Colt are dealing with what appears to be an undisclosed cyber incident. They firewalled their inbound EU infrastructure on the 12th - org:”COLT EU INFRASTRUCTURE” on Shodan.
Btw although everything is written in the past tense, the customer facing systems (which include data on customers - eg Colt Online) are still offline now and the incident is very definitely still ongoing.
@GossiTheDog Argh, I was to late for the filebin. Anyone willing to share or at least provide some info regarding the contents and if the claims are legit?
@GossiTheDog Since it's just the tree, if someone could snapshot it safetly and put a text-only version of it somewhere (like a GitHub gist), folks would probably appreciate that
Has Colt confirmed whether CVE-2025-53770 was actually exploited, or is this still just suspected?
Based on my assumption and experience, this seems more likely to be an attack via a compromised internal host, since telecom giants typically have [W]-based firewalls in place. I'm not sure if that control was bypassed in this case.
Colt also appears in Warlock's FAQ page, it's an echo of their RAMP forum post with a minor change ("Regarding data disclosure, we will selectively disclose certain data.")
My view is Colt shouldn't pay. It is directly funding organised crime - even if paid for via insurance/legal agents - and increases the risk to everybody else.
@GossiTheDog just echoing the authentication of this file list - there are documents in here relating to my company's porting relationship with Colt and many others I recognise.
@GossiTheDog I’m worried that they got documentation on their customer network and router configurations. That could open up a lot of new attack paths.
Colt’s status page has been revised, removing most of the prior updates, with a new bolded statement around customer systems. https://www.colt.net/status/
The separate cyber incident page, detailing what happened, isn’t linked anywhere on their website and is set to noindex: https://www.colt.net/go/cyber-incident/
By repeatedly linking the Colt cyber incident page, I have got it into a Google search for Colt cyber incident though - the content is just hidden from search. https://www.colt.net/go/cyber-incident/
We really should be over the point of companies trying to hide their cyber incidents, it’s race to the bottom stuff.
A net side effect of Colt using noindex, btw, is my blog is the top Google hit with a description - it has 5k clicks yesterday from Google - and contains this email.
It’s pretty much a textbook example of Colt’s comms strategy hurting their business.
@GossiTheDog Mission accomplished! Thanks. Just read your article as well. Wonder how much data there is. Does this include my clients data (ported numbers) as this might be a clusterf**
If anybody is wondering, Warlock not publishing Colt Technology Services data is intentional, just asked them. Presumably they are negotiating with the victim org.
Colt are now on day 20 of their ransomware incident. Same services still down. In the replies here multiple people have also suggested number portability is also down, so telco customers cannot leave.
@GossiTheDog my MS teams phone number (bought from MS, not a port in) is a Colt number, this is what it shows when creating a new ticket with teams pstn support. No health advisory in MS admin centre.
Microsoft are one of the many orgs caught up in the Colt ransomware incident. They haven't told customers for whatever reason, there's nothing in the O365 status portal for it.
If you use Teams with a purchased phone number... try not to have a problem 🤣 HT @cwatu
Colt are now on day 24 of their ransomware incident, same systems still down. I've heard from many people now that Colt are downplaying the seriousness of their situation and that they've effectively lost their back office IT.
They’ve updated their cyber incident page, which isn’t linked on their website anywhere and is set to not index on search engines, to say they are committed to transparency.
They’ve entered the recovery phase, where they are rebuilding systems.
Colt appear to be outright lying in their latest cyber incident comms to customers. They’re saying the threat actor only post document titles to the dark web, however they neglect to mention they know the attacker C2 server, and they know what files were exfiltrated by the threat actor.
Their IR made a bunch of Opsec errors, including putting their IR reports into public sandboxes and submitting URLs of customer files to VirusTotal. I have receipts.
In a new update on their cyber incident, Colt Technology Services say they are aiming to restore a majority of services by or around December. If that completes on time it should be around ~4 months since the incident began.
Been asked for an update on Colt Technology Services ransomware incident... there is none. The same services offline since day one of the incident (August 12th) are still offline today.
@GossiTheDog >Using microsoft software even once. Nothing was stolen - as the data still is there no matter how many copies you make - rather the data was exfiltrated.
Regardless, copying or deleting data is not theft and therefore nothing was stolen even if data was exfiltrated followed by deletion of the original data.
@GossiTheDog "Recent cyber incident targeting our Business Support System (BSS)" - are they saying it was Salesforce compromise? Potentially an exploit chain stemming from the Salesloft breach from August?
Colt said they would have key capabilities restored at the beginning of October. It’s October now and the same systems are still offline, and they’ve published no weekly update. https://www.colt.net/go/cyber-incident/
It turns out Colt have decided to stop updating their cyber incident page (hidden from Google) and started emailing the same template to customers instead, while talking about their commitment to transparency. Here’s their latest update.
Colt Technology Services have decided to start updating their cyber incident page again. In their latest update, dated both 29th September, 2025 and 6th October, 2025, they say they have rebuilt 2/3rd of their laptops so far, almost two months into the incident. As far as I know this is the first confirmation ransomware made it to laptops.
I pinged a staff member on LinkedIn who said they haven’t had a PC for the duration of the incident 😬
It’s just over 2 months into the Colt Technology Services ransomware incident. Their billing system is now back online so they’re invoicing customers for prior months, and they’re working on service restoration (really full rebuilds).
They’ve also set up a separate page about their cyber incident which is set to index on Google - however it says nothing about what actually happened, instead doing the Obama medal on itself for response. The actual customer page with updates is set to noindex.
Colt are still my biggest fans on LinkedIn, it’s several thousand visits this month over this thread 😅
for the record I know they’re the victim and I know these incidents suck. But it’s kinda important there’s external coverage of these things, especially when it relates to Critical National Infrastructure firms.