New BlackFile Extortion Group Uses Vishing Calls to Target Retail and Hospitality Firms


A new extortion group known as BlackFile is using phone calls, fake IT support messages, and stolen login codes to break into corporate systems. The group has been linked to a wave of data theft and extortion attacks affecting retail and hospitality organizations since February 2026.

BlackFile is also tracked as CL-CRI-1116, UNC6671, and Cordial Spider. Researchers say the group focuses on social engineering instead of custom malware, which makes the attacks harder to detect with traditional endpoint tools.

The campaign shows how extortion groups are moving beyond email phishing. Instead of sending a malicious attachment, the attackers call employees, pretend to work for the company’s IT helpdesk, and direct them to fake login pages that collect credentials and one-time passcodes.

BlackFile relies on trust, not malware

The BlackFile intrusion chain starts with vishing, or voice phishing. Attackers use spoofed VoIP numbers or fake caller ID names to make the call look like it came from a trusted internal source.

Once the employee follows the instructions, the fake login page captures the username, password, and MFA code. The attackers then use that short window to access the victim’s single sign-on environment.

After logging in, BlackFile operators can register their own devices with the company’s multifactor authentication system. That gives them a more durable way back into the environment without needing to trick the same employee again.

What the attackers do after getting access

BlackFile operators look for higher-value accounts after the first compromise. Researchers say the group scrapes internal employee directories and moves toward executive-level access when possible.

The group then targets cloud data stored in platforms such as Salesforce and SharePoint. Instead of deploying obvious malware, the attackers abuse standard API functions and normal download features to move data out of the company.

The stolen files may include employee phone lists, confidential business reports, and documents containing sensitive terms such as “confidential” or “SSN.” The use of normal cloud functions helps the activity blend into legitimate SSO-authenticated sessions.

At a glance

ItemWhat the current reporting shows
Group nameBlackFile
Other namesCL-CRI-1116, UNC6671, Cordial Spider
Main tacticVishing, or voice phishing
First reported activity windowJanuary to February 2026
Main targetsRetail and hospitality, with activity across multiple industries
Primary goalData theft and extortion
Common entry pointFake IT helpdesk calls
Cloud platforms targetedSalesforce and SharePoint
Notable behaviorDevice registration to bypass MFA prompts
Reported ransom rangeSeven-figure demands

The extortion pressure goes beyond leaked files

After stealing data, BlackFile uses a leak site to pressure victims. The group may contact companies through compromised employee email accounts or randomly created Gmail addresses.

The pressure can also move offline. Reports say employees at compromised companies, including senior executives, have faced swatting attempts. Swatting involves making false emergency calls to send police or emergency responders to a victim’s location.

That tactic turns a corporate breach into a personal safety issue. It also matches a broader pattern in some extortion communities, where attackers combine data theft, harassment, and public shaming to force payment.

Why this matters for retailers and hotels

Retail and hospitality companies often have large frontline workforces, distributed locations, seasonal staff, and heavy use of cloud systems. Those conditions give vishing groups more opportunities to impersonate IT support.

BlackFile data leak site (RH-ISAC)

The attack also bypasses many controls that companies built for email phishing. A secure email gateway cannot block a phone call. Link scanning tools will not help if an employee types a fake login address after speaking to someone they believe works for IT.

BlackFile’s approach also shows why MFA alone no longer stops every identity attack. MFA still matters, but attackers now focus on stealing live passcodes, enrolling their own devices, or abusing helpdesk workflows.

How organizations can reduce the risk

Security teams should treat helpdesk verification as a frontline control. Employees need a safe way to verify IT calls before they share information, open remote access tools, or visit login pages.

RH-ISAC recommends stronger call-handling policies, multifactor identity checks for callers, and simulation-based social engineering training for frontline staff.

Companies should also monitor for new device registrations, unusual Salesforce API usage, large SharePoint downloads, and suspicious searches for sensitive file names. These signals may reveal activity that looks normal at the tool level but abnormal for the employee account.

What security teams can do now

  • Require employees to end unexpected IT calls and call back through an approved internal number.
  • Block new MFA device registration without stronger identity checks.
  • Alert on unusual SSO logins, especially after helpdesk contact.
  • Review Salesforce and SharePoint API activity for high-volume exports.
  • Monitor searches for sensitive terms such as “SSN,” “confidential,” and “payroll.”
  • Train frontline staff with realistic vishing simulations.
  • Limit executive directory exposure inside internal systems.
  • Review Gmail or external email contact during extortion response.

FAQ

What is BlackFile?

BlackFile is a financially motivated extortion group linked to data theft attacks that use vishing, stolen credentials, and cloud data exfiltration. It is also tracked as CL-CRI-1116, UNC6671, and Cordial Spider.

What is vishing?

Vishing means voice phishing. Attackers call victims by phone, pretend to be someone trustworthy, and push them to reveal credentials, MFA codes, or other sensitive information.

Why are retail and hospitality companies being targeted?

These sectors often have many employees, large customer-facing teams, and complex cloud environments. That makes social engineering easier and gives attackers more accounts to target.

Does BlackFile use ransomware?

Current reporting focuses on data theft and extortion, not file encryption. The group steals sensitive files and uses leak threats, ransom emails, and victim pressure tactics to demand payment.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages