New Jersey county says malware attack took down phone lines, IT systems

One of the largest counties in New Jersey is dealing with a cyberattack that disrupted  the phone lines and IT systems used across government offices. 

Passaic County, home to nearly 600,000 people in Northern New Jersey, published a statement on Wednesday evening warning residents that it is aware of a “malware attack” affecting county IT systems and phone lines.

“Our team is actively working with federal and state officials to investigate and contain the issue,” the county said.

The county initially said its phone lines were down on Wednesday morning before confirming in the afternoon that the outages were caused by a cyberattack. 

After several ransomware attacks targeting large metropolitan areas from 2023 to 2025, cybercriminal operations have focused their efforts on smaller municipalities. Dozens of county and city governments have been targeted so far in 2026, including cities in Florida, Connecticut and West Virginia.

In addition to local governments, hospitals have been targeted in recent weeks by hackers. One of the largest hospitals in Mississippi spent weeks recovering from a ransomware attack and was finally able to restore normal operations on Monday following days of outages, closures and cancelled appointments.  

Officials in Passaic said “several other local governments in New Jersey have experienced similar incidents” — likely a reference to past ransomware attacks impacting Somerset County, Camden County, Bergen County, the township of Montclair and the city of Hoboken.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

Ukrainian women fleeing war exploited in multimillion-dollar gambling fraud scheme

Related Posts

China-Linked UAT-7290 Targets Telecoms with Linux Malware and ORB Nodes

A China-nexus threat actor known as UAT-7290 has been attributed to espionage-focused intrusions against entities in South Asia and Southeastern Europe. The activity cluster, which has been active since at least 2022, primarily focuses on extensive technical reconnaissance of target organizations before initiating attacks, ultimately leading to the deployment of malware families such as RushDrop
Read More

Russia-Linked Hackers Use Microsoft 365 Device Code Phishing for Account Takeovers

A suspected Russia-aligned group has been attributed to a phishing campaign that employs device code authentication workflows to steal victims' Microsoft 365 credentials and conduct account takeover attacks. The activity, ongoing since September 2025, is being tracked by Proofpoint under the moniker UNK_AcademicFlare. The attacks involve using compromised email addresses belonging to government
Read More

CSA Issues Alert on Critical SmarterMail Bug Allowing Remote Code Execution

The Cyber Security Agency of Singapore (CSA) has issued a bulletin warning of a maximum-severity security flaw in SmarterTools SmarterMail email software that could be exploited to achieve remote code execution. The vulnerability, tracked as CVE-2025-52691, carries a CVSS score of 10.0. It relates to a case of arbitrary file upload that could enable code execution without requiring any
Read More