London-headquartered telecoms and network services company Colt is attempting to bring various customer-facing services back online after being hit by a cyber attack claimed by the Warlock ransomware gang.
The incident, which the firm at first chalked up to a technical issue, appears to have started on Tuesday 12 August at around 11am BST, when customers began reporting interruptions to their service.
On the afternoon of Thursday 14 August Colt reported that it was in fact responding to a cyber incident at Colt Technology Services, that has primarily affected the Colt Online support services and Voice API platforms.
“We detected the cyber incident on an internal system. This system is separate from our customers’ infrastructure. We took immediate protective measures to ensure the security of our customers, colleagues and business, and we proactively notified the relevant authorities,” the organisation said.
“One of our protective measures involved us proactively taking some systems offline, which has led to the disruption of some of the support services we provide to our customers. Our technical team is focused on restoring the affected systems and is working closely with third-party cyber experts.”
In an update posted on Friday 15 August, Colt said that its teams were continuing to work around the clock to restore access to the impacted systems.
“We appreciate it’s frustrating not being able to use some systems currently, including Colt Online and our Voice API platform, and we’re grateful for your understanding,” said the company.
Colt is advising customers to get in touch via email or phone should they need to, but users should be aware that there may be some delay in responding.
Ransomware gang claims hit
Per cyber news website Bleeping Computer, the cyber attack on Colt was swiftly claimed by the Warlock ransomware group, which has posted details of its intrusion to its dark web leak site.
A hacker who identified themselves with the handle ‘cnkjasdfgd’, claimed to have stolen over a million individual documents which hold data including customer, employee and financial data, and information on Colt’s network architecture and software development.
The gang is supposedly selling off this information for $200,000 (approximately £147,500), which may be an indication that its attempt to extort Colt has been rebuffed. This is unconfirmed.
Writing on social media platform Mastodon, cyber threat researcher Kevin Beaumont suggested that Colt was likely breached via a security feature bypass flaw in Microsoft SharePoint Server. The vulnerability in question – CVE-2025-53770 – bypasses a fix for a previously-patched remote code execution (RCE) bug, and was itself the subject of an emergency fix in July.
CVE-2025-53770 works by enabling an attacker to steal cryptographic keys from unpatched SharePoint servers that are then used to create malicious requests to achieve RCE.
Together with a second vulnerability, CVE-2025-53771, it forms the basis of an exploit chain referred to as ToolShell
Microsoft and others swiftly identified exploitation of ToolShell by Chinese state-backed threat actors, but also warned that the Warlock crew was also sniffing around.
You want a Lamborghini?
A newly-emergent ransomware actor, Warlock announced itself to the world in June with an advertisement on a Russian cyber crime forum titled ‘If you want a Lamborghini, please call me’, according to researchers at Halcyon.
The gang runs a closed, affiliate-style business model and appears to have little known connection to any earlier brands, said Halcyon, reversing an earlier suggestion of a link to LockBit.
Through its exploitation of the SharePoint It may, however, have a link to a China-based threat actor known as Storm-2603 as evidenced through its use of the ToolShell chain.
To date it has been linked to about 11 cyber attacks, and has claimed 19 more in sectors including government, finance, manufacturing and tech.
Computer Weekly has contacted Colt for additional comment.
Source link