Emerging Ransomware Group 'Mnt6' Claims Cyberattack on New Zealand Electrical Firm McKay

New Ransomware Group 'Mnt6' Surfaces, Claims Attack on New Zealand Contractor McKay

MEDIUM
May 4, 2026
3m read
RansomwareThreat ActorCyberattack

Impact Scope

Affected Companies

McKay

Industries Affected

Critical InfrastructureManufacturing

Geographic Impact

New Zealand (national)

Related Entities

Threat Actors

Mnt6

Organizations

New Zealand's National Cyber Security Centre (NCSC)Office of the Privacy CommissionerWatchGuard

Other

McKay

Full Report

Executive Summary

McKay, a prominent New Zealand electrical engineering firm, has confirmed it was the victim of a cyberattack in January 2026. A newly emerged ransomware group calling itself Mnt6 has claimed responsibility, listing McKay on its darknet leak site on April 30, 2026. McKay stated that the incident involved unauthorized access to a single internal device, which was quickly contained. To prevent the dissemination of stolen data, the company has secured a court injunction. The Mnt6 group is a new and largely unknown entity, with this attack marking its emergence on the cybercrime scene. The incident highlights the continuous threat of ransomware to critical infrastructure service providers.


Threat Overview

  • Victim: McKay, a large New Zealand electrical contractor serving critical sectors.
  • Threat Actor: Mnt6, a new ransomware group that appeared in late April 2026.
  • Timeline:
    • January 2026: McKay detects and contains unauthorized access.
    • April 30, 2026: Mnt6 lists McKay on its darknet leak site.
  • Tactic: The attack follows the standard double-extortion model, where data is exfiltrated with the threat of public release.

McKay's response was swift, involving immediate containment, engagement of third-party specialists, and notification to authorities, including the Office of the Privacy Commissioner and New Zealand's National Cyber Security Centre (NCSC). The company's proactive legal step to obtain a court injunction is a notable strategy to counter the data leak threat.

Little is known about the Mnt6 group. With only two other Canadian firms listed as victims, their capabilities, affiliations, and TTPs are still being analyzed by the security community. Some speculation suggests they may operate as a data broker in addition to ransomware.


Technical Analysis

Details about the attack vector are sparse. McKay's statement mentioning access to "one internal device" could imply anything from a compromised user endpoint via phishing to a misconfigured internal server. The threat actor's ability to exfiltrate data suggests they had sufficient dwell time to perform reconnaissance and identify valuable information.

MITRE ATT&CK Techniques (Inferred)


Impact Assessment

While McKay claims its IT systems are operating securely, the breach still carries significant risk. The stolen data, if it pertains to critical infrastructure projects, could have national security implications. The business impact includes the cost of incident response, legal fees for the injunction, and potential reputational damage. The proactive communication and legal strategy may help mitigate some of the reputational harm. For the broader industry, the emergence of a new ransomware group, Mnt6, is a worrying development, indicating the low barrier to entry and the continued profitability of the ransomware ecosystem.


IOCs — Directly from Articles

No specific Indicators of Compromise were mentioned in the source articles.


Cyber Observables — Hunting Hints

As Mnt6 is a new group, specific observables are unknown. General ransomware hunting should be applied:

Type
process_name
Value
rclone.exe
Description
Monitor for the use of legitimate data transfer tools like rclone, which are often abused by attackers for data exfiltration.
Type
command_line_pattern
Value
net use \\<IP>\C$ /user:<user> <pass>
Description
Look for lateral movement attempts using net use to map administrative shares.
Type
log_source
Value
Firewall/Proxy Logs
Description
Hunt for connections to newly registered domains or IP addresses in untrusted geolocations, which could be C2 servers.

Detection & Response

  1. Behavioral Monitoring: Focus on detecting ransomware TTPs rather than just specific malware signatures. Monitor for credential dumping (e.g., Mimikatz), lateral movement (e.g., PsExec), and data staging. This aligns with D3FEND's D3-PA - Process Analysis.
  2. Egress Traffic Analysis: Monitor outbound network traffic for unusually large transfers, especially to unfamiliar destinations. This uses D3-NTA - Network Traffic Analysis.
  3. Isolate and Contain: McKay's response to isolate the affected device is a textbook example of proper initial response. Have a clear plan to quickly isolate hosts or network segments upon detecting suspicious activity.

Mitigation

Standard ransomware mitigations are recommended:

  1. Secure Backups: Maintain offline, immutable, and regularly tested backups. This is the single most important defense against ransomware's impact.
  2. Access Control: Enforce the principle of least privilege and utilize network segmentation to limit an attacker's ability to move laterally.
  3. Patch Management: Keep all systems, especially internet-facing ones, patched to prevent exploitation of known vulnerabilities.
  4. Security Awareness: Train employees to recognize and report phishing attempts, which remain a primary initial access vector.

Timeline of Events

1
January 1, 2026
McKay becomes aware of unauthorized access to an internal device and contains it.
2
April 30, 2026
The Mnt6 ransomware group lists McKay as a victim on its darknet leak site.
3
May 4, 2026
This article was published

MITRE ATT&CK Mitigations

Audit

M1047enterprise

Implement comprehensive logging and monitoring to detect early signs of an intrusion, such as anomalous logins or file access.

Segmenting the network can help contain a breach to a small area, as McKay's quick isolation of a single device demonstrates.

Enforce least privilege to limit what an attacker can access even if they compromise an account or device.

Timeline of Events

1
January 1, 2026

McKay becomes aware of unauthorized access to an internal device and contains it.

2
April 30, 2026

The Mnt6 ransomware group lists McKay as a victim on its darknet leak site.

Sources & References

Exclusive: Kiwi electrical contractor confirms cyber attack
Cyber Daily (cyberdaily.au) May 4, 2026
McKay.co.nz Data Breach: Industry Reaction and Fallout
Ferbexloop (ferbexloop.com) April 4, 2026
Victim: McKay
Ransomware.live (ransomware.live) April 30, 2026
mnt6 Ransomware Attack on Engineering Leader McKay
DeXpose (dexpose.io) May 1, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Mnt6RansomwareMcKayNew ZealandThreat ActorCyberattack

📢 Share This Article

Help others stay informed about cybersecurity threats

🎯 MITRE ATT&CK Mapped

Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.

🧠 Enriched & Analyzed

Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.

🛡️ Actionable Guidance

Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.

🔗 STIX Visualizer

Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.

Sigma Generator

Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.