Warlock ransomware: What you need to know
Warlock 是 2025 年出现的勒索软件组织,采用双重勒索策略加密文件并威胁泄露数据。近期攻击葡萄牙、克罗地亚和土耳其政府机构及英国电信公司 Colt,导致系统离线多日。攻击者声称在暗网上出售 Colt 的 100 万份文件,并利用微软 SharePoint 漏洞 CVE-2025-53770 入侵。建议企业修补漏洞、备份数据并加强安全措施以防范此类攻击。 2025-8-20 16:3:33 Author: www.fortra.com(查看原文) 阅读量:14 收藏

What is the Warlock?

Warlock is a ransomware operation that emerged in 2025, combining the traditional "double extortion" tactics of encrypting victims' files so they cannot be accessed, and threatening to release data stolen from the company's network.

Nasty, but sadly not that unusual.

Unfortunately, that’s right. 

The Warlock ransomware group seems to have stepped up its attacks in recent months, hitting a number of organisations including government agencies and departments.

Victims have included a water and waste service authority in Portugal, a government education agency in Croatia, and BTHK - the Turkish IT and communications authority.

So why is it in the news now?

On August 12, UK-based telecoms firm Colt Technology Services was hit by a cyber attack which has caused some of the company's systems to be taken offline for multiple days. 

The attack saw the firm advise its customers to not rely upon its its online portals for communication, but instead use email and phone instead - and to expect a slower-than-normal response. 

Colt Technology Services said that it has informed the authorities about the incident, and that it has staff working around the clock to restore normal operations. 

And this was Warlock?

Colt hasn't shared details about the nature of the cybersecurity incident it is experiencing or who is behind it, but someone claiming to represent the Warlock ransomware group has posted on a dark web forum that they are offering to sell one million of Colt's stolen documents for US $200,000. 

The data is said to include financial, customer, and employee data, as well as internal emails. Sure enough, WarLock's data leak site on the dark web includes an entry for Colt, and has announced that it is auctioning the data to whoever might want it.

So how do we think the Warlock gang might have broken in?

Security researchers believe that the malicious hackers may have made entry into Colt's systems by exploiting the CVE-2025-53770 Sharepoint vulnerability, which Microsoft has said is being actively used by attackers.

Nasty. Presumably patches are available?

Yes, and Microsoft is advising customers to apply them immediately to ensure that they are protected. 

Microsoft experts published an article last month sharing detailed intelligence about how the Warlock ransomware has been deployed by exploiting the software flaws, and how customers can mitigate and protect themselves.

Of course the hackers don't have to use that particular method to break in, right?

Correct. Malicious attackers can use any number of different methods to infiltrate organisations and plant ransomware on their systems.

If you don't have adequate defences in place, there is a chance that you could come into your office one day to be greeted by a ransom note from a group like Warlock. 

So what should my business do to defend itself?

Organisations who feel they may be at risk of being hit by the likes of Warlock would be wise to follow Fortra's general advice for defending against ransomware attacks, which includes tips such as enforcing multi-factor authentication, running up-to-date security solutions, and keeping software patches up-to-date. 

In addition, it's recommended that all companies follow best practices for defending against ransomware attacks, which include tips such as:

  • Making secure off-site backups.
  • Using hard-to-crack unique passwords to protect sensitive data and accounts.
  • Encrypting sensitive data wherever possible.
  • Reducing the attack surface by disabling functionality that your company does not need.
  • Educating and informing staff about the risks and methods used by cybercriminals to launch attacks and steal data.

Editor’s Note: The opinions expressed in this and other guest author articles are solely those of the contributor and do not necessarily reflect those of Fortra.


文章来源: https://www.fortra.com/blog/warlock-ransomware-what-you-need-know
如有侵权请联系:admin#unsafe.sh