How the devices ended up compromised is unclear, but what matters is that Zestix was able to use the credentials to access ...