BlackFile Extortion Group: 7-Figure Ransoms Hit Retail Via Vishing MFA Bypass
The retail and hospitality industries are under a sustained assault from a new extortion group that has turned the corporate helpdesk call into a precision weapon. BlackFile ransomware — publicly disclosed April 24, 2026 by Palo Alto Networks Unit 42 and RH-ISAC — has systematically targeted retail and hospitality organizations since February 2026 using BlackFile ransomware vishing attacks that bypass multi-factor authentication without deploying a single line of custom malware. The group, also tracked as CL-CRI-1116, UNC6671, and Cordial Spider, has demanded ransoms in the seven-figure range from multiple victims and escalated to SWATting executives when negotiations stall.
What distinguishes BlackFile from every other extortion group operating in 2026 is the complete absence of a payload. There is no encryption. There is no exploit. There is no dropper. Operators impersonate corporate IT helpdesk staff via spoofed VoIP numbers, direct employees to convincing SSO phishing portals, harvest credentials and live one-time passcodes in real time, and use those credentials to register attacker-owned devices in Microsoft Entra ID. From that point forward, they operate as a trusted, MFA-enrolled user — abusing the Microsoft Graph API and Salesforce's own download functions to systematically exfiltrate confidential files. Data is staged on MEGA and LimeWire and published on BlackFile's dark web leak site before victims are ever contacted.
This approach makes BlackFile operationally significant beyond the immediate financial damage. Every organization that runs an IT helpdesk, maintains Salesforce CRM with customer or employee PII, and has staff trained to respond to urgent IT requests is already inside BlackFile's target profile. The group's link to The Com — an English-speaking criminal network with documented involvement in real-world violence — means the threat extends beyond the digital realm. With RH-ISAC confirming active incidents across multiple retail chains and 21 attacker-controlled IP addresses now public, the window for preemptive action is now.
How BlackFile vishing bypasses MFA: the real-time credential relay attack chain
BlackFile's attack chain requires no vulnerability, no exploit, and no malware — only a phone call and a convincing IT support persona.
Operators initiate contact via spoofed Voice over Internet Protocol (VoIP) numbers with fraudulent Caller ID Names (CNAM) designed to display as internal IT helpdesk lines. The social engineering pretext is typically urgent: a flagged suspicious login requiring immediate verification, a mandatory MFA enrollment update, or a credential reset tied to a security incident. Frontline employees in retail environments with high helpdesk interaction rates are the primary targets.
Victims are directed to attacker-controlled phishing pages that mirror the organization's genuine SSO portal with high fidelity. When a victim enters their username, password, and time-based one-time password (TOTP), a reverse proxy relays these credentials to the legitimate SSO service in real time — bypassing the TOTP's 30-second validity window. The stolen session is immediately used to enroll an attacker-controlled device in Microsoft Entra ID, granting it trusted, MFA-enrolled status.
With a persistent, MFA-bypassed session established, BlackFile operators scrape internal employee directories, identifying executive and senior-level accounts for privilege escalation. Antidetect browsers combined with residential proxy infrastructure mask geographic origin, defeating location-based Conditional Access policies. The entire sequence from initial vishing call to persistent executive-level access has been completed in under 90 minutes in confirmed Mandiant incident response engagements.
Vishing Call — Spoofed VoIP, IT Helpdesk Impersonation
Operators call employees from spoofed VoIP numbers displaying as internal IT support lines. The pretext is urgent: a flagged login, MFA update, or mandatory credential reset. High-volume retail helpdesk environments are primary targets.
TOTP Harvest — Real-Time Credential Relay via Reverse Proxy
Victims enter credentials and live TOTPs on a convincing SSO phishing page. Attackers relay these to the genuine SSO portal in real time, defeating the 30-second TOTP validity window before it expires.
MFA Bypass — Device Registration in Microsoft Entra ID
Using the harvested session, attackers enroll an attacker-controlled device in Microsoft Entra ID. The device is now trusted and MFA-enrolled — all subsequent sessions bypass MFA prompts entirely.
Privilege Escalation — Executive Directory Scraping
Attackers enumerate internal employee directories to identify executive accounts. Using credential reuse or access inheritance, they escalate to senior-level access while antidetect browsers and residential proxies defeat Conditional Access location policies.
Exfiltration — Microsoft Graph API and Salesforce API Abuse
Attackers use legitimate Salesforce API downloads and Microsoft Graph API calls to export confidential files, targeting documents containing 'confidential' and 'SSN' keywords. Data is staged on MEGA and LimeWire.
Extortion — Dark Web Publication Before Victim Contact
Stolen data is published on BlackFile's dark web leak site before victims are contacted. Ransom demands in the seven-figure range are delivered via compromised employee email or Gmail addresses. SWATting attacks target executives during stalled negotiations.
Retail and hospitality in the crosshairs: why these sectors are BlackFile's primary targets
BlackFile's sector focus is not incidental — it reflects a calculated assessment of where vishing attacks are most likely to succeed and where the highest-value exfiltration targets are concentrated.
Retail and hospitality organizations share three characteristics that make them ideal BlackFile targets. First, distributed workforces and high helpdesk interaction rates mean employees are accustomed to IT support calls and are less likely to apply rigorous verification. A retail associate accustomed to receiving calls from central IT about POS system updates or VPN credential resets has little basis to distinguish a legitimate call from a spoofed one. Second, these sectors maintain large Salesforce CRM deployments containing millions of customer records, employee PII, and confidential business documents — exactly the data BlackFile targets in its exfiltration phase. Third, retail and hospitality organizations often under-invest in security operations relative to their data exposure, creating a favorable attacker-to-defender capability gap.
BlackFile's campaign escalated against these sectors in February 2026, with RH-ISAC issuing a sector-wide alert on April 24, 2026 following confirmed incidents across multiple member organizations. The group has struck at least a dozen retail chains, with individual victim losses including both the extortion demand and significant operational disruption costs.
Similar vishing-led extortion targeting hospitality was documented in the [Booking.com STORM-1865 ClickFix campaign](/blog/booking-com-storm-1865-clickfix-reservation-breach) in early 2026, suggesting a broader attacker interest in credential theft from consumer-facing service businesses.
Salesforce and SharePoint weaponized as exfiltration platforms — no malware required
BlackFile's exfiltration methodology represents a significant evolution in how extortion groups approach data theft. Rather than deploying custom malware, post-exploitation frameworks, or exploit-based lateral movement, BlackFile operators use the legitimate API access that enterprise applications grant to authenticated users.
Once inside a Salesforce instance, attackers use standard export and download functions to pull CSV datasets of customer records, employee information, and confidential business documents. The Microsoft Graph API provides equivalent access to SharePoint content — a standard function that any properly authenticated Microsoft 365 session can invoke. Searches are targeted: BlackFile specifically hunts for documents containing keywords including 'confidential' and 'SSN,' maximizing extortion value.
This approach has significant defensive implications. Traditional DLP tools configured to detect malware behavior or unusual process activity will not flag a legitimate Salesforce export performed under a legitimately authenticated — but attacker-controlled — session. Detection requires inspecting session behavior itself: bulk downloads, off-hours activity, the Python-requests/2.28.1 user-agent that RH-ISAC identified as a consistent BlackFile IOC, and Graph API calls from unexpected geographic origins.
The exfiltration is completed before victim contact begins. By the time a ransom demand arrives, the data is already on attacker infrastructure and published on the dark web — the same pre-extortion publication model seen in the [ShinyHunters Salesforce breach of McGraw-Hill](/blog/shinyhunters-mcgraw-hill-salesforce-breach-45-million), creating maximum pressure before any negotiation begins.
“BlackFile abuses Microsoft Graph API permissions to scrape SharePoint sites and uses Salesforce API export functions to download confidential records — no custom tools, no implants, nothing that any signature-based control would recognize as malicious.”
— RH-ISAC Threat Intelligence — Extortion in the Enterprise: Defending Against BlackFile Attacks, April 24, 2026
BlackFile and The Com: attribution, SWATting risk, and escalation beyond the digital realm
Attribution of BlackFile has been performed by multiple threat intelligence teams. Palo Alto Networks Unit 42 tracks the group as CL-CRI-1116, assessing with moderate confidence a connection to The Com — a loose-knit network of primarily English-speaking young cybercriminals with documented involvement in extortion, violence, swatting, and the recruitment of minors for criminal activity. Mandiant tracks the same cluster as UNC6671, and CrowdStrike uses the alias Cordial Spider, indicating broad industry agreement on the group's existence and activity.
The Com connection matters operationally because it elevates BlackFile beyond a standard financially motivated threat actor. The Com has a documented history of SWATting — reporting false emergencies to law enforcement to trigger armed police responses at the home addresses of extortion targets. Multiple BlackFile victims have experienced SWATting incidents targeting corporate executives during ransom negotiations, introducing a real-world physical danger component that most enterprise security programs are not designed to manage.
For defenders, The Com attribution also means the attacker profile includes individuals motivated by notoriety and disruption as well as financial gain — making negotiation dynamics less predictable than with purely financially motivated RaaS operators. The group's English-language fluency and inside knowledge of corporate helpdesk procedures suggests either direct experience in corporate environments or significant pre-campaign reconnaissance.
The Anubis RaaS group's combination of financial extortion and operational disruption [documented in April 2026](/blog/anubis-ransomware-signature-healthcare-brockton) shows surface similarities, but BlackFile's physical escalation capability is a distinct threat vector organizations must incorporate into their incident response planning.
BlackFile IOCs: hunting Python-requests in Salesforce logs and Entra ID device registration events
RH-ISAC's April 24, 2026 advisory contains the most comprehensive public set of BlackFile indicators of compromise, including 21 attacker-controlled IP addresses and the Python-requests/2.28.1 user-agent string. Detection of BlackFile activity is feasible before significant exfiltration occurs — if the right signals are being monitored.
The highest-value detection opportunity is the device registration event that establishes MFA-bypassed persistence. Microsoft Entra ID logs will show a new device enrollment from an IP address or user-agent not previously associated with the account. Conditional Access policies configured to require admin approval for new device registrations, or to flag registrations from locations not previously associated with the user, will surface this activity in near real-time.
In Salesforce, the key signal is bulk export activity — particularly exports of Contact, Lead, and Account records containing PII — performed outside standard business hours or from IP addresses in the published BlackFile IOC list. Salesforce's Event Monitoring add-on provides the granular session-level logs needed. Similarly, Microsoft Graph API calls pulling large volumes of SharePoint files should alert in CASB or SSPM tools configured for anomalous download behavior.
| Artifact | Type | SHA-256 (Truncated) |
|---|---|---|
| Python-requests/2.28.1 | User-Agent | Consistent BlackFile user-agent in Salesforce API and Microsoft Graph API logs — high-fidelity detection IOC |
| 24.177.37[.]97 | IP Address | BlackFile attacker-controlled infrastructure — RH-ISAC IOC advisory April 24, 2026 |
| 35.139.72[.]161 | IP Address | BlackFile attacker-controlled infrastructure — RH-ISAC IOC advisory April 24, 2026 |
| 37.19.210[.]9 | IP Address | BlackFile attacker-controlled infrastructure — RH-ISAC IOC advisory April 24, 2026 |
| 185.193.127[.]130 | IP Address | BlackFile attacker-controlled infrastructure — RH-ISAC IOC advisory April 24, 2026 |
| New Entra ID device registration + bulk Salesforce/SharePoint API export (off-hours) | Behavioral | Highest-value detection pattern — MFA bypass followed immediately by API-based bulk data download |
Any instance of msimg32.dll found outside C:\Windows\System32 is an active IOC. Isolate the host immediately. Full hashes and IOC lists are available via the Cisco Talos GitHub repository.
How to defend against BlackFile: vishing controls, Conditional Access, and SaaS telemetry
BlackFile's attack chain has four distinct intervention points: the vishing call, the credential harvest, the device registration, and the exfiltration. Defensive controls addressing any one of these points can break the kill chain before significant damage occurs.
Implement callback verification for all IT helpdesk credential requests
Establish a published, out-of-band callback procedure: any IT helpdesk call requesting credential changes, MFA resets, or device enrollments must be verified by calling back the employee on a known number from the internal directory — not the number that called in. Document this policy explicitly and conduct simulation training specifically testing employee response to urgent, spoofed IT support calls. BlackFile's entire attack chain fails if the initial vishing call is terminated.
Require Conditional Access approval for new device registrations
Configure Microsoft Entra ID Conditional Access to require privileged administrator approval for new device registrations, or to flag registrations from IP addresses not previously associated with the user. This breaks BlackFile's MFA bypass mechanism at the device registration step. Alternatively, restrict device registration entirely to a managed enrollment workflow — blocking the self-service registration that BlackFile exploits.
Monitor for Python-requests/2.28.1 in Salesforce and Microsoft Graph API logs
Enable Salesforce Event Monitoring (or a CASB integration) and configure alerts for the Python-requests/2.28.1 user-agent string in Salesforce login history and API usage logs. In Microsoft Graph API telemetry, alert on bulk SharePoint file downloads from sessions exhibiting this user-agent. Block the 21 IOC IP addresses published in the RH-ISAC advisory at the perimeter and in Salesforce's Trusted IP Ranges configuration.
Deploy SSPM for continuous Salesforce and SharePoint access monitoring
SaaS Security Posture Management tools provide continuous monitoring of SaaS application access patterns, flagging anomalous bulk downloads, unusual API client identifiers, and access from unexpected geographic locations. Given BlackFile's entirely API-based exfiltration methodology, SSPM provides detection coverage that endpoint-centric EDR tools cannot — there is no process, no file write, and no network connection that a traditional EDR would flag as suspicious.
Conduct vishing-specific security awareness training
Standard phishing awareness training does not prepare employees for vishing attacks. Commission simulations specifically targeting the BlackFile scenario: an urgent call from a number appearing to be internal IT requesting immediate credential verification. Measure employee callback compliance rates and use failures as targeted coaching opportunities. Frontline retail and hospitality staff with high helpdesk interaction rates should be prioritized for this training.
The bottom line
BlackFile ransomware vishing attacks have proven that an extortion group can achieve seven-figure ransom demands without any malware, without any exploit, and without triggering any conventional security control — using only a phone call and an employee's instinct to help IT. Block all 21 RH-ISAC IOC IP addresses now, enable Conditional Access device registration controls today, and run a vishing simulation for frontline staff this week. The attack chain is simple — and it is equally simple to break before the data leaves.
Frequently asked questions
What is BlackFile extortion group?
BlackFile (also tracked as CL-CRI-1116, UNC6671, and Cordial Spider) is a financially motivated extortion group active since January 2026. The group targets retail and hospitality organizations using voice phishing (vishing) to impersonate IT helpdesk staff, bypass multi-factor authentication via device registration, and exfiltrate data from Salesforce and SharePoint. BlackFile demands seven-figure ransoms and has been linked with moderate confidence to The Com, an English-speaking cybercriminal network.
How does BlackFile bypass multi-factor authentication?
BlackFile operators call employees from spoofed VoIP numbers, impersonating corporate IT helpdesk staff and directing victims to phishing pages that harvest credentials and real-time one-time passwords (TOTPs). Attackers immediately relay these TOTPs to register their own devices in Microsoft Entra ID — granting persistent, MFA-bypassed access without triggering further authentication prompts. The device registration step is the critical persistence mechanism.
Which industries does BlackFile target?
BlackFile's confirmed targeting focus is retail and hospitality organizations, with campaign activity escalating against these sectors from February 2026. The group is drawn to organizations with large Salesforce and SharePoint deployments containing employee PII, confidential documents, and financial records. Retail organizations with distributed workforces and high helpdesk call volumes are especially vulnerable to the group's vishing social engineering approach.
What data does BlackFile steal from victims?
BlackFile exfiltrates data from Salesforce and SharePoint using standard API functions — no custom malware required. Attackers search specifically for files containing keywords including 'confidential' and 'SSN'. Stolen data typically includes employee PII, CSV datasets, internal confidential reports, and financial documents. Exfiltrated data is staged on file-sharing services including MEGA and LimeWire before publication on BlackFile's dark web leak site.
What are the BlackFile IOCs defenders should hunt for?
Key BlackFile IOCs include the Python-requests/2.28.1 user-agent in Salesforce and Microsoft Graph API logs, bulk API downloads of SharePoint content outside business hours, new device registrations from residential proxy IP ranges, and inbound calls from spoofed VoIP numbers claiming to be IT helpdesk. RH-ISAC published 21 attacker-controlled IP addresses in their April 24, 2026 advisory — block these at the perimeter immediately.
Is BlackFile linked to The Com network?
Palo Alto Networks Unit 42 assessed with moderate confidence that BlackFile is linked to The Com — a loose-knit network of predominantly English-speaking young cybercriminals known for extortion, violence, and recruitment of minors. This connection elevates BlackFile beyond a purely financial threat: operators have conducted SWATting attacks against corporate executives when ransom negotiations stalled, introducing a documented real-world physical harm component.
Does BlackFile use ransomware encryption?
No. BlackFile is a pure data theft and extortion operation — no encryption is deployed against victim systems. The group steals data from Salesforce and SharePoint, publishes it on a dark web leak site, and then contacts victims with ransom demands. This means traditional defenses such as immutable backups provide no protection against BlackFile. The primary threat is data exposure and extortion, not system unavailability.
How can organizations defend against BlackFile vishing attacks?
Core defenses include establishing callback verification procedures for all IT helpdesk calls requesting credential resets, enabling Conditional Access policies that flag new device registrations from anomalous locations, deploying SSPM to alert on bulk Salesforce and SharePoint API downloads, and conducting vishing-specific simulation training for frontline staff. Monitor Salesforce event logs and Microsoft Graph API telemetry for the Python-requests/2.28.1 user-agent string.
Sources & references
- BleepingComputer — New BlackFile extortion group linked to surge of vishing attacks
- RH-ISAC — Extortion in the Enterprise: Defending Against BlackFile Attacks
- KENSAI Cybersecurity — Security Briefing April 25 2026: Firestarter, Zimbra, BlackFile
- We Fix PC — New BlackFile extortion group linked to surge of vishing attacks
Critical CVE Reference Card 2025–2026
25 actively exploited vulnerabilities — CVSS scores, exploit status, and patch availability. The reference card your SOC team needs, free with your newsletter subscription.
No spam. Unsubscribe anytime.
Get threat intel before your inbox does.
50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.
Unsubscribe anytime. We never sell your data.

Founder & Cybersecurity Evangelist, Decryption Digest
Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.
