Close Menu
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Hackers Exploit Decade-Old Windows Flaw to Disable Modern EDR Defenses

February 5, 2026

Unlocking Hidden Power: Why Boards Should Care About Their ‘Boring’ Systems

February 5, 2026

Critical n8n Flaw CVE-2026-25049: Command Execution Risk via Malicious Workflows

February 5, 2026
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance
Home » Cyberattack Cripples Nationwide Emergency Alert Systems
Cybercrime and Ransomware

Cyberattack Cripples Nationwide Emergency Alert Systems

Staff WriterBy Staff WriterNovember 26, 2025No Comments4 Mins Read2 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email

Summary Points

  1. Crisis24’s OnSolve CodeRED platform, used by U.S. emergency agencies, was targeted by a cyberattack, causing system disruptions and forcing the decommissioning of the legacy environment.
  2. Data including names, addresses, emails, phone numbers, and passwords was stolen during the attack, although no evidence suggests the data has been publicly released.
  3. The INC Ransomware gang has claimed responsibility, leaking customer data and screenshots, with the group allegedly breaching OnSolve’s systems to encrypt files and sell stolen information.
  4. Crisis24 is rebuilding its system from backups dated March 31, 2025, while customers are advised to reset passwords, especially since clear-text passwords were compromised.

Underlying Problem

In late 2025, a significant cyberattack targeted Crisis24’s OnSolve CodeRED platform, which is crucial for emergency notifications used by U.S. government agencies, police, and fire departments. The attack, reportedly carried out by the INC Ransomware gang, resulted in system downtime and the theft of sensitive data, including names, addresses, emails, phone numbers, and passwords of platform users. Although Crisis24 claims the breach was confined to the CodeRED environment and did not affect its other systems, it confirmed that the stolen data has not yet been publicly released. The cybercriminal group announced on its Tor leak site that it gained access on November 1, encrypted files on November 10, and is now selling the stolen information after allegedly failing to receive a ransom.

This incident happened because of an organized cybercriminal effort, which caused widespread disruption among counties, cities, and safety agencies dependent on CodeRED. Crisis24 is restoring its services from an earlier backup, dating to March 31, 2025, meaning some accounts may be missing. Meanwhile, the INC Ransom gang, which launched in July 2023, has targeted various sectors worldwide and is now distributing the stolen data. They warn users to reset passwords, especially those reused across different sites. Reporters, including BleepingComputer and the City of University Park, Texas, have confirmed these details, highlighting the attack’s broad implications and ongoing recovery efforts.

Risk Summary

The recent OnSolve CodeRED cyberattack highlights a serious risk that can impact any business, regardless of size or industry. When such an attack occurs, it disrupts emergency alert systems, which are crucial for rapid communication during crises. As a result, your business could face delays in receiving or sending vital alerts, leaving employees and customers uninformed and vulnerable. This interruption can lead to operational chaos, damage to reputation, and even legal liabilities if emergencies escalate without proper notifications. Moreover, the attack exposes sensitive data, risking privacy breaches and financial loss. Therefore, just like with critical public systems, your business’s safety and stability depend on robust cybersecurity measures to prevent similar disruptions.

Fix & Mitigation

Prompt response to incidents like the OnSolve CodeRED cyberattack disrupting emergency alert systems nationwide is crucial to minimize harm, restore trust, and ensure public safety.

Assessment and Identification

  • Conduct immediate incident analysis to determine scope and impact
  • Identify vulnerable systems and entry points

Containment and Isolation

  • Segregate affected systems from the network
  • Disable compromised accounts and access credentials

Eradication Efforts

  • Remove malicious code or malware
  • Apply patches and updates to affected software and firmware

Recovery Measures

  • Restore systems from secure backups
  • Validate system integrity before bringing back online

Communication and Notification

  • Inform stakeholders, emergency responders, and the public about the incident and ongoing efforts
  • Coordinate with authorities and cybersecurity agencies

Strengthening Defenses

  • Review and enhance cybersecurity policies and controls
  • Implement advanced threat detection and intrusion prevention solutions

Post-Incident Review

  • Conduct a thorough investigation to understand root causes
  • Document lessons learned and update incident response plans accordingly

Advance Your Cyber Knowledge

Discover cutting-edge developments in Emerging Tech and industry Insights.

Explore engineering-led approaches to digital security at IEEE Cybersecurity.

Disclaimer: The information provided may not always be accurate or up to date. Please do your own research, as the cybersecurity landscape evolves rapidly. Intended for secondary references purposes only.

Cyberattacks-V1cyberattack-v1-multisource

CISO Update cyber risk cybercrime Cybersecurity MX1 risk management
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleData Breach Exposes Personal Details of 146,000+ Delta Dental Customers
Next Article Russian Hackers Target US Engineering Firm Over Ukrainian Connections
Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Related Posts

Hackers Exploit Decade-Old Windows Flaw to Disable Modern EDR Defenses

February 5, 2026

Unlocking Hidden Power: Why Boards Should Care About Their ‘Boring’ Systems

February 5, 2026

DragonForce Ransomware Strikes: Critical Business Data at Risk

February 5, 2026

Comments are closed.

Latest Posts

Hackers Exploit Decade-Old Windows Flaw to Disable Modern EDR Defenses

February 5, 2026

Unlocking Hidden Power: Why Boards Should Care About Their ‘Boring’ Systems

February 5, 2026

DragonForce Ransomware Strikes: Critical Business Data at Risk

February 5, 2026

Cyber Criminals Hijack NGINX Servers to Steer Web Traffic to Malicious Sites

February 5, 2026
Don't Miss

Hackers Exploit Decade-Old Windows Flaw to Disable Modern EDR Defenses

By Staff WriterFebruary 5, 2026

Essential Insights Attackers exploited an expired and revoked Windows kernel driver (EnCase driver) using a…

Unlocking Hidden Power: Why Boards Should Care About Their ‘Boring’ Systems

February 5, 2026

DragonForce Ransomware Strikes: Critical Business Data at Risk

February 5, 2026

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Recent Posts

  • Hackers Exploit Decade-Old Windows Flaw to Disable Modern EDR Defenses
  • Unlocking Hidden Power: Why Boards Should Care About Their ‘Boring’ Systems
  • Critical n8n Flaw CVE-2026-25049: Command Execution Risk via Malicious Workflows
  • DragonForce Ransomware Strikes: Critical Business Data at Risk
  • Cyber Criminals Hijack NGINX Servers to Steer Web Traffic to Malicious Sites
About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Hackers Exploit Decade-Old Windows Flaw to Disable Modern EDR Defenses

February 5, 2026

Unlocking Hidden Power: Why Boards Should Care About Their ‘Boring’ Systems

February 5, 2026

Critical n8n Flaw CVE-2026-25049: Command Execution Risk via Malicious Workflows

February 5, 2026
Most Popular

Nokia Alerts Telecoms to Rising Stealth Attacks, DDoS Surge, and Cryptography Pressures

October 8, 20259 Views

Cyberattack Cripples 34 Devices in Telecoms Using LinkedIn Lures & MINIBIKE Malware

September 19, 20259 Views

Tonic Security Secures $7 Million to Transform Cyber Risk Reduction

July 28, 20259 Views

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025

Categories

  • Compliance
  • Cyber Updates
  • Cybercrime and Ransomware
  • Editor's pick
  • Emerging Tech
  • Events
  • Featured
  • Insights
  • Threat Intelligence
  • Uncategorized
© 2026 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.