McKay, a prominent New Zealand electrical engineering firm, has confirmed it was the victim of a cyberattack in January 2026. A newly emerged ransomware group calling itself Mnt6 has claimed responsibility, listing McKay on its darknet leak site on April 30, 2026. McKay stated that the incident involved unauthorized access to a single internal device, which was quickly contained. To prevent the dissemination of stolen data, the company has secured a court injunction. The Mnt6 group is a new and largely unknown entity, with this attack marking its emergence on the cybercrime scene. The incident highlights the continuous threat of ransomware to critical infrastructure service providers.
McKay's response was swift, involving immediate containment, engagement of third-party specialists, and notification to authorities, including the Office of the Privacy Commissioner and New Zealand's National Cyber Security Centre (NCSC). The company's proactive legal step to obtain a court injunction is a notable strategy to counter the data leak threat.
Little is known about the Mnt6 group. With only two other Canadian firms listed as victims, their capabilities, affiliations, and TTPs are still being analyzed by the security community. Some speculation suggests they may operate as a data broker in addition to ransomware.
Details about the attack vector are sparse. McKay's statement mentioning access to "one internal device" could imply anything from a compromised user endpoint via phishing to a misconfigured internal server. The threat actor's ability to exfiltrate data suggests they had sufficient dwell time to perform reconnaissance and identify valuable information.
T1078 - Valid Accounts: A common entry point for new groups, often using credentials purchased from infostealer logs.T1560.001 - Archive via Utility: Attackers typically compress and stage data before exfiltration.T1041 - Exfiltration Over C2 Channel: Exfiltrating stolen data through their command-and-control infrastructure.T1486 - Data Encrypted for Impact: Although not explicitly stated that files were encrypted on the device, this is the primary tactic of a ransomware group.While McKay claims its IT systems are operating securely, the breach still carries significant risk. The stolen data, if it pertains to critical infrastructure projects, could have national security implications. The business impact includes the cost of incident response, legal fees for the injunction, and potential reputational damage. The proactive communication and legal strategy may help mitigate some of the reputational harm. For the broader industry, the emergence of a new ransomware group, Mnt6, is a worrying development, indicating the low barrier to entry and the continued profitability of the ransomware ecosystem.
No specific Indicators of Compromise were mentioned in the source articles.
As Mnt6 is a new group, specific observables are unknown. General ransomware hunting should be applied:
process_namerclone.execommand_line_patternnet use \\<IP>\C$ /user:<user> <pass>net use to map administrative shares.log_sourceFirewall/Proxy LogsD3-PA - Process Analysis.D3-NTA - Network Traffic Analysis.Standard ransomware mitigations are recommended:
Implement comprehensive logging and monitoring to detect early signs of an intrusion, such as anomalous logins or file access.
Segmenting the network can help contain a breach to a small area, as McKay's quick isolation of a single device demonstrates.
Enforce least privilege to limit what an attacker can access even if they compromise an account or device.
McKay becomes aware of unauthorized access to an internal device and contains it.
The Mnt6 ransomware group lists McKay as a victim on its darknet leak site.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.