A notorious threat actor on dark web forums has claimed responsibility for leaking the customer database of Colicom, a prominent delivery and shipping company.
The alleged breach has reportedly exposed sensitive personal information of approximately 200,000 customers, raising concerns about data security and privacy.
Hackers’ Claims Surface on Dark Web
The claim was first reported by IntelBroker on a popular hacking forum, where the threat actor boasted about gaining access to Colicom’s customer database.
According to ThreatMon’s post, the leaked data includes full names, phone numbers, and physical addresses of Colicom’s customers.

This type of information could potentially be used for identity theft or phishing attacks.
The hacker’s post also suggests that the breach may have occurred due to vulnerabilities in Colicom’s internal systems.
The leak was highlighted by cybersecurity analyst MonThreat, who shared details of the breach in a post.
MonThreat’s tweet has since sparked widespread discussion among cybersecurity experts and concerned customers alike, with many questioning how such a large-scale breach could occur at a company as established as Colicom.
Colicom Yet to Respond
As of now, Colicom has not issued an official statement regarding the alleged data leak.
However, industry insiders speculate that if the claims are verified, this could lead to significant legal and reputational consequences for the company.
Experts are urging affected customers to take immediate precautions, such as monitoring their accounts for suspicious activity and being vigilant against potential phishing attempts.
Cybersecurity professionals are also emphasizing the importance of companies like Colicom implementing more robust security measures to protect customer data from malicious actors.
This alleged breach is just one in a series of high-profile cyberattacks that have targeted major companies in recent years.
With hackers becoming increasingly sophisticated in their methods, businesses across all sectors are being urged to prioritize cybersecurity measures.
Also Read: