Payment tech provider for Texas, Florida governments working with FBI to resolve ransomware attack

A ransomware attack on a Florida technology company has taken down systems used by several local governments to process payments. 

BridgePay Network Solutions initially warned customers on Friday that it was dealing with system-wide outages and later said that it was working with the FBI and U.S. Secret Service forensic team to resolve a ransomware attack. 

The company does not have an estimated timeframe for when its systems will be restored. It does not believe that payment card data was stolen during the attack. 

BridgePay Network Solutions provides a transaction gateway for all types of point of sale solutions. It works with dozens of local governments and small businesses, processing 40 million transactions each month. 

The City of Palm Bay, Florida published its own statement warning residents that because BridgePay is its credit card processing vendor, the outages made their online billing payment portal unavailable. 

They urged residents to make payments in cash or through check or credit card payments in person. The Palm Bay online portal can still accept checks as well. 

The Texas city of Frisco released a similar statement that their utility water payments portal was also down because of the ransomware attack on BridgePay. Payments can be made in person at the Frisco city hall. Several other private businesses reported being impacted by the BridgePay incident. 

“We do not believe there is a threat or vulnerability for our integrators at this time,” BridgePay said in a statement on Friday evening. 

Statements on Saturday and Sunday reiterated that the investigation and restoration efforts are continuing. 

No ransomware gang has taken credit for the attack as of Monday and BridgePay did not respond to requests for comment about the incident. 

The ransomware attack resembles several others involving widely used payment software. In 2023, payment processing giant NCR disclosed a ransomware attack that caused an outage on its point of sale technology used widely by restaurants.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

Russia grants asylum to Spanish professor wanted for alleged pro-Moscow cyber operations

Next Post

China-Linked UNC3886 Targets Singapore Telecom Sector in Cyber Espionage Campaign

Related Posts

New MongoDB Flaw Lets Unauthenticated Attackers Read Uninitialized Memory

A high-severity security flaw has been disclosed in MongoDB that could allow unauthenticated users to read uninitialized heap memory. The vulnerability, tracked as CVE-2025-14847 (CVSS score: 8.7), has been described as a case of improper handling of length parameter inconsistency, which arises when a program fails to appropriately tackle scenarios where a length field is inconsistent with the
Read More

React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors

The security vulnerability known as React2Shell is being exploited by threat actors to deliver malware families like KSwapDoor and ZnDoor, according to findings from Palo Alto Networks Unit 42 and NTT Security. "KSwapDoor is a professionally engineered remote access tool designed with stealth in mind," Justin Moore, senior manager of threat intel research at Palo Alto Networks Unit 42, said in a
Read More

Google Issues Security Fix for Actively Exploited Chrome V8 Zero-Day Vulnerability

Google on Monday released security updates for its Chrome browser to address two security flaws, including one that has come under active exploitation in the wild. The vulnerability in question is CVE-2025-13223 (CVSS score: 8.8), a type confusion vulnerability in the V8 JavaScript and WebAssembly engine that could be exploited to achieve arbitrary code execution or program crashes. "Type
Read More