Lack of MFA Leads to Massive Cloud Data Breach

Lack of MFA Leads to Massive Cloud Data Breach

A glaring oversight in corporate cybersecurity has once again resulted in a catastrophic data breach, this time involving terabytes of highly sensitive information stolen from popular cloud-based collaboration platforms. A recent investigation has revealed that a threat actor, known by the alias “Zestix,” successfully infiltrated dozens of organizations by exploiting accounts that were not protected by multi-factor authentication (MFA). This incident serves as a stark and costly reminder of a persistent vulnerability within corporate security frameworks, demonstrating how the neglect of a fundamental and widely available security control can lead to devastating consequences. The breach, which impacts sectors ranging from transportation and healthcare to national infrastructure, underscores the critical need for organizations to move beyond basic password protection and embrace more robust security measures to safeguard their digital assets in an increasingly hostile threat landscape.

The Anatomy of the Attack

The Exploitation of a Simple Weakness

The methodology employed by the threat actor Zestix was alarmingly straightforward, relying on a well-established technique that preys on weak endpoint security. The initial point of entry was achieved through the deployment of various information-stealing malware strains, including notorious variants like RedLine, Lumma, and Vidar. This type of malicious software is engineered to infect employee devices, whether corporate-managed or personal, and meticulously harvest stored credentials. The malware scoured infected systems for valuable data, including login details for corporate networks, email accounts, and, most critically, saved browser session cookies and passwords for cloud services. Once these credentials were in the attacker’s possession, the path to compromise was wide open. The pivotal failure that enabled the breach was the absence of multi-factor authentication on the targeted accounts. Without the requirement for a secondary verification code, the stolen username and password combination was sufficient for Zestix to gain complete, authenticated access, effectively impersonating legitimate users and moving freely within the victims’ cloud environments.

The Scale of the Compromise

The sheer volume and sensitivity of the exfiltrated data underscore the severity of this security failure. Zestix successfully advertised and sold a vast trove of compromised information on underground forums, illustrating the widespread damage inflicted across multiple industries. The stolen data cache included two terabytes of military police health records, 77 gigabytes of highly detailed aircraft manuals, and schematics for critical mass transit systems. Furthermore, the breach exposed confidential litigation files, extensive protected patient health information (PHI) from various medical facilities, and proprietary maps used by public utility companies. The list of identified victims highlights the international scope of the attack campaign. Among the affected entities were the Massachusetts-based subsidiary of a global rolling stock manufacturer responsible for building trains for major U.S. transit authorities, Indonesia’s primary satellite operator, a major technology integrator in Colombia, and a healthcare management platform that processes sensitive medical and financial data for numerous healthcare providers across the United States. This broad impact demonstrates that no sector is immune when fundamental security controls are neglected.

The Aftermath and Industry Response

Pinpointing the Vulnerability

A thorough investigation into the breach determined that all affected organizations were users of one of three specific cloud-based collaboration solutions: ShareFile, Nextcloud, or ownCloud. While these platforms are marketed as secure solutions for file sharing and document workflows, the incident did not stem from an inherent vulnerability within the software itself. Instead, the common denominator across all victim organizations was a critical misconfiguration on the user’s end: the failure to implement and enforce multi-factor authentication. Attackers did not need to exploit complex software flaws or “hack” their way into the platforms; they simply walked through the digital front door using stolen keys. This crucial detail shifts the focus from the security of the cloud providers to the security posture of the customers who use them. The incident makes it painfully clear that even the most secure cloud environment can be rendered vulnerable if users fail to utilize the essential security features made available to them, leaving their most sensitive data exposed to elementary credential theft attacks.

A Question of Responsibility

In the wake of the breach, the implicated software providers have issued statements that consistently place the onus of security on the end-user organizations. A representative for Progress Software, the parent company of ShareFile, clarified that the platform was not compromised, stating that the credentials were stolen via malware on client machines and reiterated the company’s official guidance on the importance of using MFA. Similarly, a spokesperson for Nextcloud observed that the incident proves the critical need for two-factor authentication, while also conceding that general awareness around this essential security measure is still insufficient. Frank Balonis, the CISO of Kiteworks, which now develops ownCloud, offered a more detailed explanation. He specified that the attacks targeted self-hosted, open-source deployments where security configurations, including MFA, are left entirely to the discretion of each organization. He contrasted this with the company’s commercial platform, which offers enterprise-grade security features, such as comprehensive MFA options, by default, highlighting a significant security gap between open-source and hardened commercial offerings.

Context and Precedent

Profiling the Perpetrator

Further intelligence has shed light on the identity and history of the threat actor behind this widespread campaign. The “Zestix” persona reportedly appeared on the cybercrime scene in late 2024 or early 2025, quickly establishing a reputation for reliability on prominent Russian-speaking underground forums. Security researchers have also connected Zestix to another alias, “Sentap,” who is believed to be an Iranian national with a longer history in the cybercrime ecosystem, active since at least 2021. Under the Sentap alias, the individual operated as an initial access broker and data extortionist, selling access to compromised networks to other malicious actors. This connection becomes even more significant with Sentap’s association with the ransomware group FunkSec. This group gained notoriety shortly after its launch in December 2024 for its claims of incorporating artificial intelligence into its attack operations, suggesting that the actor behind the Zestix campaign is part of a sophisticated and evolving cybercriminal enterprise.

A Preventable Pattern of Neglect

This series of breaches served as a powerful and troubling echo of past security incidents, highlighting a persistent and dangerous trend in organizational cybersecurity. The attack methodology bore a striking resemblance to the high-profile 2024 campaign against customers of the data warehousing platform Snowflake. In that case, which impacted major corporations like Ticketmaster and Santander Bank, attackers also leveraged credentials harvested by infostealer malware to access and steal massive amounts of data from accounts that lacked MFA protection. The widespread fallout from the Snowflake incidents prompted the company to enhance its security protocols, including making MFA a default setting for new accounts. The Zestix campaign demonstrated that, despite the clear lessons from such major breaches and the wide availability of protective technologies, a significant number of organizations continued to overlook this fundamental security layer. This recurring failure to act on known threats left their most critical data assets perilously exposed to adversaries who rely on exploiting the path of least resistance.Fixed version:

A glaring oversight in corporate cybersecurity has once again resulted in a catastrophic data breach, this time involving terabytes of highly sensitive information stolen from popular cloud-based collaboration platforms. A recent investigation has revealed that a threat actor, known by the alias “Zestix,” successfully infiltrated dozens of organizations by exploiting accounts that were not protected by multi-factor authentication (MFA). This incident serves as a stark and costly reminder of a persistent vulnerability within corporate security frameworks, demonstrating how the neglect of a fundamental and widely available security control can lead to devastating consequences. The breach, which impacts sectors ranging from transportation and healthcare to national infrastructure, underscores the critical need for organizations to move beyond basic password protection and embrace more robust security measures to safeguard their digital assets in an increasingly hostile threat landscape.

The Anatomy of the Attack

The Exploitation of a Simple Weakness

The methodology employed by the threat actor Zestix was alarmingly straightforward, relying on a well-established technique that preys on weak endpoint security. The initial point of entry was achieved through the deployment of various information-stealing malware strains, including notorious variants like RedLine, Lumma, and Vidar. This type of malicious software is engineered to infect employee devices, whether corporate-managed or personal, and meticulously harvest stored credentials. The malware scoured infected systems for valuable data, including login details for corporate networks, email accounts, and, most critically, saved browser session cookies and passwords for cloud services. Once these credentials were in the attacker’s possession, the path to compromise was wide open. The pivotal failure that enabled the breach was the absence of multi-factor authentication on the targeted accounts. Without the requirement for a secondary verification code, the stolen username and password combination was sufficient for Zestix to gain complete, authenticated access, effectively impersonating legitimate users and moving freely within the victims’ cloud environments.

The Scale of the Compromise

The sheer volume and sensitivity of the exfiltrated data underscore the severity of this security failure. Zestix successfully advertised and sold a vast trove of compromised information on underground forums, illustrating the widespread damage inflicted across multiple industries. The stolen data cache included two terabytes of military police health records, 77 gigabytes of highly detailed aircraft manuals, and schematics for critical mass transit systems. Furthermore, the breach exposed confidential litigation files, extensive protected patient health information (PHI) from various medical facilities, and proprietary maps used by public utility companies. The list of identified victims highlights the international scope of the attack campaign. Among the affected entities were the Massachusetts-based subsidiary of a global rolling stock manufacturer responsible for building trains for major U.S. transit authorities, Indonesia’s primary satellite operator, a major technology integrator in Colombia, and a healthcare management platform that processes sensitive medical and financial data for numerous healthcare providers across the United States. This broad impact demonstrates that no sector is immune when fundamental security controls are neglected.

The Aftermath and Industry Response

Pinpointing the Vulnerability

A thorough investigation into the breach determined that all affected organizations were users of one of three specific cloud-based collaboration solutions: ShareFile, Nextcloud, or ownCloud. While these platforms are marketed as secure solutions for file sharing and document workflows, the incident did not stem from an inherent vulnerability within the software itself. Instead, the common denominator across all victim organizations was a critical misconfiguration on the user’s end: the failure to implement and enforce multi-factor authentication. Attackers did not need to exploit complex software flaws or “hack” their way into the platforms; they simply walked through the digital front door using stolen keys. This crucial detail shifts the focus from the security of the cloud providers to the security posture of the customers who use them. The incident makes it painfully clear that even the most secure cloud environment can be rendered vulnerable if users fail to utilize the essential security features made available to them, leaving their most sensitive data exposed to elementary credential theft attacks.

A Question of Responsibility

In the wake of the breach, the implicated software providers have issued statements that consistently place the onus of security on the end-user organizations. A representative for Progress Software, the parent company of ShareFile, clarified that the platform was not compromised, stating that the credentials were stolen via malware on client machines and reiterated the company’s official guidance on the importance of using MFA. Similarly, a spokesperson for Nextcloud observed that the incident proves the critical need for two-factor authentication, while also conceding that general awareness around this essential security measure is still insufficient. Frank Balonis, the CISO of Kiteworks, which now develops ownCloud, offered a more detailed explanation. He specified that the attacks targeted self-hosted, open-source deployments where security configurations, including MFA, are left entirely to the discretion of each organization. He contrasted this with the company’s commercial platform, which offers enterprise-grade security features, such as comprehensive MFA options, by default, highlighting a significant security gap between open-source and hardened commercial offerings.

Context and Precedent

Profiling the Perpetrator

Further intelligence has shed light on the identity and history of the threat actor behind this widespread campaign. The “Zestix” persona reportedly appeared on the cybercrime scene in late 2024 or early 2025, quickly establishing a reputation for reliability on prominent Russian-speaking underground forums. Security researchers have also connected Zestix to another alias, “Sentap,” who is believed to be an Iranian national with a longer history in the cybercrime ecosystem, active since at least 2021. Under the Sentap alias, the individual operated as an initial access broker and data extortionist, selling access to compromised networks to other malicious actors. This connection becomes even more significant with Sentap’s association with the ransomware group FunkSec. This group gained notoriety shortly after its launch in December 2024 for its claims of incorporating artificial intelligence into its attack operations, suggesting that the actor behind the Zestix campaign is part of a sophisticated and evolving cybercriminal enterprise.

A Preventable Pattern of Neglect

This series of breaches served as a powerful and troubling echo of past security incidents, highlighting a persistent and dangerous trend in organizational cybersecurity. The attack methodology bore a striking resemblance to the high-profile 2024 campaign against customers of the data warehousing platform Snowflake. In that case, which impacted major corporations like Ticketmaster and Santander Bank, attackers also leveraged credentials harvested by infostealer malware to access and steal massive amounts of data from accounts that lacked MFA protection. The widespread fallout from the Snowflake incidents prompted the company to enhance its security protocols, including making MFA a default setting for new accounts. The Zestix campaign demonstrated that, despite the clear lessons from such major breaches and the wide availability of protective technologies, a significant number of organizations continued to overlook this fundamental security layer. This recurring failure to act on known threats left their most critical data assets perilously exposed to adversaries who rely on exploiting the path of least resistance.

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later