<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Salesforce — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/salesforce/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 15 May 2026 17:08:04 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/salesforce/feed.xml" rel="self" type="application/rss+xml"/><item><title>UNC6671 BlackFile Vishing Extortion Campaign Targeting Microsoft 365 and Okta</title><link>https://feed.craftedsignal.io/briefs/2026-05-blackfile-vishing/</link><pubDate>Fri, 15 May 2026 17:08:04 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-blackfile-vishing/</guid><description>UNC6671, operating under the "BlackFile" brand, conducts a sophisticated extortion campaign targeting organizations through voice phishing (vishing) and single sign-on (SSO) compromise, using adversary-in-the-middle (AiTM) techniques to bypass MFA and exfiltrate sensitive corporate data.</description><content:encoded><![CDATA[<p>UNC6671, known as &ldquo;BlackFile,&rdquo; is engaged in an extensive extortion campaign targeting organizations using sophisticated vishing and SSO compromise techniques. Since early 2026, the group has targeted dozens of organizations across North America, Australia, and the UK. The group leverages adversary-in-the-middle (AiTM) attacks to bypass traditional security measures, including multi-factor authentication (MFA), primarily targeting Microsoft 365 and Okta environments. UNC6671 employs Python and PowerShell scripts to programmatically exfiltrate sensitive corporate data from SharePoint and OneDrive, later used for extortion. These attacks do not exploit software vulnerabilities but rely on social engineering, highlighting the need for phishing-resistant MFA.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Vishing:</strong> The attacker initiates a voice phishing (vishing) call to a target employee, often on their personal cellular phone, impersonating IT or help desk personnel.</li>
<li><strong>Credential Harvesting:</strong> The attacker directs the victim to a fake SSO login page (e.g., <code>&lt;organization&gt;.enrollms[.]com</code>) under the guise of a mandatory passkey migration or MFA update, capturing their username and password.</li>
<li><strong>MFA Bypass (AiTM):</strong> As the victim enters their credentials, the attacker relays them to the legitimate SSO provider, intercepting the MFA challenge (Push, SMS, or TOTP). The victim unknowingly provides the MFA code to the attacker.</li>
<li><strong>Device Registration:</strong> With successful authentication, the attacker immediately registers a new, attacker-controlled MFA device to the user&rsquo;s account for persistent access.</li>
<li><strong>Lateral Movement:</strong> Using the compromised SSO credentials, the attacker moves laterally across the victim&rsquo;s SaaS applications, focusing on Microsoft 365 and Okta environments. They access SharePoint, OneDrive, and other connected apps like Zendesk and Salesforce.</li>
<li><strong>Data Discovery:</strong> The attacker queries internal search functions within these applications, looking for sensitive data using keywords such as &ldquo;confidential&rdquo; and &ldquo;SSN.&rdquo;</li>
<li><strong>Programmatic Exfiltration:</strong> The attacker utilizes Python and PowerShell scripts to automate the exfiltration of high-value data from SharePoint and OneDrive repositories. They use Microsoft Graph API or direct HTTP GET requests, often using stolen session cookies (e.g., FedAuth) to stream file content to attacker-controlled infrastructure.</li>
<li><strong>Extortion:</strong> After successfully exfiltrating sensitive data, UNC6671 threatens to leak the stolen information on their dedicated &ldquo;BlackFile&rdquo; data leak site (DLS) unless a ransom is paid.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>UNC6671&rsquo;s campaign has targeted dozens of organizations across North America, Australia, and the UK, resulting in the theft of sensitive corporate data. Successful attacks can lead to significant financial losses, reputational damage, and legal consequences due to the exposure of confidential information and personal data. The group&rsquo;s use of social engineering and AiTM techniques allows them to bypass traditional security controls, making them a formidable threat to organizations relying on cloud-based services.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect Mismatched User-Agent and Application Display Name in SharePoint Online&rdquo; to identify scripted data exfiltration attempts with spoofed ClientAppId, based on the log example in this brief.</li>
<li>Block the domains <code>enrollms[.]com</code>, <code>passkeyms[.]com</code>, and <code>setupsso[.]com</code> at the DNS resolver to prevent users from accessing credential harvesting sites.</li>
<li>Implement phishing-resistant MFA methods, as highlighted in the overview, to prevent AiTM attacks.</li>
<li>Monitor FileAccessed events in Microsoft 365 Unified Audit Logs for unusual activity, particularly those originating from non-standard infrastructure (VPNs, hosting providers) and associated with scripting engines like python-requests, per the forensic artifacts described.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>vishing</category><category>extortion</category><category>aitm</category><category>credential-theft</category><category>data-exfiltration</category><category>sso</category></item></channel></rss>