Connect with us

Security

Data Breach: Inside the Risks of Corporate Cloud Storage

Published

on

Zestix Offers Stolen Corporate Data from Cloud File-Sharing Sites

In recent developments, a threat actor known as Zestix has been detected selling corporate data stolen from numerous companies. The breach seems to have originated from ShareFile, Nextcloud, and OwnCloud instances.

According to Hudson Rock, a cybercrime intelligence company, the breach was likely facilitated by info-stealing malware like RedLine, Lumma, and Vidar, which were deployed on employee devices to gather credentials.

These malware types are typically spread through malvertising campaigns or ClickFix attacks, targeting data stored in web browsers, messaging apps, and cryptocurrency wallets.

One crucial vulnerability highlighted is the absence of multi-factor authentication (MFA) protection, which enables threat actors with valid credentials to gain unauthorized access to platforms like file-sharing services.

Hudson Rock’s report further reveals that some stolen credentials have been circulating in criminal databases for years, indicating a failure to rotate or invalidate them even after prolonged periods.

Multiple Breaches Across Various Sectors

Zestix operates as an initial access broker (IAB) in underground forums, selling access to high-value corporate cloud platforms such as ShareFile, Nextcloud, and OwnCloud. These breaches have affected organizations in sectors like aviation, defense, healthcare, utilities, mass transit, telecommunications, legal, real estate, and government.

Sample of Zestix's offerings on underground forums
Sample of Zestix’s offerings on underground forums
Source: Hudson Rock

By analyzing infostealer logs, Zestix gains access to cloud file-sharing services using valid credentials where MFA is not implemented. Hudson Rock has identified potential breach points by cross-referencing infostealer data with publicly available information.

It’s worth noting that while Hudson Rock has identified stolen employee credentials in several cases, there is no public confirmation of security breaches from the affected companies. One exception may be Iberia, although it’s not directly linked to Hudson Rock’s findings.

See also  Introducing GPT-5.2 "Codex-Max": OpenAI's Latest Innovation

Zestix has offered to sell stolen data volumes ranging from gigabytes to terabytes, including aircraft maintenance manuals, defense files, customer databases, health records, mass-transit schematics, utility maps, and government contracts.

Size and type of exposed data
Size and type of exposed data
Source: Hudson Rock

Additionally, Hudson Rock has uncovered another set of 30 victims sold under the alias “Sentap.” They emphasize that cloud exposure is a systemic issue stemming from organizations’ lax security practices, with infected computers identified at major companies like Deloitte, KPMG, Samsung, Honeywell, and Walmart.

Hudson Rock has informed ShareFile of the breaches and plans to notify Nextcloud and OwnCloud for appropriate action.

Wiz

As MCP (Model Context Protocol) becomes the standard for connecting LLMs to tools and data, security teams are moving fast to keep these new services safe.

This free cheat sheet outlines 7 best practices you can start using today.

Trending