Pour one out for Colt.

Colt disappeared yesterday, their status page says "technical issue"

https://www.colt.net/status/

Their customer portal is also MIA: https://online.colt.net

Colt Status Page - Colt Technology Services

Colt Status Page Colt Technology Services

Colt Technology Services
Colt are dealing with what appears to be an undisclosed cyber incident. They firewalled their inbound EU infrastructure on the 12th - org:”COLT EU INFRASTRUCTURE” on Shodan.
Colt had ecrime IP addresses talking to a bunch of their Microsoft SharePoint servers (now offline), which also appeared to have webshells on them.
Colt's also started isolating some systems on COLT Technology Services Group Limited ASN (or they've otherwise lost 'em).
Colt have finally confirmed an ongoing cyber incident, after several days of pretending it was a technical issue to customers.
Btw although everything is written in the past tense, the customer facing systems (which include data on customers - eg Colt Online) are still offline now and the incident is very definitely still ongoing.

Colt are being extorted by Warlock ransomware group, they have been for over a week, Colt are trying to cover it up.

Entry likely via sharehelp.colt.net via CVE-2025-53770 as they were interacting with it.

They've stolen a few hundred gig of customer data and documentation and posted a file list on a forum.

Here's the forum post, it's a Russian Tor site.
Colt Telecom attack claimed by WarLock ransomware, data up for sale

UK-based telecommunications company Colt Technology Services is dealing with a cyberattack that has caused a multi-day outage of some of the company's operations, including hosting and porting services, Colt Online and Voice API platforms.

BleepingComputer

There's apparently a mirror of the Colt file name tree here, for any orgs looking to establish their risk. https://mastodon.social/@casaundra/115033551022266815

There’s another plain text mirror here: https://www.klos.com/~john/colt_filename_tree.txt

Colt Technology Services are up on the Warlock ransomware group portal.

List of 400k files they have stolen: https://www.klos.com/~john/colt_filename_tree.txt

I’ve authenticated the filenames are real, eg they include customer documentation and performance reviews of Colt staff.

Colt also appears in Warlock's FAQ page, it's an echo of their RAMP forum post with a minor change ("Regarding data disclosure, we will selectively disclose certain data.")

My view is Colt shouldn't pay. It is directly funding organised crime - even if paid for via insurance/legal agents - and increases the risk to everybody else.

@GossiTheDog “yes hello I would like to send $200,000 to some terrorists please”