Search This Blog

Powered by Blogger.

Blog Archive

Labels

Footer About

Footer About

Labels

Showing posts with label Colt ransomware attack. Show all posts

Colt Technology Services Confirms Customer Data Theft After Warlock Ransomware Attack



UK-based telecommunications provider Colt Technology Services has confirmed that sensitive customer-related documentation was stolen in a recent ransomware incident. The company initially disclosed on August 12 that it had suffered a cyberattack, but this marks the first confirmation that data exfiltration took place. In its updated advisory, Colt revealed that a criminal group accessed specific files from its systems that may contain customer information and subsequently posted the filenames on dark web forums. 

To assist affected clients, Colt has set up a dedicated call center where customers can request the list of exposed filenames. “We understand that this is concerning for you,” the company stated in its advisory. Notably, Colt also implemented a no-index HTML meta tag on the advisory webpage, ensuring the content would not appear in search engine results. 

The development follows claims from the Warlock ransomware gang, also known as Storm-2603, that they are auctioning one million stolen Colt documents for $200,000 on the Ramp cybercrime marketplace. The group alleges the files contain financial data, customer records, and details of network architecture. 
Cybersecurity experts verified that the Tox ID used in the forum listing matches identifiers seen in the gang’s earlier ransom notes, strengthening the link to Colt’s breach. The Warlock Group, attributed to Chinese threat actors, emerged in March 2025 and initially leveraged leaked LockBit Windows and Babuk VMware ESXi encryptors to launch attacks. Early operations used LockBit-style ransom notes modified with unique Tox IDs to manage negotiations. 

By June, the group rebranded under the name “Warlock Group,” establishing its own negotiation platforms and leak sites to facilitate extortion. Recent intelligence reports, including one from Microsoft, have indicated that the group has been exploiting vulnerabilities in Microsoft SharePoint to gain unauthorized access to corporate networks. Once inside, they deploy ransomware to encrypt data and steal sensitive files for leverage. 

The group’s ransom demands vary significantly, ranging from $450,000 to several million dollars, depending on the target organization and data involved. Colt’s disclosure highlights ongoing challenges faced by enterprises in safeguarding critical infrastructure against sophisticated ransomware actors. Telecommunications companies, which manage vast volumes of sensitive customer and network data, remain particularly attractive targets. 

As threat actors refine their tactics and increasingly combine encryption with data theft, the risks to both organizations and their clients continue to escalate. While Colt has not confirmed whether it plans to engage with the ransomware operators, the company emphasized its focus on mitigating the impact for customers. 

For now, the stolen documents remain for sale on the dark web, and the situation underscores the broader need for enterprises to strengthen resilience against the evolving ransomware landscape.

Colt Technology Services Hit by Cyberattack, Faces Multi-Day Service Outage

 

UK-based telecom giant Colt Technology Services is battling a cyberattack that has disrupted several of its operations for multiple days, including Colt Online, hosting services, porting, and Voice API platforms.

The British telecommunications and network services provider confirmed that the attack began on August 12, with its IT teams working around the clock to contain the impact and restore systems.

Founded in 1992 as City of London Telecommunications (COLT) and acquired by Fidelity Investments in 2015, the company operates in 30 countries across Europe, Asia, and North America. Colt’s network spans 75,000 km of fiber and connects over 900 data centers globally.

Initially, Colt described the disruption as a “technical issue”, but later acknowledged it was caused by a cyber incident. As a precaution, the company took several systems offline, leading to outages in support platforms such as Colt Online and Voice API. Customers are currently unable to use the online portals and have been advised to reach out via email or phone, with delays in response times expected.

Colt emphasized that the affected systems are support services and that its core network infrastructure remains intact. However, the company has not provided an estimated timeline for service restoration. Authorities have been notified, though no details about the attackers or attack method were disclosed.

A hacker under the alias ‘cnkjasdfgd’, allegedly linked to the WarLock ransomware group, claimed responsibility for the breach. The threat actor is reportedly offering to sell one million stolen Colt documents for $200,000. The leaked samples include financial records, employee and customer data, internal emails, executive information, and software development files.

While Colt has not confirmed the breach details, cybersecurity expert Kevin Beaumont suggested that attackers may have exploited a critical Microsoft SharePoint remote code execution vulnerability (CVE-2025-53770). The flaw, patched by Microsoft on July 21, had been actively exploited as a zero-day since July 18.

Beaumont further noted that hackers might have exfiltrated hundreds of gigabytes of sensitive files.

Responding to the claims, a Colt spokesperson told BleepingComputer: "We’re aware of claims regarding the cyber incident. We are currently investigating these claims."

"Our technical team is focused on restoring the internal systems impacted by the cyber incident and is working closely with third-party cyber experts. We are grateful for our customers’ understanding as we work towards a resolution to fix the impacted internal systems."