Warlock is a ransomware operation that emerged in 2025, combining the traditional "double extortion" tactics of encrypting victims' files so they cannot be accessed, and threatening to release data stolen from the company's network.
Unfortunately, that’s right.
The Warlock ransomware group seems to have stepped up its attacks in recent months, hitting a number of organisations including government agencies and departments.
Victims have included a water and waste service authority in Portugal, a government education agency in Croatia, and BTHK - the Turkish IT and communications authority.
On August 12, UK-based telecoms firm Colt Technology Services was hit by a cyber attack which has caused some of the company's systems to be taken offline for multiple days.
The attack saw the firm advise its customers to not rely upon its its online portals for communication, but instead use email and phone instead - and to expect a slower-than-normal response.
Colt Technology Services said that it has informed the authorities about the incident, and that it has staff working around the clock to restore normal operations.
Colt hasn't shared details about the nature of the cybersecurity incident it is experiencing or who is behind it, but someone claiming to represent the Warlock ransomware group has posted on a dark web forum that they are offering to sell one million of Colt's stolen documents for US $200,000.
The data is said to include financial, customer, and employee data, as well as internal emails. Sure enough, WarLock's data leak site on the dark web includes an entry for Colt, and has announced that it is auctioning the data to whoever might want it.
Security researchers believe that the malicious hackers may have made entry into Colt's systems by exploiting the CVE-2025-53770 Sharepoint vulnerability, which Microsoft has said is being actively used by attackers.
Yes, and Microsoft is advising customers to apply them immediately to ensure that they are protected.
Microsoft experts published an article last month sharing detailed intelligence about how the Warlock ransomware has been deployed by exploiting the software flaws, and how customers can mitigate and protect themselves.
Correct. Malicious attackers can use any number of different methods to infiltrate organisations and plant ransomware on their systems.
If you don't have adequate defences in place, there is a chance that you could come into your office one day to be greeted by a ransom note from a group like Warlock.
Organisations who feel they may be at risk of being hit by the likes of Warlock would be wise to follow Fortra's general advice for defending against ransomware attacks, which includes tips such as enforcing multi-factor authentication, running up-to-date security solutions, and keeping software patches up-to-date.
In addition, it's recommended that all companies follow best practices for defending against ransomware attacks, which include tips such as:
Editor’s Note: The opinions expressed in this and other guest author articles are solely those of the contributor and do not necessarily reflect those of Fortra.