No MFA, No Mercy: Hackers Hit 50+ Companies with Stolen Credentials
A threat actor named Zestix just owned over 50 multinational companies by snagging their login creds from infostealer malware logs on the dark web—no fancy exploits needed. All it took was missing multifactor authentication (MFA) for the attacker to waltz into corporate file-sharing portals and snatch sensitive data left and right.
The Dirty Details
We’re talking big names like Iberia Airlines, Burris & Macomber, Maida Health, Intecro Robotics, and Pickett & Associates across industries. Zestix (aka Sentap) grabbed valid usernames and passwords from dark web dumps, logged in straight-up, and exfiltrated corporate and customer goodies. This breach cluster popped up in the last 24 hours’ roundup, making it the hottest cybersecurity wake-up call right now. No zero-days, no phishing—just pure, preventable credential abuse.
Why Devs Should Sweat This
If you’re building apps or managing infra without baking in MFA everywhere, you’re handing attackers the keys. Infostealers are everywhere, silently harvesting creds that sit dormant until some punk like Zestix flips the switch months later. Devs: enforce MFA in your auth flows, monitor dark web leaks, and harden those file-sharing APIs—your code’s only as secure as the weakest login.
Lock It Down
Bottom line? MFA isn’t optional; it’s your first line of defense in a world of stolen creds. Flip it on today, or watch your org’s data hit the dark web tomorrow.

