A recent and alarming cybersecurity incident has cast a harsh spotlight on corporate vulnerabilities, revealing that a single hacker successfully infiltrated approximately 50 major global companies by exploiting one of the most fundamental security oversights. A detailed analysis from the Israeli cybersecurity firm Hudson Rock has attributed the widespread campaign to an Iranian national operating under the aliases Zestix and Sentap. Rather than employing a highly sophisticated, state-of-the-art hacking methodology, the attacker leveraged a simple, yet devastatingly effective, approach. The aftermath has resulted in a massive trove of sensitive corporate data being auctioned on dark web forums, putting trade secrets, critical infrastructure plans, and personal information at risk. The list of victims is extensive and varied, including prominent names such as Iberia Airlines, the U.S. engineering firm Pickett & Associates, Japanese homebuilder Sekisui House, and the transit vehicle manufacturer CRRC MA, demonstrating that no industry was immune to this low-tech, high-impact assault.
The Anatomy of a Simple Compromise
The success of this extensive campaign hinged not on breaching fortified corporate networks, but on targeting the weakest link in any security chain: the human element. The attacker deployed common infostealer malware, including variants like RedLine, Lumma, and Vidar, which are typically spread when individuals download compromised files or illicitly cracked software onto their personal or work computers. Once active, this malware silently scrapes the device’s web browsers, harvesting all saved login credentials without the user’s knowledge. Armed with these legitimate employee passwords, some of which were reportedly years old and never updated, the hacker faced no further obstacles. The critical failure that enabled this cascade of breaches was the conspicuous absence of Multi-Factor Authentication (MFA) across the victims’ systems. The attacker was able to simply use the stolen credentials to log directly into corporate file-sharing platforms such as ShareFile, Nextcloud, and OwnCloud, gaining unrestricted access to sensitive files as if they were the employee themselves. This direct-access method bypassed the need for complex network penetration, proving that the lack of a simple, secondary verification step was the single point of failure.
The Devastating Global Impact
The sheer volume and sensitivity of the exfiltrated data underscore the catastrophic consequences of neglecting foundational security measures. The breach exposed a wide spectrum of confidential information across multiple continents and industries, creating significant risks for public safety and national security. For example, the U.S. engineering firm Pickett & Associates lost a staggering 139 GB of data, which included detailed schematic maps of power lines and critical utility stations. In the aviation sector, Iberia Airlines had 77 GB of internal files compromised, including aircraft safety manuals that are vital for operational integrity. The threat extended directly into the defense and public transit sectors; Turkish firm Intecro Robotics had its proprietary designs for military drones and advanced fighter jets stolen, while CRRC MA, a company that supplies railcars to the LA Metro, lost internal plans and schematics for train components. Furthermore, the breach had profound implications for personal privacy, as evidenced by the theft of 2.3 terabytes of private medical records belonging to Brazil’s military police from the systems of Maida Health.
A Preventable Disaster and a Stark Warning
This incident served as a stark and costly reminder that relying on a password alone for security is an outdated and dangerously inadequate practice in the current threat landscape. The successful infiltration of dozens of major corporations was not the result of a revolutionary hacking technique but a testament to how easily preventable disasters can occur when basic cybersecurity hygiene is ignored. The entire series of breaches could have been thwarted by the widespread implementation of Multi-Factor Authentication, a readily available security layer that requires a secondary form of verification. The event highlighted a systemic failure to enforce foundational security policies, such as mandatory password updates and the adoption of MFA. Hudson Rock’s report concluded on a cautionary note, revealing that employee credentials for other corporate giants, including Samsung, Walmart, and Deloitte, were already circulating in hacker logs, suggesting these organizations remained at high risk of suffering a similar fate if they had not already fortified their defenses.






