Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

786+ Articles
120+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. New BlackFile Extortion Group Linked to Surge of Vishing Attacks
New BlackFile Extortion Group Linked to Surge of Vishing Attacks
NEWS

New BlackFile Extortion Group Linked to Surge of Vishing Attacks

A newly tracked financially motivated threat group called BlackFile has been conducting data theft and extortion campaigns against retail and hospitality organizations since February 2026. The group relies heavily on vishing — voice phishing — to gain initial access before exfiltrating data and issuing extortion demands.

Dylan H.

News Desk

April 25, 2026
5 min read

A new financially motivated hacking group tracked as BlackFile has been linked to a wave of data theft and extortion attacks targeting retail and hospitality organizations, active since at least February 2026. The group's distinguishing characteristic is its heavy reliance on vishing — voice phishing — as an initial access technique, a method that has proven effective against customer-facing industries where employees regularly handle phone inquiries.

What Is BlackFile

BlackFile is a newly identified extortion-focused threat actor, first observed by researchers in February 2026. Unlike ransomware groups that encrypt victim data as leverage, BlackFile operates as a pure extortion group: it steals data and threatens public exposure or sale unless a payment is made.

This approach — sometimes called "data extortion without encryption" — has grown in popularity because it:

  • Requires no ransomware development or maintenance
  • Avoids the operational complexity of decryption key management
  • Is harder to defend against using traditional backup-based resilience strategies
  • Can be executed faster, reducing dwell time and exposure risk for the attackers

Vishing as the Entry Point

BlackFile's defining tactic is using phone calls to manipulate employees into surrendering credentials or granting remote access. In documented attacks, threat actors:

  1. Research the target — gather employee names, roles, and contact details through LinkedIn, company websites, and prior data breaches
  2. Call IT helpdesk or support staff — impersonate employees, vendors, or corporate executives
  3. Social engineer credentials or MFA bypass — convince helpdesk staff to reset passwords, provide temporary access, or approve authentication requests
  4. Establish remote access — use gained credentials to log into VPNs, remote desktop services, or cloud management portals
  5. Exfiltrate and extort — collect sensitive data then demand payment to prevent its release

This playbook mirrors tactics used by groups like Scattered Spider (UNC3944) and LAPSUS$, both of which used vishing extensively before law enforcement disruptions.

Target Profile: Retail and Hospitality

BlackFile's focus on retail and hospitality reflects deliberate sector selection. Both industries share characteristics that make vishing attacks more viable:

  • Large, distributed workforces with high employee turnover — new staff may not recognize social engineering attempts
  • 24/7 helpdesk operations with pressure to resolve issues quickly, reducing verification rigor
  • High-value customer data — payment card information, loyalty program details, booking records
  • Customer-first culture that can make employees reluctant to challenge callers and risk appearing unhelpful

The data blackFile targets typically includes customer PII, payment records, employee information, and proprietary business data — all highly marketable in criminal forums or useful as extortion leverage.

Extortion Methodology

Once data is exfiltrated, BlackFile follows a structured extortion process:

  1. Contact — reach out to the victim organization via email, often to the security team or executive leadership
  2. Proof of compromise — provide sample data to demonstrate the breach is real
  3. Demand — issue a payment demand with a deadline
  4. Escalation — if unpaid, threaten to post data on a public leak site or sell to competitors or regulators
  5. Negotiation — engage in back-and-forth to establish a final payment amount

BlackFile is reported to operate a leak site where it posts stolen data from non-paying victims, consistent with the "name and shame" model pioneered by ransomware groups like Clop and LockBit.

Similarities to Known Groups

Security researchers note similarities between BlackFile's TTPs and those of Scattered Spider (also known as UNC3944 or Oktapus). Both groups:

  • Target retail and hospitality sectors
  • Use vishing and social engineering for initial access
  • Focus on data theft rather than ransomware deployment
  • Operate with English-speaking members comfortable in social engineering scenarios

Whether BlackFile represents former Scattered Spider members, a copycat group, or an entirely new organization is still under investigation.

Defensive Measures

Organizations in retail and hospitality should take the following steps to reduce BlackFile attack surface:

Vishing-specific defenses:

  • Implement strict callback verification for all helpdesk requests involving password resets, MFA changes, or remote access provisioning
  • Require out-of-band verification — call back requestors on a known number before making any account changes
  • Train helpdesk staff on social engineering tactics with regular simulated vishing exercises
  • Establish a zero-trust for helpdesk policy: no account changes without verified identity, regardless of urgency claimed by the caller

Technical controls:

  • Enforce phishing-resistant MFA (hardware keys or passkeys) for all privileged accounts and remote access
  • Monitor for unusual access patterns — new locations, odd hours, bulk data access or downloads
  • Implement data loss prevention (DLP) controls to alert on large-scale exfiltration attempts
  • Restrict cloud storage uploads from endpoints to approved services only

Incident response readiness:

  • Have an extortion response plan that does not assume payment will resolve the incident
  • Pre-engage with legal counsel experienced in data breach notification requirements
  • Maintain contact with law enforcement before an incident occurs

The Rise of Vishing-Led Extortion

BlackFile's emergence is part of a broader trend toward social engineering as the preferred initial access technique for financially motivated threat actors. As technical defenses improve — MFA adoption, EDR deployment, email filtering — attackers increasingly find the human element to be the weakest link.

Vishing attacks are particularly difficult to defend against at scale because they exploit trust, urgency, and the natural human desire to be helpful — all qualities that are assets in legitimate customer service roles but liabilities in an adversarial context.

Organizations should treat vishing awareness as a core component of their security training programs, not an afterthought.

Sources

  • BleepingComputer — New BlackFile extortion gang targets retail and hospitality orgs
#Extortion#Vishing#Retail#Hospitality#Data Theft#Threat Actor

Related Articles

ADT Confirms Data Breach After ShinyHunters Leak Threat

Home security giant ADT has confirmed a data breach after the ShinyHunters extortion group threatened to publish stolen data unless a ransom is paid, raising concerns over customer record exposure.

5 min read

Former DigitalMint Ransomware Negotiator Pleads Guilty to $75.3M Extortion Scheme

Angelo Martino, a former ransomware payment negotiator for DigitalMint, has pleaded guilty to helping accomplish extort $75.3 million in ransom from five victim companies in a coordinated extortion scheme.

4 min read

ShinyHunters Claims Mass Data Theft From 400 Firms via

Cybercrime group ShinyHunters claims to have exploited misconfigured Salesforce Experience Cloud instances to steal CRM data from approximately 400...

6 min read
Back to all News