GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Conversation

Notices

  1. Embed this notice
    Kevin Beaumont (gossithedog@cyberplace.social)'s status on Thursday, 14-Aug-2025 01:36:35 JST Kevin Beaumont Kevin Beaumont

    Pour one out for Colt.

    In conversation about 4 months ago from cyberplace.social permalink

    Attachments


    1. https://cyberplace.social/system/media_attachments/files/115/022/342/926/223/870/original/a33d27ea9bb2fe6b.jpeg
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Thursday, 14-Aug-2025 01:42:43 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Colt disappeared yesterday, their status page says "technical issue"

      https://www.colt.net/status/

      Their customer portal is also MIA: https://online.colt.net

      In conversation about 4 months ago permalink

      Attachments



    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Thursday, 14-Aug-2025 19:12:22 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Colt are dealing with what appears to be an undisclosed cyber incident. They firewalled their inbound EU infrastructure on the 12th - org:”COLT EU INFRASTRUCTURE” on Shodan.

      In conversation about 4 months ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Thursday, 14-Aug-2025 22:29:16 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Colt had ecrime IP addresses talking to a bunch of SharePoint servers (now offline), which also appeared to have webshells on them.

      In conversation about 4 months ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Friday, 15-Aug-2025 01:08:25 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Colt's also started isolating some systems on COLT Technology Services Group Limited ASN.

      In conversation about 4 months ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Friday, 15-Aug-2025 02:12:52 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Colt have finally confirmed an ongoing cyber incident, after several days of pretending it was a technical issue to customers.

      In conversation about 4 months ago permalink

      Attachments


      1. https://cyberplace.social/system/media_attachments/files/115/028/234/173/192/805/original/90fb248e14cce4fa.jpeg
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Friday, 15-Aug-2025 02:22:34 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Btw although everything is written in the past tense, the customer facing systems (which include data on customers - eg Colt Online) are still offline now and the incident is very definitely still ongoing.

      In conversation about 4 months ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Friday, 15-Aug-2025 20:26:16 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Colt are extorted by Warlock ransomware group, they have been for over a week, Colt are trying to cover it up.

      Entry likely via sharehelp.colt.net via CVE-2025-53770 as they were interacting with it.

      They've stolen a few hundred gig of customer data and documentation and posted a file list on a forum.

      In conversation about 4 months ago permalink

      Attachments


    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Friday, 15-Aug-2025 22:01:22 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Here's the forum post, it's a Russian Tor site.

      In conversation about 4 months ago permalink

      Attachments


      1. https://cyberplace.social/system/media_attachments/files/115/032/906/575/310/649/original/a024efdee3019ab7.png
    • Embed this notice
      SpiderHat (sp1derh4t@cyberplace.social)'s status on Saturday, 16-Aug-2025 00:25:42 JST SpiderHat SpiderHat
      in reply to

      @GossiTheDog Argh, I was to late for the filebin. Anyone willing to share or at least provide some info regarding the contents and if the claims are legit?

      In conversation about 4 months ago permalink
      Kevin Beaumont repeated this.
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Saturday, 16-Aug-2025 00:33:24 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Here's Bleeping Computer on the Colt thing: https://www.bleepingcomputer.com/news/security/colt-telecom-attack-claimed-by-warlock-ransomware-data-up-for-sale/

      In conversation about 4 months ago permalink

      Attachments

      1. Domain not in remote thumbnail source whitelist: www.bleepstatic.com
        Colt Telecom attack claimed by WarLock ransomware, data up for sale
        from @BleepinComputer
        UK-based telecommunications company Colt Technology Services is dealing with a cyberattack that has caused a multi-day outage of some of the company's operations, including hosting and porting services, Colt Online and Voice API platforms.
    • Embed this notice
      System Adminihater (systemadminihater@cyberplace.social)'s status on Saturday, 16-Aug-2025 01:14:26 JST System Adminihater System Adminihater
      in reply to

      @GossiTheDog You can tell which ransomware groups Crowdstrike operates by what companies are running that get compromised ;)

      In conversation about 4 months ago permalink
    • Embed this notice
      casaundra (casaundra@mastodon.social)'s status on Saturday, 16-Aug-2025 02:04:34 JST casaundra casaundra
      in reply to
      • SpiderHat

      @Sp1derH4t @GossiTheDog there is mirror of Colt file tree https://file.kiwi/62f9327f#0OTL_nd4fccyLT_BUwIfhg

      In conversation about 4 months ago permalink

      Attachments

      1. Domain not in remote thumbnail source whitelist: img.icons8.com
        file.kiwi
        Easily and quickly share large files with Webfolder. file.kiwi offers unlimited capacity, large file support, Resume download, and end-to-end encryption for security and convenience.
    • Embed this notice
      Royce Williams (tychotithonus@infosec.exchange)'s status on Saturday, 16-Aug-2025 02:57:19 JST Royce Williams Royce Williams
      in reply to

      @GossiTheDog Since it's just the tree, if someone could snapshot it safetly and put a text-only version of it somewhere (like a GitHub gist), folks would probably appreciate that

      In conversation about 4 months ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Saturday, 16-Aug-2025 02:57:21 JST Kevin Beaumont Kevin Beaumont
      in reply to

      There's apparently a mirror of the Colt file name tree here, for any orgs looking to establish their risk. https://mastodon.social/@casaundra/115033551022266815

      In conversation about 4 months ago permalink

      Attachments

      1. No result found on File_thumbnail lookup.
        casaundra (@casaundra@mastodon.social)
        from casaundra
        @Sp1derH4t@cyberplace.social @GossiTheDog@cyberplace.social there is mirror of Colt file tree https://file.kiwi/62f9327f#0OTL_nd4fccyLT_BUwIfhg
    • Embed this notice
      nothing (nothing@cyberplace.social)'s status on Saturday, 16-Aug-2025 06:38:37 JST nothing nothing
      in reply to

      @GossiTheDog

      Has Colt confirmed whether CVE-2025-53770 was actually exploited, or is this still just suspected?

      Based on my assumption and experience, this seems more likely to be an attack via a compromised internal host, since telecom giants typically have [W]-based firewalls in place. I'm not sure if that control was bypassed in this case.

      In conversation about 4 months ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Sunday, 17-Aug-2025 01:15:37 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Colt Technology Services are up on the Warlock ransomware group portal.

      List of 400k files they have stolen: https://www.klos.com/~john/colt_filename_tree.txt

      I’ve authenticated the filenames are real, eg they include customer documentation and performance reviews of Colt staff.

      In conversation about 4 months ago permalink

      Attachments


      1. https://cyberplace.social/system/media_attachments/files/115/039/333/547/375/770/original/3f52ce212585585f.jpeg

    • Embed this notice
      Quentyn (quentyn@cyberplace.social)'s status on Sunday, 17-Aug-2025 04:04:49 JST Quentyn Quentyn
      in reply to

      @GossiTheDog there are potentially a lot of passwords that need changing too

      In conversation about 4 months ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Sunday, 17-Aug-2025 05:56:39 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Colt also appears in Warlock's FAQ page, it's an echo of their RAMP forum post with a minor change ("Regarding data disclosure, we will selectively disclose certain data.")

      My view is Colt shouldn't pay. It is directly funding organised crime - even if paid for via insurance/legal agents - and increases the risk to everybody else.

      In conversation about 4 months ago permalink

      Attachments


      1. https://cyberplace.social/system/media_attachments/files/115/040/421/597/248/101/original/a67dee368ff8e60b.png
    • Embed this notice
      swoody (swoody@mastodon.social)'s status on Sunday, 17-Aug-2025 20:49:11 JST swoody swoody
      in reply to

      @GossiTheDog just echoing the authentication of this file list - there are documents in here relating to my company's porting relationship with Colt and many others I recognise.

      In conversation about 4 months ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Wednesday, 20-Aug-2025 00:50:35 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Warlock ransomware/extortion group have moved Colt full data unlock time to a week away, and said data auction is in progress.

      In conversation about 3 months ago permalink

      Attachments


      1. https://cyberplace.social/system/media_attachments/files/115/056/217/930/785/801/original/bebfae38b85eef6b.png
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Wednesday, 20-Aug-2025 20:51:56 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Colt have setup a cyber incident page, set to noindex so Google etc can’t find it, detailing their incident.

      https://www.colt.net/go/cyber-incident/

      Confirms for first time customer documentation stolen and some scope of systems still offline.

      In conversation about 3 months ago permalink

      Attachments


      1. https://cyberplace.social/system/media_attachments/files/115/060/945/899/790/219/original/ea203ccf0345fb8d.jpeg

    • Embed this notice
      Brian Clark (deepthoughts10@infosec.exchange)'s status on Wednesday, 20-Aug-2025 22:03:31 JST Brian Clark Brian Clark
      in reply to

      @GossiTheDog I’m worried that they got documentation on their customer network and router configurations. That could open up a lot of new attack paths.

      In conversation about 3 months ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Thursday, 21-Aug-2025 21:08:42 JST Kevin Beaumont Kevin Beaumont
      in reply to

      The status updates on Colt's website describing a "technical issue" have been removed, replacing it with always being a cyber incident.

      Left - internet archive - https://web.archive.org/web/20250814102113/https://www.colt.net/status/
      Right - now https://www.colt.net/status/#updates

      In conversation about 3 months ago permalink

      Attachments


      1. https://cyberplace.social/system/media_attachments/files/115/066/657/646/160/919/original/8e15ee68209339f2.png

      2. https://cyberplace.social/system/media_attachments/files/115/066/661/955/280/114/original/8320bddd46e86316.png
      3. Domain not in remote thumbnail source whitelist: web.archive.org
        Colt Status Page - Colt Technology Services
        Colt Status Page Colt Technology Services
      4. Domain not in remote thumbnail source whitelist: www.colt.net
        Network Status | Colt Technology Services
        Keeping you informed of any issues or outages that may affect the performance of the Colt network or your experience with us.
    • Embed this notice
      System Adminihater (systemadminihater@cyberplace.social)'s status on Thursday, 21-Aug-2025 21:47:08 JST System Adminihater System Adminihater
      in reply to

      @GossiTheDog Do you by chance know anyone over at MSFT that works in the partner program? lol

      In conversation about 3 months ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Friday, 22-Aug-2025 21:46:04 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Colt are now 10 days into their cyber incident (ransomware), systems are still offline.

      In conversation about 3 months ago permalink

      Attachments


      1. https://cyberplace.social/system/media_attachments/files/115/072/477/287/160/825/original/5d1e471d9886447a.png
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Saturday, 23-Aug-2025 02:24:07 JST Kevin Beaumont Kevin Beaumont
      in reply to
      • leakix

      I've written about the Colt Technology Services ransomware incident, with a focus on learnings for other organisations.

      Guest appearance by @leakix for finding the webshell at Colt.

      https://doublepulsar.com/colt-technical-services-gets-ransomwared-via-sharepoint-initial-access-some-learning-points-617da7e27ebc

      #threatintel #ransomware

      In conversation about 3 months ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Wednesday, 27-Aug-2025 16:20:29 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Colt are now 15 days into their cyber incident, the same systems are still offline.

      In conversation about 3 months ago permalink

      Attachments


      1. https://cyberplace.social/system/media_attachments/files/115/099/513/432/126/875/original/b998d64217d4ece2.jpeg
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Wednesday, 27-Aug-2025 16:26:28 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Colt’s status page has been revised, removing most of the prior updates, with a new bolded statement around customer systems. https://www.colt.net/status/

      The separate cyber incident page, detailing what happened, isn’t linked anywhere on their website and is set to noindex: https://www.colt.net/go/cyber-incident/

      In conversation about 3 months ago permalink

      Attachments


      1. https://cyberplace.social/system/media_attachments/files/115/099/536/213/950/144/original/3db7cf5b1f8b6e6b.jpeg

      2. Domain not in remote thumbnail source whitelist: www.colt.net
        Cyber Incident | Colt Technology Services
        You may be experiencing issues accessing some of our portals - this is a precautionary measure due to an ongoing cyber incident.
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Wednesday, 27-Aug-2025 16:29:21 JST Kevin Beaumont Kevin Beaumont
      in reply to

      By repeatedly linking the Colt cyber incident page, I have got it into a Google search for Colt cyber incident though - the content is just hidden from search. https://www.colt.net/go/cyber-incident/

      We really should be over the point of companies trying to hide their cyber incidents, it’s race to the bottom stuff.

      In conversation about 3 months ago permalink

      Attachments


      1. https://cyberplace.social/system/media_attachments/files/115/099/549/552/636/479/original/face9b64cd5cfcd2.jpeg
      2. Domain not in remote thumbnail source whitelist: www.colt.net
        We are more than one thing, we are multifaceted - Colt Technology Services
        from @colt_technology
        We are more than one thing, we are multifaceted Colt Technology Services
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Wednesday, 27-Aug-2025 16:39:16 JST Kevin Beaumont Kevin Beaumont
      in reply to

      A net side effect of Colt using noindex, btw, is my blog is the top Google hit with a description - it has 5k clicks yesterday from Google - and contains this email.

      It’s pretty much a textbook example of Colt’s comms strategy hurting their business.

      In conversation about 3 months ago permalink

      Attachments


      1. https://cyberplace.social/system/media_attachments/files/115/099/588/724/562/340/original/2210d85cdbba9002.jpeg
    • Embed this notice
      :hacker_p: :hacker_f: :hacker_t: (pft@infosec.exchange)'s status on Wednesday, 27-Aug-2025 17:16:20 JST :hacker_p: :hacker_f: :hacker_t: :hacker_p: :hacker_f: :hacker_t:
      in reply to

      @GossiTheDog out of curiosity: how did you discover the page?

      In conversation about 3 months ago permalink
    • Embed this notice
      Zoidberg Rodríguez (zoid@infosec.exchange)'s status on Wednesday, 27-Aug-2025 18:27:02 JST Zoidberg Rodríguez Zoidberg Rodríguez
      in reply to

      @GossiTheDog Funny that, as a colt customer, I first read about the incident on mastodon and only a day later I’ve gotten an email from Colt.

      In conversation about 3 months ago permalink
    • Embed this notice
      Zoidberg Rodríguez (zoid@infosec.exchange)'s status on Wednesday, 27-Aug-2025 19:37:17 JST Zoidberg Rodríguez Zoidberg Rodríguez

      @GossiTheDog Mission accomplished! Thanks. Just read your article as well. Wonder how much data there is. Does this include my clients data (ported numbers) as this might be a clusterf**

      In conversation about 3 months ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Friday, 29-Aug-2025 01:53:16 JST Kevin Beaumont Kevin Beaumont
      in reply to

      If anybody is wondering, Warlock not publishing Colt Technology Services data is intentional, just asked them. Presumably they are negotiating with the victim org.

      In conversation about 3 months ago permalink

      Attachments


      1. https://cyberplace.social/system/media_attachments/files/115/107/051/042/432/524/original/0a9ea9a7df78f590.png
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Monday, 01-Sep-2025 17:35:57 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Colt are now on day 20 of their ransomware incident. Same services still down. In the replies here multiple people have also suggested number portability is also down, so telco customers cannot leave.

      In conversation about 3 months ago permalink
    • Embed this notice
      Dr. Christopher Kunz (christopherkunz@chaos.social)'s status on Monday, 01-Sep-2025 19:22:21 JST Dr. Christopher Kunz Dr. Christopher Kunz
      in reply to

      @GossiTheDog Do you have any indication that this outage also affects non-UK Colt customers?

      In conversation about 3 months ago permalink
    • Embed this notice
      A (cwatu@infosec.exchange)'s status on Tuesday, 02-Sep-2025 17:33:39 JST A A
      in reply to

      @GossiTheDog my MS teams phone number (bought from MS, not a port in) is a Colt number, this is what it shows when creating a new ticket with teams pstn support. No health advisory in MS admin centre.

      In conversation about 3 months ago permalink

      Attachments


      1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/115/131/663/874/084/010/original/00578d2facdb1753.png
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Wednesday, 03-Sep-2025 05:35:39 JST Kevin Beaumont Kevin Beaumont
      in reply to
      • A

      Microsoft are one of the many orgs caught up in the Colt ransomware incident. They haven't told customers for whatever reason, there's nothing in the O365 status portal for it.

      If you use Teams with a purchased phone number... try not to have a problem 🤣 HT @cwatu

      In conversation about 3 months ago permalink

      Attachments


      1. https://cyberplace.social/system/media_attachments/files/115/136/608/344/680/865/original/36c5ea62193f7bd3.png
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Wednesday, 03-Sep-2025 05:39:24 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Colt have updated their cyber incident page to say they are having problems billing customers and issuing invoices.

      However they may still apply late payment charges (good luck with that btw).

      In conversation about 3 months ago permalink

      Attachments


      1. https://cyberplace.social/system/media_attachments/files/115/136/625/005/317/387/original/b9d530e23495fef7.png
    • Embed this notice
      James Tinmouth (tinmouth@infosec.exchange)'s status on Wednesday, 03-Sep-2025 05:45:40 JST James Tinmouth James Tinmouth
      in reply to

      @GossiTheDog they do appear to say they'll apply late payment charges IF they manage to invoice correctly.

      Thx for your reporting on this BTW 👍

      In conversation about 3 months ago permalink
    • Embed this notice
      Jernej Simončič � (jernej__s@infosec.exchange)'s status on Thursday, 04-Sep-2025 17:28:16 JST Jernej Simončič � Jernej Simončič �
      in reply to
      • A

      @cwatu @GossiTheDog Is this also why you can't add a phone number to a MS account right now (at least in Europe)?

      In conversation about 3 months ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Saturday, 06-Sep-2025 01:56:34 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Colt are now on day 24 of their ransomware incident, same systems still down. I've heard from many people now that Colt are downplaying the seriousness of their situation and that they've effectively lost their back office IT.

      In conversation about 3 months ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Wednesday, 10-Sep-2025 02:27:22 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Colt are on day 28 of their ransomware incident.

      They’ve updated their cyber incident page, which isn’t linked on their website anywhere and is set to not index on search engines, to say they are committed to transparency.

      They’ve entered the recovery phase, where they are rebuilding systems.

      In conversation about 3 months ago permalink

      Attachments


      1. https://cyberplace.social/system/media_attachments/files/115/175/509/791/254/371/original/ed0370b0ac38a13f.jpeg
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Wednesday, 10-Sep-2025 02:29:38 JST Kevin Beaumont Kevin Beaumont
      in reply to

      All of the offline customers systems from day one of the incident are still listed as offline btw.

      In conversation about 3 months ago permalink
    • Embed this notice
      Alex (alex02@cyberplace.social)'s status on Friday, 12-Sep-2025 05:53:39 JST Alex Alex
      in reply to

      @GossiTheDog oh no. So uh, is HR going to reimburse for the shovels they keep buying?

      In conversation about 3 months ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Friday, 12-Sep-2025 05:53:41 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Colt appear to be outright lying in their latest cyber incident comms to customers. They’re saying the threat actor only post document titles to the dark web, however they neglect to mention they know the attacker C2 server, and they know what files were exfiltrated by the threat actor.

      Their IR made a bunch of Opsec errors, including putting their IR reports into public sandboxes and submitting URLs of customer files to VirusTotal. I have receipts.

      In conversation about 3 months ago permalink

      Attachments


      1. https://cyberplace.social/system/media_attachments/files/115/187/620/936/918/379/original/8ebccbebbf7fc150.jpeg

      2. https://cyberplace.social/system/media_attachments/files/115/187/621/196/898/376/original/11a95d704a6e2f19.jpeg
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Saturday, 13-Sep-2025 05:44:57 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Colt have told some enterprise customers they will be unable to deliver new orders until early 2026.

      In conversation about 3 months ago permalink
    • Embed this notice
      Damien (damien@layer8.space)'s status on Saturday, 13-Sep-2025 05:57:51 JST Damien Damien
      in reply to

      @GossiTheDog isn't that roughly their normal lead time?

      In conversation about 3 months ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Tuesday, 16-Sep-2025 23:34:31 JST Kevin Beaumont Kevin Beaumont
      in reply to

      In a new update on their cyber incident, Colt Technology Services say they are aiming to restore a majority of services by or around December. If that completes on time it should be around ~4 months since the incident began.

      In conversation about 2 months ago permalink

      Attachments


      1. https://cyberplace.social/system/media_attachments/files/115/214/454/410/934/538/original/821c28d8b36b1cf2.png
    • Embed this notice
      nothing (nothing@cyberplace.social)'s status on Sunday, 21-Sep-2025 00:17:55 JST nothing nothing
      in reply to

      @GossiTheDog came up again to have latest on this. Seeing few of your post has been deleted ?

      In conversation about 2 months ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Monday, 22-Sep-2025 23:23:46 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Been asked for an update on Colt Technology Services ransomware incident... there is none. The same services offline since day one of the incident (August 12th) are still offline today.

      In conversation about 2 months ago permalink

      Attachments


      1. https://cyberplace.social/system/media_attachments/files/115/248/398/113/278/941/original/f30e5fabb4fb386c.png
    • Embed this notice
      翠星石 (suiseiseki@freesoftwareextremist.com)'s status on Monday, 22-Sep-2025 23:26:48 JST 翠星石 翠星石
      in reply to
      @GossiTheDog >Using microsoft software even once.
      Nothing was stolen - as the data still is there no matter how many copies you make - rather the data was exfiltrated.
      In conversation about 2 months ago permalink
    • Embed this notice
      翠星石 (suiseiseki@freesoftwareextremist.com)'s status on Monday, 22-Sep-2025 23:33:08 JST 翠星石 翠星石
      @GossiTheDog Why would deleting the backups delete the original copy?

      Regardless, copying or deleting data is not theft and therefore nothing was stolen even if data was exfiltrated followed by deletion of the original data.
      In conversation about 2 months ago permalink
    • Embed this notice
      hecklefish (hecklefish@infosec.exchange)'s status on Tuesday, 23-Sep-2025 00:02:59 JST hecklefish hecklefish
      in reply to

      @GossiTheDog Im guessing they didn't pay up

      In conversation about 2 months ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Thursday, 25-Sep-2025 02:39:46 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Colt's published an update for customers on their ransomware incident. https://www.colt.net/go/cyber-incident/#update

      In conversation about 2 months ago permalink

      Attachments


      1. https://cyberplace.social/system/media_attachments/files/115/260/487/045/424/544/original/eebc2cdf82bfea6e.png
      2. Domain not in remote thumbnail source whitelist: www.colt.net
        Cyber Incident | Colt Technology Services
        You may be experiencing issues accessing some of our portals - this is a precautionary measure due to an ongoing cyber incident.
    • Embed this notice
      Andrei Kucharavy (andrei_chiffa@mastodon.social)'s status on Thursday, 25-Sep-2025 02:51:47 JST Andrei Kucharavy Andrei Kucharavy
      in reply to

      @GossiTheDog "Recent cyber incident targeting our Business Support System (BSS)" - are they saying it was Salesforce compromise? Potentially an exploit chain stemming from the Salesloft breach from August?

      In conversation about 2 months ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Thursday, 02-Oct-2025 02:31:40 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Colt said they would have key capabilities restored at the beginning of October. It’s October now and the same systems are still offline, and they’ve published no weekly update. https://www.colt.net/go/cyber-incident/

      In conversation about 2 months ago permalink

      Attachments

      1. Domain not in remote thumbnail source whitelist: www.colt.net
        Cyber Incident | Colt Technology Services
        You may be experiencing issues accessing some of our portals - this is a precautionary measure due to an ongoing cyber incident.
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Thursday, 02-Oct-2025 20:11:35 JST Kevin Beaumont Kevin Beaumont
      in reply to

      It turns out Colt have decided to stop updating their cyber incident page (hidden from Google) and started emailing the same template to customers instead, while talking about their commitment to transparency. Here’s their latest update.

      In conversation about 2 months ago permalink

      Attachments


      1. https://cyberplace.social/system/media_attachments/files/115/304/264/736/117/983/original/29b2fc0f6d39dfac.jpeg

      2. https://cyberplace.social/system/media_attachments/files/115/304/264/797/222/700/original/f243e522b53907bf.jpeg

      3. https://cyberplace.social/system/media_attachments/files/115/304/264/848/387/890/original/4023374b4295edbc.jpeg
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Wednesday, 08-Oct-2025 04:10:32 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Colt Technology Services have decided to start updating their cyber incident page again. In their latest update, dated both 29th September, 2025 and 6th October, 2025, they say they have rebuilt 2/3rd of their laptops so far, almost two months into the incident. As far as I know this is the first confirmation ransomware made it to laptops.

      I pinged a staff member on LinkedIn who said they haven’t had a PC for the duration of the incident 😬

      In conversation about 2 months ago permalink

      Attachments


      1. https://cyberplace.social/system/media_attachments/files/115/334/461/387/730/324/original/1a30d00665289ef9.jpeg
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Saturday, 18-Oct-2025 04:56:17 JST Kevin Beaumont Kevin Beaumont
      in reply to

      It’s just over 2 months into the Colt Technology Services ransomware incident. Their billing system is now back online so they’re invoicing customers for prior months, and they’re working on service restoration (really full rebuilds).

      They’ve also set up a separate page about their cyber incident which is set to index on Google - however it says nothing about what actually happened, instead doing the Obama medal on itself for response. The actual customer page with updates is set to noindex.

      In conversation about a month ago permalink

      Attachments


      1. https://cyberplace.social/system/media_attachments/files/115/391/245/992/110/738/original/06caea47f4b054cf.jpeg

      2. https://cyberplace.social/system/media_attachments/files/115/391/246/244/920/781/original/79d1649cf571c07f.jpeg
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Saturday, 18-Oct-2025 04:57:14 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Colt are still my biggest fans on LinkedIn, it’s several thousand visits this month over this thread 😅

      for the record I know they’re the victim and I know these incidents suck. But it’s kinda important there’s external coverage of these things, especially when it relates to Critical National Infrastructure firms.

      In conversation about a month ago permalink

      Attachments


      1. https://cyberplace.social/system/media_attachments/files/115/391/268/272/083/252/original/93de6f7df3f8faa6.jpeg
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Friday, 24-Oct-2025 01:20:28 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Colt restored their VMware Horizon remote access system today

      https://venus.colt.net/

      In conversation about a month ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Friday, 31-Oct-2025 23:10:02 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Latest on Colt Technology Services restoration from Warlock ransomware incident, they're approaching 3 months since their incident began.

      In conversation about a month ago permalink

      Attachments


      1. https://cyberplace.social/system/media_attachments/files/115/469/156/562/869/482/original/1e6fc97b4cae0b4b.png

Feeds

  • Activity Streams
  • RSS 2.0
  • Atom
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.