Colt checks stolen buyer information as a warlock ransomware public sale file

2 Min Read
2 Min Read

UK-based telecommunications firm Colt Know-how Companies has confirmed that buyer paperwork have been stolen as Warlock Ransomware Gang Auctions information.

The UK telecommunications and community service supplier has beforehand revealed that it was attacked on August twelfth, however that is the primary time it has confirmed that information has been stolen.

“The Felony Group has accessed sure information from a system that will comprise info regarding you and posted a doc title on the Darkish Net,” reads the up to date Safety Incident Advisory on Colt’s website.

“We perceive that this can be a concern for you.”

“Prospects can request a listing of file names posted to Darkish Net from a devoted name heart.”

The assertion claims that the Warlock Group claims it’s a million paperwork stolen from Colt on the Lamp Cyber ​​Crime Discussion board. The doc is on sale for $200,000 and is claimed to comprise monetary info, community structure information and buyer info.

Threat actor posts to Lamp Hacker Forum
Menace actor posts to Lamp Hacker Discussion board
Work: All the things

BleepingComputer can affirm that the TOX ID listed within the discussion board publish matches the ID utilized in earlier variations of ransomware gang ransom notes.

Warlock Group (aka Storm-2603) is a ransomware gang attributable to Chinese language menace actors who use Lockbit Home windows and Babuk VMware ESXi Encryptors that had been leaked within the assault.

When the ransomware gang was launched in March 2025, they used the lockbit ransomware notes of their assaults and customised them to incorporate the TOX ID for ransom negotiations.

In June, the ransomware gang was branded as “Warlock Group” with custom-made ransom notes and darkish internet negotiations and information leak websites.

See also  These are the roles which might be most definitely to be automated by AI

Final month, Microsoft reported that menace actors had been exploiting SharePoint vulnerabilities to compromise company networks and deploying ransomware.

In negotiations seen by BleepingComputer, ransomware gangs are demanding ransoms within the vary of $450,000 to tens of millions of {dollars}.

TAGGED:
Share This Article
Leave a comment