🚨 CRITICALnews

INC Ransom Attack on CodeRED Risks US Emergency Alert Coverage

Category:Threat Alerts
INC Ransom gang claimed responsibility for attacking OnSolve's CodeRED emergency notification system, threatening alert coverage for 25 million Americans across 3,200+ US communities. CodeRED delivers Amber Alerts, weather warnings, evacuation notices, and other critical public safety communications—making this attack a direct threat to civilian safety infrastructure. OnSolve also operates Crisis24, which provides government travel alerts and security intelligence globally. INC Ransom posted breach claims showing stolen customer data including email addresses and clear-text passwords, demanding ransom and threatening data publication. Multiple cities issued warnings urging residents to change passwords, especially if reused elsewhere. Some regions like Douglas County, Colorado terminated CodeRED contracts following the outage. What's brutal: this escalates ransomware from business disruption to tangible public safety risk.

🎯CORTEX Protocol Intelligence Assessment

Business Impact: The INC Ransom attack on CodeRED demonstrates how a single SaaS outage can degrade emergency communications nationwide and simultaneously expose citizen contact data and clear-text passwords. Municipalities and agencies face public safety risk, reputational damage, and potential regulatory scrutiny over their reliance on a single, inadequately protected alerting platform. Technical Context: Adversaries used double-extortion tactics, exfiltrating subscriber data before encrypting CodeRED infrastructure, mapped to T1486 and T1041. The use of clear-text password storage indicates weak security design, amplifying the blast radius as credentials are reused on unrelated services and highlighting the need for stronger vendor due diligence and contract requirements.

Strategic Intelligence Guidance

  • Force password resets for all CodeRED-linked accounts, issue strong guidance against password reuse, and monitor for credential stuffing against other municipal portals and services.
  • Establish redundant emergency alerting capabilities with secondary providers and pre-approved alternative channels, and test failover procedures during regular continuity exercises.
  • Update procurement and security requirements for critical SaaS platforms to include secure credential storage, independent security assessments, and documented ransomware recovery procedures.
  • Elevate emergency communication systems into the organization’s critical infrastructure risk register, ensuring they are covered by incident response plans, tabletop scenarios, and board-level oversight.

Vendors

OnSolveCrisis24

Threats

INC Ransomransomware

Targets

US municipalitiesemergency management agenciesCodeRED subscribers