Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Dozens of Major Data Breaches Linked to Single Threat Actor

Posted on January 6, 2026January 6, 2026 By CWS

A number of main knowledge breaches are linked to a risk actor who depends on stolen credentials to compromise enterprise networks, Hudson Rock reviews.

Working below the moniker ‘Zestix’ but in addition linked to the net persona ‘Sentap’, the risk actor is an preliminary entry dealer (IAB) who was additionally seen exfiltrating sufferer knowledge and promoting it on hacker boards.

In accordance with Hudson Rock, Zestix emerged as a definite entity in late 2024-early 2025, however its actions may be linked to Sentap operations which have been ongoing since 2021.

Each personas may be linked to information-stealer infections ensuing within the compromise of world enterprises working within the aerospace, authorities infrastructure, authorized, and robotics sectors.

The credentials, Hudson Rock says, had been harvested from the private or work gadgets of workers on the sufferer organizations utilizing data stealers comparable to RedLine, Lumma, and Vidar.

“Whereas some credentials had been harvested from lately contaminated machines, others had been sitting in logs for years, ready for an actor like Zestix to take advantage of them,” Hudson Rock notes.

The shortage of multi-factor authentication (MFA) protections on accounts with entry to file-transfer cases comparable to ShareFile, OwnCloud, and Nextcloud has allowed Zestix/Sentap to make use of the compromised credentials efficiently on roughly 50 events.

The exfiltrated knowledge is then provided on the market on closed Russian-language boards, however Zestix was additionally seen promoting entry to the compromised programs.Commercial. Scroll to proceed studying.

Zestix/Sentap victims

In accordance with Hudson Rock, Zestix has established a popularity for reliability. This explains why they had been asking $150,000 for the 77 GB of knowledge allegedly stolen from Iberia, the Spanish flag provider.

Different victims embody Pickett & Associates (an engineering agency serving vitality organizations), Intecro Robotics (aerospace and protection gear maker), Maida Well being (serves the Brazilian navy police), CRRC MA (rolling inventory maker subsidiary), K3G (Brazilian ISP), NMCV Enterprise LLC (manages knowledge for US healthcare amenities), and over a dozen others.

Beneath the Sentap moniker, the risk actor constructed a wider record of victims, however Hudson Rock says it couldn’t hyperlink these breaches to file-sharing providers or infostealer infections.

“It’s doable that they nonetheless stem from comparable Infostealer credentials primarily based on the excessive variety of victims we did determine to have infostealer credentials to these providers, however we don’t rule out entry by way of one other preliminary entry,” Hudson Rock says.

The risk actor has claimed large breaches at Pan-Pacific Mechanical (1.04 TB), Bradley R. Tyer & Associates (1.02 TB), The Windfall Group (1 TB), Australian NBN (306 GB), UrbanX.io (275 GB), and dozens of others.

The infostealer drawback

In accordance with Hudson Rock, credentials pertaining to hundreds of organizations that use ShareFile, OwnCloud, and Nextcloud are circulating in infostealer logs, together with these of outstanding names comparable to Deloitte, Honeywell, KPMG, Samsung, and Walmart.

“These organizations have workers or companions who’ve been contaminated, leaving legitimate classes or credentials to delicate file repositories uncovered to actors like Zestix,” the cybersecurity agency notes.

The problem, nonetheless, has been round for a very long time and is unlikely to be simply resolved. The data stealer trade is fueling trendy cybercrime, appearing as the start line for knowledge breaches, id theft, and fraud.

“Stealers are an instance of the commodification of cybercrime delivered by way of malware-as-a-service (MaaS),” SpyCloud Labs SVP of safety analysis Trevor Hilligoss mentioned in a dialogue with SecurityWeek.

“You not should be a talented developer or hacker to realize entry to instruments which can be extremely efficient when deployed at scale. Anybody can simply purchase or rent readymade malware from the MaaS market,” Hilligoss added.

The success of knowledge stealers builds on pace and stealth. They exfiltrate delicate data in minutes and are sometimes faraway from the contaminated gadgets instantly after, leaving minimal traces of wrongdoing.

And for over a decade, stolen credentials have fueled large assault campaigns, together with credential stuffing assaults, which proceed to be an issue.

Associated: NordVPN Denies Breach After Hacker Leaks Knowledge

Associated: Brightspeed Investigating Cyberattack

Associated: Sedgwick Confirms Cyberattack on Authorities Subsidiary

Associated: Hundreds of Secrets and techniques Leaked on Code Formatting Platforms

Security Week News Tags:Actor, Breaches, Data, Dozens, Linked, Major, Single, Threat

Post navigation

Previous Post: Fake Booking Emails Redirect Hotel Staff to Fake BSoD Pages Delivering DCRat
Next Post: Christmas Phishing Surge Chains Docusign Spoofing with Identity Theft Questionnaires

Related Posts

Qantas Data Breach Impacts Up to 6 Million Customers  Security Week News
Fresh MongoDB Vulnerability Exploited in Attacks Security Week News
Cisco Routers Hacked for Rootkit Deployment Security Week News
Hawaiian Airlines Hacked as Aviation Sector Warned of Scattered Spider Attacks Security Week News
AI Supply Chain Attack Method Demonstrated Against Google, Microsoft Products Security Week News
The ZTNA Blind Spot: Why Unmanaged Devices Threaten Your Hybrid Workforce Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Expose All User Records from Popular Dark Web Forum
  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Expose All User Records from Popular Dark Web Forum
  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark