The OnSolve CodeRED emergency notification platform suffered a cyberattack attributed to the INC Ransom gang, disrupting alerting capabilities for state and local governments, police, and fire agencies across the United States. The attack forced Crisis24, which operates CodeRED, to decommission its legacy environment and rebuild the service from backups, mapping to MITRE ATT&CK T1486 (Data Encrypted for Impact) and T1041 (Exfiltration Over C2 Channel). Stolen data includes names, addresses, email addresses, phone numbers, and passwords from CodeRED user profiles, although there is currently no evidence of public data release. INC Ransom claims to have breached OnSolve on November 1, 2025 and encrypted files on November 10 after exfiltrating sensitive information. When ransom demands were not met, the group allegedly began selling CodeRED data via its Tor leak site, posting screenshots that appear to show clear-text passwords associated with customer accounts. Because CodeRED underpins emergency alerts, weather warnings, and other critical communications, the outage created systemic risk for municipalities that rely on the platform to reach residents during crises. From a business and public safety standpoint, the incident underscores how ransomware against communication providers can cascade into operational impact for hundreds of downstream agencies. Municipalities and public safety organizations faced degraded ability to send alerts, potential compromise of staff credentials reused elsewhere, and reputational concerns over the handling of sensitive citizen contact data. While Crisis24 reports the attack was contained to CodeRED and other systems were not affected, reliance on a backup from March 31, 2025 means some accounts may be missing or stale, complicating recovery and validation. Mitigation for affected customers includes forced password resets, review of any reused credentials in other systems, and verification of emergency contact lists after migration to the rebuilt platform. Strategically, the event should push public-sector entities to assess resilience of critical communication services, implement redundancy (e.g., secondary alert providers), and bake ransomware and supplier failure scenarios into continuity planning. Security leaders should also reassess contractual language with SaaS providers, ensuring robust incident reporting, segmentation, and encryption of sensitive user data at rest and in transit.
π―CORTEX Protocol Intelligence Assessment
Business Impact: The CodeRED breach demonstrates that a single ransomware incident at a SaaS communication provider can disrupt emergency alerting for jurisdictions nationwide and expose citizen contact data. Municipalities and agencies face operational risk, possible privacy complaints, and political pressure to explain their reliance on single points of failure in critical communication chains. Technical Context: The INC Ransom operation appears to have performed double-extortion by encrypting CodeRED systems and exfiltrating user profile data, mapped to T1486 and T1041. Rebuild efforts from an older backup underscore the importance of tested, recent, immutable backups and strong password hashing practices, especially when screenshots indicate clear-text credentials in legacy systems.
β‘Strategic Intelligence Guidance
- Coordinate with Crisis24 to ensure all CodeRED accounts under your control have unique, strong passwords and reset any credentials that may have been reused across other systems.
- Introduce redundancy for emergency alerting by onboarding secondary communication channels and regularly testing failover procedures during continuity exercises.
- Review contracts with SaaS providers for requirements around encryption, password storage standards, backup freshness, and incident notification timelines, and update them where necessary.
- Elevate critical SaaS platforms like emergency alerting into board-level risk discussions and align them with broader ransomware resilience strategies across suppliers and infrastructure.
Targets
state and local governmentspolice departmentsfire agenciesemergency alert platforms