BlackFile Gang Uses Vishing to Hit Retail and Hospitality Orgs
New extortion group BlackFile impersonates IT helpdesks via phone calls to steal credentials and demand seven-figure ransoms. Targets include retail chains and hospitality companies.
A new financially motivated hacking group called BlackFile has emerged as a significant threat to retail and hospitality organizations, using voice phishing (vishing) calls to compromise employee accounts and demand ransoms reaching seven figures. The group has been active since at least February 2026.
Who is BlackFile?
BlackFile, also tracked as CL-CRI-1116, UNC6671, and Cordial Spider by various threat intelligence firms, operates a data theft and extortion scheme that bypasses traditional malware delivery entirely. Instead of phishing emails or exploit kits, they call employees directly.
Unit 42 researchers have linked BlackFile "with moderate confidence" to The Com, a network of English-speaking cybercriminals known for recruiting young people into extortion and exploitation activities. This connection suggests BlackFile may represent an evolution of tactics from groups that previously targeted individuals rather than enterprises.
Attack Methodology
Initial Access via Vishing
The attacks begin with phone calls from spoofed VoIP numbers or fraudulent Caller IDs. Threat actors pose as corporate IT support staff, directing victims to fake login pages where credentials and one-time passcodes are harvested. This technique circumvents many technical controls—employees expecting a helpdesk call may not question authentication requests that would seem suspicious in email form.
For organizations unfamiliar with these voice-based attacks, our guide on social engineering tactics covers the psychological techniques attackers use to build trust over the phone.
Credential Abuse and Escalation
Once credentials are captured, attackers:
- Register unauthorized devices to bypass MFA protections
- Scrape internal directories to identify executive accounts
- Escalate access through legitimate administrative channels
- Access Salesforce and SharePoint systems using standard API functions
The group specifically searches for files containing keywords like "confidential" and "SSN," downloading large volumes of sensitive data including CSV datasets and confidential reports to attacker-controlled infrastructure.
Extortion Tactics
BlackFile maintains a dark web data leak site where exfiltrated documents are published before victims are contacted. Ransom demands arrive via compromised employee email accounts or random Gmail addresses, with amounts reaching into the seven figures.
In a particularly aggressive twist, employees of compromised companies—including senior executives—have been targets of swatting attempts. These involve making false emergency calls to law enforcement, potentially putting victims in physical danger and adding psychological pressure to pay ransoms.
Connection to Broader Trends
BlackFile's tactics echo those of Scattered Spider, which successfully breached major casino operators using similar social engineering approaches. The retail and hospitality focus also aligns with recent ransomware trends showing threat actors shifting toward sectors with large customer databases and time-sensitive operations.
The emphasis on vishing over email phishing suggests defenders need to expand security awareness training beyond the usual "don't click suspicious links" messaging. Phone-based attacks exploit different psychological vulnerabilities and require different defensive strategies.
Defensive Recommendations
- Establish callback verification - Train employees to hang up and call IT through official channels before providing any credentials
- Implement out-of-band MFA verification - Require secondary confirmation for device enrollment changes
- Monitor for API abuse - Alert on unusual Salesforce or SharePoint bulk downloads
- Restrict sensitive file access - Limit who can search for and download files containing PII keywords
- Brief executives on swatting risks - Ensure leadership is aware this may accompany extortion attempts
BlackFile represents a concerning evolution in extortion tactics—technically simple but highly effective against organizations that have focused defensive investments on email and endpoint security while leaving phone-based attack vectors relatively unguarded.
Related Articles
LAPSUS$ Supergroup Paying Women $1,000 Per Vishing Call
Scattered Lapsus$ Hunters offers $500-$1,000 to recruit women for IT help desk social engineering attacks. The supergroup combines LAPSUS$, Scattered Spider, and ShinyHunters tactics.
Feb 26, 2026UNC6692 Deploys SNOW Malware via Fake IT Helpdesk Teams Calls
Google Cloud uncovers UNC6692, a threat actor impersonating IT helpdesk staff on Microsoft Teams to deploy the modular SNOW malware suite targeting senior executives.
Apr 24, 2026Exposed SystemBC Server Reveals 1,570+ Hidden Ransomware Victims
Check Point researchers gained access to a SystemBC C2 server operated by The Gentlemen ransomware group, uncovering over 1,570 compromised corporate networks that haven't been publicly disclosed.
Apr 23, 2026FBI: Cybercrime Losses Hit $20.9B in 2025, Up 26%
FBI IC3 2025 report reveals record $20.9 billion in cybercrime losses. Investment fraud tops $8.6B, cryptocurrency scams reach $11.4B, and ransomware losses surge 259%.
Apr 13, 2026