terabytes of sensitive data from victims across the aviation, defense, finance, and healthcare sectors, highlighting a pervasive and preventable security failure. 

Infostealer Credentials and MFA Lapses

The exfiltrated data includes intellectual property, aircraft maintenance programs, defense project blueprints, patient health information (PHI), and sensitive client litigation strategies, a recent report from Infostealers by Hudson Rock said. The scale of this corporate data compromise is extensive, impacting companies like:

The digital persona of “Zestix,” a threat actor specializing in auctioning corporate cloud access
The digital persona of “Zestix,” a threat actor specializing in auctioning corporate cloud access | Source: Hudson Rock

The investigation reveals that these security failures stem from a dual cause: 

The Pickett & Associates portal, accessed via stolen credentials
The Pickett & Associates portal, accessed via stolen credentials | Source: Hudson Rock

The malware harvests credentials saved in browsers, which are then aggregated and sold. In many cases, the stolen credentials had been sitting dormant in malware logs for years, representing a long-standing, unaddressed risk. 

Internal file structures exposed within the Pickett breach
Internal file structures exposed within the Pickett breach | Source: Hudson Rock

This campaign underscores that without MFA, stolen passwords provide a direct and unimpeded path to an organization's most sensitive data repositories.

A Global Cybersecurity Threat

This campaign serves as a stark reminder of the far-reaching impact of Infostealer malware, transforming individual employee infections into major corporate and even national security incidents. 

The findings emphasize the urgent need for organizations to mandate MFA and gain visibility into compromised credentials originating from outside the traditional corporate network perimeter.

In November, Stolen Police logins raised security concerns regarding Flock Safety surveillance cameras, as 35 customer passwords leaked.


For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: