Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
3230 articles · 153756 vulns · 36/41 feeds (7d)
← Back to list
EST
PRE-CVE

Welcome to BlackFile: Inside a Vishing Extortion Operation

56% confidence

Description

Written by: Austin Larsen, Tyler McLellan, Genevieve Stark, Dan Ebreo Introduction Google Threat Intelligence Group (GTIG) has continued to track an expansive extortion campaign by UNC6671, a threat actor operating under the "BlackFile" brand, that targets organizations via sophisticated voice phishing (vishing) and single sign-on (SSO) compromise. By leveraging adversary-in-the-middle (AiTM) techniques to bypass traditional perimeter defenses and multi-factor authentication (MFA), UNC6671 gains

Related News (1 articles)

Tier C
Mandiant Blog5h ago
Welcome to BlackFile: Inside a Vishing Extortion Operation
→ No new info (linked only)
CISA KEV❌ No
Actively exploited❌ No
PublishedMay 15, 2026
Last enriched1h ago
Trending Score20
Source articles1
Independent1
Info Completeness2/14
Missing: cve_id, vendor, product, versions, cvss, epss, cwe, kev, exploit, patch, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Pin to Dashboard

Verification

State: reported
Confidence: 56%

Vulnerability Timeline

CVE Published
May 15, 2026
Discovered by ZDM
May 15, 2026