❌

Normal view

Received yesterday β€” 13 February 2026

RFC 4058 – Authentication Protocol Overview

A deep dive into RFC 4058 authentication protocols for software development. Learn about key management, security requirements, and modern ciam implementation.

The post RFC 4058 – Authentication Protocol Overview appeared first on Security Boulevard.

Received before yesterday

Are Passkeys Safely Synced Across Multiple Devices?

Explore the security of passkey synchronization. Learn how end-to-end encryption and cloud providers keep passwordless authentication secure across devices.

The post Are Passkeys Safely Synced Across Multiple Devices? appeared first on Security Boulevard.

Methods for Authenticating Devices on a Network

Explore different methods for authenticating devices on a network, from hardware addresses to advanced certificate-based systems for developers.

The post Methods for Authenticating Devices on a Network appeared first on Security Boulevard.

Infostealers and Lack of MFA Led to Dozens of Major Breaches

7 January 2026 at 15:31

Infostealers and Lack of MFA Led to Dozens of Major Breaches

Infostealer infections compounded by a lack of multi-factor authentication (MFA) have resulted in dozens of breaches at major global companies and calls for greater MFA use. The issue came to light in a Hudson Rock post that detailed the activity of a threat actor operating under the aliases β€œZestix” and β€œSentap.” The threat actor has auctioned data stolen from the corporate file-sharing portals of roughly 50 major global enterprises, targeting ShareFile, OwnCloud, and Nextcloud instances β€œbelonging to critical entities across the aviation, robotics, housing, and government infrastructure sectors,” the report said, taking pains to note that lack of MFA was the primary cause. β€œ... these catastrophic security failures were not the result of zero-day exploits in the platform architecture, but rather the downstream effect of malware infections on employee devices combined with a critical failure to enforce Multi-Factor Authentication (MFA),” the report said. Cyble’s threat intelligence database contains 56 dark web reports and client advisories on Zestix and Sentap going back to mid-2024, and the threat actor appears be connected to a significantly older X/Twitter account, according to a May 2025 Cyble profile. DarkSignal recently did an extensive profile of the threat actor.

Infostealers and No MFA Make Attacks Easy

The Hudson Rock report looked at 15 data breaches claimed by Zestix/Sentap and noted a common attack flow:
  • Infection: β€œAn employee inadvertently downloads a malicious file. The infostealer executes and harvests all saved credentials and browser history.”
  • Aggregation: β€œThese logs are aggregated in massive databases on the dark web. Zestix parses these logs specifically looking for corporate cloud URLs (ShareFile, Nextcloud).”
  • Access: β€œZestix simply uses the valid username and password extracted from the logs. Because the organizations listed below did not enforce MFA, the attacker walks right in through the front door. No exploits, no cookies – just a password.”
β€œThe era where brute-force attacks reigned supreme is waning,” the report said. β€œIn its place, the Infostealer ecosystem has risen to become the primary engine of modern cybercrime. β€œContrary to attacks involving sophisticated cookie hijacking or session bypasses, the Zestix campaign highlights a far more pedestrian – yet equally devastating – oversight: The absence of Multi-Factor Authentication (2FA).” Zestix relies on Infostealer malware such as RedLine, Lumma, or Vidar to infect personal or professional devices – and sometimes the gap between malware infection and exploitation is a long one, as old infostealer logs have led to new cyberattacks in some cases. β€œA critical finding in this investigation is the latency of the threat,” Hudson Rock said. β€œWhile some credentials were harvested from recently infected machines, others had been sitting in logs for years, waiting for an actor like Zestix to exploit them. This highlights a pervasive failure in credential hygiene; passwords were not rotated, and sessions were never invalidated, turning a years-old infection into a present-day catastrophe.”

ownCloud Calls for Greater MFA Use

ownCloud responded to the report with a call for greater MFA use by clients. In a security advisory, the company said, β€œThe ownCloud platform was not hacked or breached. The Hudson Rock report explicitly confirms that no zero-day exploits or platform vulnerabilities were involved.” Stolen credentials from infostealer logs were "used to log in to ownCloud accounts that did not have Multi-Factor Authentication (MFA) enabled. As the report notes: β€˜No exploits, no cookiesβ€”just a password.’” ownCloud said clients should immediately enable MFA on their ownCloud instances if they haven’t done so already. β€œMFA adds a critical second layer of verification that prevents unauthorized access even when credentials are compromised,” the company said. Recommended steps include:
  • Enabling MFA on all user accounts using ownCloud’s two-factor authentication apps
  • Resetting passwords for all users and requiring β€œstrong, unique credentials”
  • Reviewing access logs for suspicious activity
  • Invalidating active sessions to force re-authentication with MFA
Β 
❌