Colt Suffers a Cyber Incident

Colt Suffers a Cyber Incident


  • Incident Timeline
    • On August 12, 2025, Colt Technology Services first detected disruption in some customer support services due to a cyber incident.
    • By August 13, Colt confirmed that its Voice API platform, used by customers to automate and manage voice services, was also taken offline.
    • As of August 15, critical services—including the customer portal (Colt Online)—remain unavailable.
  • Nature of the Attack
    • The attack primarily targeted Colt’s internal systems, reportedly separate from customer-supporting environments.
    • Colt stated there is currently no evidence that customer or employee data was accessed.
  • Protection and Mitigation Steps Taken
    • Immediate Action: Systems believed to be affected or at risk were proactively taken offline as a protective measure, causing customer support portals and voice platforms to become unavailable.
    • Notification: Relevant authorities were promptly notified as required by regulatory frameworks and incident response best practices.
    • Engagement with Experts: Colt brought in third-party cybersecurity experts to assist with response, investigation, and recovery.
    • Technical Response: Focus has been on restoring core systems, with teams working continuously to resume normal operations.
    • Customer Communication: Colt continually updates customers, advising them to use alternative support channels (phone/email) while platforms are down.
  • Source and Technical Indicators
    • According to independent security researcher Kevin Beaumont, scans of internet-facing infrastructure revealed multiple connections from IP addresses associated with cybercriminals to Colt’s SharePoint servers.
    • Webshells—malicious scripts often used for persistent remote access—were believed to have been implanted on these servers.
    • Colt’s technical response included pulling the affected SharePoint servers offline and implementing additional firewall protections (especially for EU infrastructure) on the day issues were first disclosed.
  • Current Status
    • Restoration work is ongoing, with Colt working “around the clock” to return critical systems to service.
    • Customers still cannot access Colt Online or the Voice API, but the company is providing alternative support channels and apologizing for the inconvenience.

Key Takeaways

  • Immediate Steps Taken: Disconnection of at-risk systems, engagement with authorities and third-party experts, focus on containment and restoration, customer guidance, and transparent communication throughout the incident.
  • Source of Attack: Likely originated via exposed SharePoint servers, based on evidence of cybercriminal scanning activity and subsequent implantation of webshells. Exact attribution and vulnerability exploited remain unconfirmed.
  • Impact: Significant service interruption, but so far, no evidence of customer or employee data breach.

Comments

No comments yet. Why don’t you start the discussion?

    Leave a Reply

    This site uses Akismet to reduce spam. Learn how your comment data is processed.