🚨 CRITICALnews

INC Ransom - CodeRED Breach Disrupts US Emergency Alerts

Category:Threat Alerts
INC Ransom ransomware group breached OnSolve's CodeRED emergency notification platform, threatening disruption of critical public safety communications across the United States. CodeRED delivers emergency alerts for severe weather, missing persons, evacuations, and disaster response to thousands of jurisdictions nationwide. The attackers claim to have exfiltrated sensitive data and are threatening to disrupt the emergency communications infrastructure. What's brutal: this isn't just a corporate data breach—it has immediate public safety implications. Emergency notification systems are critical during natural disasters, active shooter situations, and mass evacuations. The breach timing is particularly concerning as it coincides with peak severe weather season. INC Ransom is a relatively new group but has already demonstrated capability against high-value infrastructure targets.

🎯CORTEX Protocol Intelligence Assessment

Business Impact: The INC Ransom attack on CodeRED demonstrates how ransomware against a single SaaS platform can cascade into nationwide degradation of emergency communications while simultaneously exposing citizen data and weak credential practices. Municipalities, school districts, and public safety agencies face reputational damage, potential liability over clear-text password storage, and the operational risk of disrupted alerts during critical incidents. Technical Context: Adversaries used a double-extortion model aligned with T1486 and T1041, exfiltrating subscriber data before encrypting parts of CodeRED infrastructure and threatening public leaks. The presence of clear-text passwords indicates design flaws in identity and access management, while customer reliance on a single vendor without redundant channels exposes a broader architectural weakness in emergency communications.

Strategic Intelligence Guidance

  • Force password resets for all CodeRED-linked accounts, implement multi-factor authentication where supported, and monitor for credential stuffing attempts against other municipal portals that may share reused passwords.
  • Establish and regularly test redundant emergency alerting capabilities, such as backup providers, SMS gateways, broadcast systems, or social media playbooks, to avoid single points of failure in public warning workflows.
  • Update procurement and security requirements for emergency SaaS platforms to mandate hashed and salted password storage, regular third-party security assessments, and documented incident response and ransomware recovery capabilities.
  • Elevate emergency communications systems into the organization's critical infrastructure risk register and include them in tabletop exercises, crisis communication planning, and board-level cyber resilience discussions.

Vendors

OnSolveCodeRED

Threats

INC Ransomransomware

Targets

US municipalitiesemergency management agenciesCodeRED subscribers