Colt disappeared yesterday, their status page says "technical issue"
Their customer portal is also MIA: https://online.colt.net
Colt are being extorted by Warlock ransomware group, they have been for over a week, Colt are trying to cover it up.
Entry likely via sharehelp.colt.net via CVE-2025-53770 as they were interacting with it.
They've stolen a few hundred gig of customer data and documentation and posted a file list on a forum.
UK-based telecommunications company Colt Technology Services is dealing with a cyberattack that has caused a multi-day outage of some of the company's operations, including hosting and porting services, Colt Online and Voice API platforms.
There's apparently a mirror of the Colt file name tree here, for any orgs looking to establish their risk. https://mastodon.social/@casaundra/115033551022266815
There’s another plain text mirror here: https://www.klos.com/~john/colt_filename_tree.txt
Colt Technology Services are up on the Warlock ransomware group portal.
List of 400k files they have stolen: https://www.klos.com/~john/colt_filename_tree.txt
I’ve authenticated the filenames are real, eg they include customer documentation and performance reviews of Colt staff.
Colt also appears in Warlock's FAQ page, it's an echo of their RAMP forum post with a minor change ("Regarding data disclosure, we will selectively disclose certain data.")
My view is Colt shouldn't pay. It is directly funding organised crime - even if paid for via insurance/legal agents - and increases the risk to everybody else.
Colt have setup a cyber incident page, set to noindex so Google etc can’t find it, detailing their incident.
https://www.colt.net/go/cyber-incident/
Confirms for first time customer documentation stolen and some scope of systems still offline.
The status updates on Colt's website describing a "technical issue" have been removed, replacing it with always being a cyber incident.
Left - internet archive - https://web.archive.org/web/20250814102113/https://www.colt.net/status/
Right - now https://www.colt.net/status/#updates
I've written about the Colt Technology Services ransomware incident, with a focus on learnings for other organisations.
Guest appearance by @leakix for finding the webshell at Colt.
Colt’s status page has been revised, removing most of the prior updates, with a new bolded statement around customer systems. https://www.colt.net/status/
The separate cyber incident page, detailing what happened, isn’t linked anywhere on their website and is set to noindex: https://www.colt.net/go/cyber-incident/
By repeatedly linking the Colt cyber incident page, I have got it into a Google search for Colt cyber incident though - the content is just hidden from search. https://www.colt.net/go/cyber-incident/
We really should be over the point of companies trying to hide their cyber incidents, it’s race to the bottom stuff.
A net side effect of Colt using noindex, btw, is my blog is the top Google hit with a description - it has 5k clicks yesterday from Google - and contains this email.
It’s pretty much a textbook example of Colt’s comms strategy hurting their business.
Colt are now on day 20 of their ransomware incident. Same services still down. In the replies here multiple people have also suggested number portability is also down, so telco customers cannot leave.
@[email protected] Colt is still paralysed, all install activities still at stop. "Maybe" some news at the end of this week. Maybe.
Microsoft are one of the many orgs caught up in the Colt ransomware incident. They haven't told customers for whatever reason, there's nothing in the O365 status portal for it.
If you use Teams with a purchased phone number... try not to have a problem 🤣 HT @cwatu
Colt have updated their cyber incident page to say they are having problems billing customers and issuing invoices.
However they may still apply late payment charges (good luck with that btw).
Colt are on day 28 of their ransomware incident.
They’ve updated their cyber incident page, which isn’t linked on their website anywhere and is set to not index on search engines, to say they are committed to transparency.
They’ve entered the recovery phase, where they are rebuilding systems.
@GossiTheDog they do appear to say they'll apply late payment charges IF they manage to invoice correctly.
Thx for your reporting on this BTW 👍
@jernej__s @cwatu @GossiTheDog
MS takes numbers from Colt?
@GossiTheDog Image description: Screenshot of the Colt status page saying:
"Network Incidents
LATEST
26th August 2025
Thank you for your patience while some support services, including Colt Online and our Voice API platform, remain temporarily unavailable.
This is part of our response to a recent cyber incident.
The incident was detected on an internal system that is completely separate from our customers’ infrastructure. No customer systems were affected.
Our teams continue to work closely with cyber experts to restore services as quickly as possible.
We very much appreciate your continued support and patience."
@GossiTheDog
I had to look up which one:
affected is Colt Technology Services (network provider),
not Colt Defense (the revolver company)
Often, the filenames contain important metadata (which companies' data, what kind of data, etc.)
@GossiTheDog Apparently, Colt's slogan was missing some punctuation... That is, instead of
colt
Secure your network from cyber
threats and security incidents
it should have been
Colt, secure your network from cyber threats and security incidents!
New post from #Warlock : Colt.Net More at : https://www.ransomlook.io/group/Warlock #Ransomware