Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Dozens of Major Data Breaches Linked to Single Threat Actor

Dozens of Major Data Breaches Linked to Single Threat Actor

Posted on January 6, 2026January 6, 2026 By CWS

A number of main knowledge breaches are linked to a risk actor who depends on stolen credentials to compromise enterprise networks, Hudson Rock reviews.

Working below the moniker ‘Zestix’ but in addition linked to the net persona ‘Sentap’, the risk actor is an preliminary entry dealer (IAB) who was additionally seen exfiltrating sufferer knowledge and promoting it on hacker boards.

In accordance with Hudson Rock, Zestix emerged as a definite entity in late 2024-early 2025, however its actions may be linked to Sentap operations which have been ongoing since 2021.

Each personas may be linked to information-stealer infections ensuing within the compromise of world enterprises working within the aerospace, authorities infrastructure, authorized, and robotics sectors.

The credentials, Hudson Rock says, had been harvested from the private or work gadgets of workers on the sufferer organizations utilizing data stealers comparable to RedLine, Lumma, and Vidar.

“Whereas some credentials had been harvested from lately contaminated machines, others had been sitting in logs for years, ready for an actor like Zestix to take advantage of them,” Hudson Rock notes.

The shortage of multi-factor authentication (MFA) protections on accounts with entry to file-transfer cases comparable to ShareFile, OwnCloud, and Nextcloud has allowed Zestix/Sentap to make use of the compromised credentials efficiently on roughly 50 events.

The exfiltrated knowledge is then provided on the market on closed Russian-language boards, however Zestix was additionally seen promoting entry to the compromised programs.Commercial. Scroll to proceed studying.

Zestix/Sentap victims

In accordance with Hudson Rock, Zestix has established a popularity for reliability. This explains why they had been asking $150,000 for the 77 GB of knowledge allegedly stolen from Iberia, the Spanish flag provider.

Different victims embody Pickett & Associates (an engineering agency serving vitality organizations), Intecro Robotics (aerospace and protection gear maker), Maida Well being (serves the Brazilian navy police), CRRC MA (rolling inventory maker subsidiary), K3G (Brazilian ISP), NMCV Enterprise LLC (manages knowledge for US healthcare amenities), and over a dozen others.

Beneath the Sentap moniker, the risk actor constructed a wider record of victims, however Hudson Rock says it couldn’t hyperlink these breaches to file-sharing providers or infostealer infections.

“It’s doable that they nonetheless stem from comparable Infostealer credentials primarily based on the excessive variety of victims we did determine to have infostealer credentials to these providers, however we don’t rule out entry by way of one other preliminary entry,” Hudson Rock says.

The risk actor has claimed large breaches at Pan-Pacific Mechanical (1.04 TB), Bradley R. Tyer & Associates (1.02 TB), The Windfall Group (1 TB), Australian NBN (306 GB), UrbanX.io (275 GB), and dozens of others.

The infostealer drawback

In accordance with Hudson Rock, credentials pertaining to hundreds of organizations that use ShareFile, OwnCloud, and Nextcloud are circulating in infostealer logs, together with these of outstanding names comparable to Deloitte, Honeywell, KPMG, Samsung, and Walmart.

“These organizations have workers or companions who’ve been contaminated, leaving legitimate classes or credentials to delicate file repositories uncovered to actors like Zestix,” the cybersecurity agency notes.

The problem, nonetheless, has been round for a very long time and is unlikely to be simply resolved. The data stealer trade is fueling trendy cybercrime, appearing as the start line for knowledge breaches, id theft, and fraud.

“Stealers are an instance of the commodification of cybercrime delivered by way of malware-as-a-service (MaaS),” SpyCloud Labs SVP of safety analysis Trevor Hilligoss mentioned in a dialogue with SecurityWeek.

“You not should be a talented developer or hacker to realize entry to instruments which can be extremely efficient when deployed at scale. Anybody can simply purchase or rent readymade malware from the MaaS market,” Hilligoss added.

The success of knowledge stealers builds on pace and stealth. They exfiltrate delicate data in minutes and are sometimes faraway from the contaminated gadgets instantly after, leaving minimal traces of wrongdoing.

And for over a decade, stolen credentials have fueled large assault campaigns, together with credential stuffing assaults, which proceed to be an issue.

Associated: NordVPN Denies Breach After Hacker Leaks Knowledge

Associated: Brightspeed Investigating Cyberattack

Associated: Sedgwick Confirms Cyberattack on Authorities Subsidiary

Associated: Hundreds of Secrets and techniques Leaked on Code Formatting Platforms

Security Week News Tags:Actor, Breaches, Data, Dozens, Linked, Major, Single, Threat

Post navigation

Previous Post: Fake Booking Emails Redirect Hotel Staff to Fake BSoD Pages Delivering DCRat
Next Post: Christmas Phishing Surge Chains Docusign Spoofing with Identity Theft Questionnaires

Related Posts

Evidence Suggests Exploitation of CitrixBleed 2 Vulnerability Evidence Suggests Exploitation of CitrixBleed 2 Vulnerability Security Week News
Webinar Today: Why Context is a Secret Weapon in Application Security Posture Management Webinar Today: Why Context is a Secret Weapon in Application Security Posture Management Security Week News
Czech Government Condemns Chinese Hack on Critical Infrastructure Czech Government Condemns Chinese Hack on Critical Infrastructure Security Week News
Critical Dolby Vulnerability Patched in Android Critical Dolby Vulnerability Patched in Android Security Week News
Hundreds of Salesforce Customers Hit by Widespread Data Theft Campaign Hundreds of Salesforce Customers Hit by Widespread Data Theft Campaign Security Week News
113,000 Impacted by Data Breach at Virginia Mental Health Authority 113,000 Impacted by Data Breach at Virginia Mental Health Authority Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News