How to Defend Your Organization Against the BlackFile Vishing Extortion Campaign

Voice phishing (vishing) attacks are becoming increasingly sophisticated, with threat actors like UNC6671—operating under the BlackFile brand—using adversary-in-the-middle (AiTM) techniques to bypass multi-factor authentication (MFA) and compromise cloud environments. This guide explains the attack lifecycle and provides actionable steps to protect your organization, focusing on phishing-resistant MFA, employee training, and detection strategies.

What You Need

Step-by-Step Guide

Step 1: Understand the Attack Lifecycle

UNC6671 relies on vishing calls to employees’ personal phones, pretending to be IT support requesting a mandatory MFA migration or passkey update. They direct victims to a credential harvesting site (often using subdomains like “passkey” or “enrollment”) and use AiTM proxies to steal session tokens. Once inside, they leverage Python and PowerShell scripts to exfiltrate data from Microsoft 365 and Okta. Knowing this flow helps you anticipate their moves.

How to Defend Your Organization Against the BlackFile Vishing Extortion Campaign
Source: www.mandiant.com

Step 2: Deploy Phishing-Resistant MFA

Standard MFA (e.g., SMS codes, push notifications) can be intercepted via AiTM. Implement phishing-resistant methods like FIDO2 security keys, certificate-based authentication, or Windows Hello for Business. This breaks the attack chain—even if credentials are stolen, the session cannot be hijacked. Prioritize for all users with SSO access.

Step 3: Train Employees to Recognize Vishing

Educate staff that IT will never call personal numbers or ask them to “enroll in MFA” via a link. Simulate vishing calls during security drills. Encourage reporting any unsolicited IT-related calls to your security team immediately. Reinforce that any security alert triggered during a real attack should be verified through official channels.

Step 4: Monitor for Suspicious Authentication Events

Review IdP logs for unusual patterns:

Set up real-time alerts for these anomalies. Use conditional access policies to block sign-ins from unexpected countries or devices.

How to Defend Your Organization Against the BlackFile Vishing Extortion Campaign
Source: www.mandiant.com

Step 5: Secure SSO and OAuth Configurations

Limit the number of OAuth apps and require admin consent for high-risk permissions. Audit existing third-party integrations in your IdP. Disable legacy authentication protocols that bypass MFA. Implement strict session controls (e.g., session timeout, risk-based sign-in). UNC6671 exploits SSO trust—so reduce the attack surface.

Step 6: Establish an Incident Response Plan for Vishing

Create a playbook specific to vishing and SSO compromise:

Practice the plan with tabletop exercises. Ensure legal and communications teams are ready for extortion threats.

Tips for Long-Term Defense

By following these steps, your organization can significantly reduce the risk of falling victim to the BlackFile extortion campaign and similar identity-centric attacks.

Recommended

Discover More

Kubernetes v1.36 Strengthens Security with General Availability of Fine-Grained Kubelet AuthorizationRugOne Xever 7 Pro Breaks Mold with Real-World Practicality for Outdoor UsersWhy AWS Interconnect is now generally available, with a new option to simplif...5 Incredible Deals on Discontinued Apple Watch Bands and More – Don't Miss Out!Revolutionary Docker Tool Lets You Run AI Image Generation Locally – No Cloud Subscription Needed