:

BLACKFILE EXTORTION GROUP TARGETS RETAIL WITH VISHING ATTACKS

INDUSTRY DESK1 MIN READ
FRI, APR 24, 2026

■ AI-SUMMARIZED FROM 1 SOURCE BELOW

A new financially motivated hacking group called BlackFile has launched a wave of data theft and extortion attacks against retail and hospitality organizations since February 2026. The group employs vishing tactics to compromise victims.

BlackFile operates as an extortion-focused threat actor, targeting companies in retail and hospitality sectors. The group's attack methodology centers on vishing—voice phishing calls used to socially engineer employees into revealing sensitive information or granting unauthorized access. Once inside networks, BlackFile exfiltrates data and threatens to publish stolen information unless victims pay extortion demands. The campaign has shown consistent targeting patterns and sustained operational activity over several months. Security researchers tracking the group have documented the tactics and infrastructure used in the attacks. Organizations in the affected sectors are advised to implement voice security awareness training and establish protocols for verifying caller identity before granting system access. The emergence of BlackFile reflects broader trends in extortion-based ransomware operations shifting tactics to include social engineering approaches alongside technical exploits.

■ SOURCES

Bleeping Computer

■ SUMMARY WRITTEN BY AI FROM THE LINKS ABOVE

■ MORE FROM THE SECURITY DESK

Microsoft will roll out passkey support for Microsoft Entra-protected resources on Windows devices starting late April. The move enables phishing-resistant passwordless authentication for enterprise users.

1H AGOIndustry Desk

A new vulnerability called Pack2TheRoot allows local Linux users to exploit the PackageKit daemon and gain root permissions. The flaw enables attackers to install or remove system packages with elevated privileges.

2H AGODev Desk

France's national forecasting office has referred suspected tampering with weather sensors at Paris's largest airport to police after detecting unusual readings. The discovery coincides with betting activity on Polymarket.

3H AGOAI Desk

Researchers have identified a previously unknown spyware developer whose malicious apps were distributed by government authorities to infiltrate Android devices. The discovery marks another instance of state-sponsored mobile surveillance.

3H AGOIndustry Desk

■ SUBSCRIBE TO THE DAILY BRIEF

ONE EMAIL, 5 STORIES, 06:00 UTC. UNSUBSCRIBE ANYTIME.