Skip to main content
Suzu Logo
  • Home
  • Product
  • Our Solutions
    • AI Advisory
    • AI Assessment
    • AI Integration
    • Cybersecurity Services
  • About
    • About Us
    • FAQ's
  • Resources
    • Blog
    • In The Media
    • Podcasts
    • All Resources
Contact Us
Back to Blog
Critical Infrastructure Threat Intelligence Infostealers Credential Theft

The $150,000 Password

Mike Bell January 19, 2026 4 min read
Table of Contents

    How one threat actor turned stolen credentials into a global breach portfolio

    Between December 2025 and January 2026, a single threat actor posted 25 data sales listings on a Russian-language cybercrime forum. The victims spanned 15 countries and every major sector from aviation to critical infrastructure. Prices ranged from free to $150,000.

    The actor goes by "Zestix." And despite the sophisticated pricing and global reach, the attack method is almost embarrassingly simple.

    No zero-days. No advanced malware. No chained exploits. Zestix parses old infostealer logs for cloud credentials and tests each one until something works. When MFA is absent, they walk right in through the front door.

    The Infostealer Economy

    Infostealers like RedLine, Lumma, and Vidar have become commodity malware. An employee downloads a pirated game or clicks a malicious link. The malware quietly harvests every saved password from their browser. Those logs get sold in bulk on underground markets. Buyers like Zestix sift through them looking for corporate file-sharing URLs.

    ShareFile. Nextcloud. OwnCloud. These platforms hold sensitive documents. They're often exposed to the internet. And they're frequently protected by nothing more than a username and password.

    The barrier to entry is essentially zero. Parse the logs for corporate URLs, try the credentials, take whatever access you get.

    Gemini_Generated_Image_9yevp79yevp79yev

     

    The Victim Portfolio

    The scale is remarkable. We’ve seen Zestix's forum activity since the public reports emerged in early 2026 spanning back to just September of 2025. The confirmed victims include:

    • A U.S. engineering firm with LiDAR mapping data for major power utilities (listed for 6.5 Bitcoin, roughly $600,000)
    • A European airline with 77GB of aircraft maintenance programs and fleet configurations ($150,000)
    • A Canadian transit infrastructure project with geotechnical reports and construction risk assessments (1.8 Bitcoin)
    • A Brazilian military police healthcare provider (2.3 terabytes of medical records)
    • An Algerian logistics company with 123GB of customer data

    The common thread across all 50+ confirmed breaches? Lack of MFA on externally accessible file-sharing platforms.

    Beyond Credential Theft

    Forum intelligence reveals Zestix operates at multiple capability tiers. The credential harvesting is volume play. But the actor has also shared detailed EDR evasion techniques for bypassing SentinelOne, provides operational support for investment fraud schemes, and claims to run real-time deepfake systems for video call social engineering.

    The credential harvesting funds the operation. The higher-tier capabilities are available for high-value targets.

    The Uncomfortable Truth

    These companies weren't hacked by nation-state actors with unlimited resources. They weren't targeted by custom malware or sophisticated exploit chains. They were compromised because an employee's device got infected with commodity malware, and the organization never rotated the password or enabled a second factor.

    Every single breach was preventable with basic security hygiene.

    What Organizations Should Do

    Enable MFA everywhere. Not SMS-based. FIDO2 keys or passkeys. Every externally accessible system, no exceptions.

    Rotate passwords regularly. Some credentials in Zestix's portfolio sat in infostealer logs for years before exploitation. A malware infection from 2022 became a data breach in 2025.

    Monitor for credential exposure. Services exist that scan dark web markets and infostealer dumps for your organization's credentials. When exposure is detected, immediate password reset and session revocation.

    Assume breach. If you're running cloud file-sharing without MFA, operate under the assumption that someone already has the password.

    The infostealer economy has made credential theft scalable and cheap. The only defense is making those credentials worthless through proper authentication controls.

    Gemini_Generated_Image_yj5jiyj5jiyj5jiy

    Mike Bell is Founder and CEO of Suzu Labs, building AI-powered platforms for meeting intelligence, business intelligence, and secure document processing. With over two decades in cybersecurity spanning penetration testing, incident response, security architecture, and AI security, he brings a security-first perspective to threat analysis.

    Share
    Tags: Critical Infrastructure Threat Intelligence Infostealers Credential Theft
    Mike Bell
    Mike Bell

    Founder and CEO of Suzu Labs, a veteran-owned cybersecurity firm specializing in security assessments, data privacy, and AI-powered business intelligence. He is a U.S. Army veteran with an active security clearance and over two decades of experience in cybersecurity.

    Next → When Grid Data Goes Dark Web

    Latest Posts

    View All
    Simply Offensive Podcast: The Future of Pentesting: AI, Automation, and Better Reporting with Dan DeCloss
    Cybersecurity
    Mar 16, 2026 Phillip Wylie

    Simply Offensive Podcast: The Future of Pentesting: AI, Automation, and Better Reporting with Dan DeCloss

    The Future of Pentesting: AI, Automation, and Better Reporting with Dan DeCloss In this episode of Simply Offensive, ...

    Read More: Simply Offensive Podcast: The Future of Pentesting: AI, Automation, and Better Reporting with Dan DeCloss
    From Silence to Strike: Tracking Iran's Cyber Escalation in Real Time
    Critical Infrastructure
    Mar 13, 2026 Denis Calderone

    From Silence to Strike: Tracking Iran's Cyber Escalation in Real Time

    On March 12, medical technology giant Stryker confirmed a cyberattack that wiped devices across 79 countries. The ...

    Read More: From Silence to Strike: Tracking Iran's Cyber Escalation in Real Time
    Internal Analysis: Even Realities G2 Smart Glasses Security & Privacy Investigation
    Social Engineering
    Mar 09, 2026 Suzu Labs Intelligence

    Internal Analysis: Even Realities G2 Smart Glasses Security & Privacy Investigation

    Executive Summary Even Realities markets its G2 smart glasses as the privacy-conscious alternative to Meta Ray-Bans. ...

    Read More: Internal Analysis: Even Realities G2 Smart Glasses Security & Privacy Investigation
    The Company Reviewing Your Meta Glasses Footage Has a Security Problem
    Threat Intelligence
    Mar 06, 2026 Mike Bell

    The Company Reviewing Your Meta Glasses Footage Has a Security Problem

    Last week, Swedish journalists revealed that Meta sends video footage from Meta Ray-Ban smart glasses to human data ...

    Read More: The Company Reviewing Your Meta Glasses Footage Has a Security Problem
    The Death of the CTF: How Agentic AI Is Reshaping Competitive Hacking
    CTF
    Mar 03, 2026 Jacob Krell

    The Death of the CTF: How Agentic AI Is Reshaping Competitive Hacking

    View White Paper Abstract: Agentic AI systems are compressing competitive hacking timelines faster than the ...

    Read More: The Death of the CTF: How Agentic AI Is Reshaping Competitive Hacking
    Simply Offensive Podcast: AI Killed the CTF Star with Jacob Krell
    Cybersecurity
    Mar 03, 2026 Phillip Wylie

    Simply Offensive Podcast: AI Killed the CTF Star with Jacob Krell

    In this thought-provoking episode of Simply Offensive, host Philip Wylie sits down with Jacob Krell, a penetration ...

    Read More: Simply Offensive Podcast: AI Killed the CTF Star with Jacob Krell
    Anthropic and Claude: 2026 AI Powerhouse
    Supply Chain Security
    Feb 26, 2026 Hannah Perez

    Anthropic and Claude: 2026 AI Powerhouse

    In early 2026, the image of Anthropic as a cautious, safety-oriented "research lab" has effectively been replaced by ...

    Read More: Anthropic and Claude: 2026 AI Powerhouse
    Simply Offensive Podcast: Navigating AI's Challenges in Problem Solving with Darius Houle
    Cybersecurity
    Feb 24, 2026 Phillip Wylie

    Simply Offensive Podcast: Navigating AI's Challenges in Problem Solving with Darius Houle

    In this episode of Simply Offensive, host Philip Wylie welcomes Darius Houle, an Application Security (AppSec) and ...

    Read More: Simply Offensive Podcast: Navigating AI's Challenges in Problem Solving with Darius Houle
    Simply Offensive Podcast: Exploring the World of Hardware Hacking with Matt Brown
    Cybersecurity
    Feb 17, 2026 Phillip Wylie

    Simply Offensive Podcast: Exploring the World of Hardware Hacking with Matt Brown

    In the latest episode of the Simply Offensive podcast, host Philip Wylie sat down with Matt Brown, a renowned hardware ...

    Read More: Simply Offensive Podcast: Exploring the World of Hardware Hacking with Matt Brown
    Simply Offensive Podcast: Exploring AI Vulnerabilities in Cybersecurity with Mike Bell of Suzu Labs
    Cybersecurity
    Feb 12, 2026 Phillip Wylie

    Simply Offensive Podcast: Exploring AI Vulnerabilities in Cybersecurity with Mike Bell of Suzu Labs

    In today’s rapidly evolving technological landscape, the convergence of artificial intelligence (AI) and cybersecurity ...

    Read More: Simply Offensive Podcast: Exploring AI Vulnerabilities in Cybersecurity with Mike Bell of Suzu Labs
    Simply Offensive Podcast: Emulated Cyber Crime with Dahvid Schloss
    Threat Intelligence
    Feb 10, 2026 Phillip Wylie

    Simply Offensive Podcast: Emulated Cyber Crime with Dahvid Schloss

    Beyond the Pentest: Why Adversarial Emulation is the Future of Defensive Training Many organizations operate under the ...

    Read More: Simply Offensive Podcast: Emulated Cyber Crime with Dahvid Schloss
    Under Armour Breach: What The Forum Data Actually Shows
    Threat Intelligence
    Jan 30, 2026 Mike Bell

    Under Armour Breach: What The Forum Data Actually Shows

    On January 18, 2026, the Everest ransomware group made good on their threat and released Under Armour customer data to ...

    Read More: Under Armour Breach: What The Forum Data Actually Shows
    Brightspeed Breach: Crimson Collective and the Infostealer Problem
    Threat Intelligence
    Jan 20, 2026 Mike Bell

    Brightspeed Breach: Crimson Collective and the Infostealer Problem

    Recently Crimson Collective claimed they breached Brightspeed and grabbed 1 million+ customer records. The list of data ...

    Read More: Brightspeed Breach: Crimson Collective and the Infostealer Problem
    When Grid Data Goes Dark Web
    Power Grid
    Jan 19, 2026 Mike Bell

    When Grid Data Goes Dark Web

    Inside a threat actor's critical infrastructure targeting In January 2026, 139 gigabytes of engineering data from a ...

    Read More: When Grid Data Goes Dark Web
    The $150,000 Password
    Critical Infrastructure
    Jan 19, 2026 Mike Bell

    The $150,000 Password

    How one threat actor turned stolen credentials into a global breach portfolio Between December 2025 and January 2026, a ...

    Read More: The $150,000 Password
    Logo copy 3-1

    Fortified Security. Intelligent Innovation.

    +1 (702) 766-6257
    P.O. Box 750111
    Las Vegas, Nevada 89136

    Follow Us

    About

    • About Us
    • Contact
    • FAQ's

    Solutions

    • Products
    • AI Advisory
    • AI Assessment
    • Cybersecurity

    Resources

    • Insights
    • In The Media
    • Podcasts
    © 2026 All rights reserved.
    • Privacy Policy
    • Terms & Conditions