Municipal emergency warning service offline after hackers steal user data

An emergency warning service used by municipalities across the U.S. was taken down in recent weeks by hackers who also stole information on the system’s users. 

Crisis24, a company that provides a variety of security services globally, confirmed that data associated with its mass notification system was stolen by hackers during a recent cybersecurity incident. 

The hackers recently published the stolen information online, according to a Crisis24 spokesperson. The data is associated with the OnSolve CodeRED platform, which many counties, cities and towns use to send out information like weather notices, updates on disasters, AMBER alerts, evacuation orders and public safety notifications. 

“The attack also resulted in damage to the OnSolve CodeRED environment. Current forensic analysis indicates that the incident was fully contained within that environment, with no contagion beyond,” the spokesperson said. “The dataset involved may include information for OnSolve CodeRED users. Users who have reused their OnSolve CodeRED password for any other personal or business accounts are advised to change those passwords immediately.” 

Customers have been notified of the incident, and the platform has been decommissioned while they work on a new version of it. Crisis24 did not respond to several follow-up questions about the nature of the incident and their coordination with federal law enforcement. 

Municipalities across Colorado, Montana, Ohio, Georgia, New Mexico, Illinois, Missouri, Texas, Virginia, California, Massachusetts and more warned local residents to change the passwords that they used to sign up for alerts from the platform. 

According to some of the affected municipalities, as well as law enforcement, the platform first went down around November 10. Crisis24 contacted them and explained their work on a new mass notification platform, they said. Some counties terminated their contract with the company as a result of the incident. 

In place of the system, some counties have relied on social media or the federal government’s Integrated Public Alert and Warning System (IPAWS) alerts — emergency notifications managed by the Federal Emergency Management Agency (FEMA) meant for natural disasters, public safety threats and other emergencies. The messages are typically sent to cell phones.

The Jackson County Sheriff’s Office in Illinois published the letter Crisis24 sent them on Facebook, warning residents that the mass notification system is no longer working. 

Crisis24 told customers the cyberattack “damaged the OnSolve CodeRED environment in a targeted attack by an organized cybercriminal group.”

The company said the hackers stole information including the names, addresses, emails, phone numbers and passwords of OnSolve CodeRED users. 

The company has expedited plans to create a new version of CodeRED using backups, the letter said, but they warned the backup data is only current as of March 31. People that signed up for alerts after that date will have to sign up again. 

“We have also completed a comprehensive security audit of CodeRED by Crisis24 and its infrastructure as well as engaged external experts for additional penetration testing and hardening,” the company told customers.

“Please note, the CodeRED by Crisis24 platform will currently provide only basic alert and notification capabilities using publicly available phone data.”

FEMA did not respond to requests for comment and the Cybersecurity and Infrastructure Security Agency directed all questions to Crisis24. 

The attack on Crisis24 was claimed this weekend by the INC ransomware gang. The group has carried out a handful of high-profile attacks on governments, including the Pennsylvania Office of the Attorney General, the State Bar of Texas as well as international agencies in Panama and Hungary

Crisis24, which reported $436 million in earnings throughout 2024, is owned by Canadian corporation GardaWorld. 

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

When Your $2M Security Detection Fails: Can your SOC Save You?

Next Post

Qilin Ransomware Turns South Korean MSP Breach Into 28-Victim ‘Korean Leaks’ Data Heist

Related Posts

Over 67,000 Fake npm Packages Flood Registry in Worm-Like Spam Attack

Cybersecurity researchers are calling attention to a large-scale spam campaign that has flooded the npm registry with thousands of fake packages since early 2024 as part of a likely financially motivated effort. "The packages were systematically published over an extended period, flooding the npm registry with junk packages that survived in the ecosystem for almost two years," Endor Labs
Read More

Malicious Rust Crates Steal Solana and Ethereum Keys — 8,424 Downloads Confirmed

Cybersecurity researchers have discovered two malicious Rust crates impersonating a legitimate library called fast_log to steal Solana and Ethereum wallet keys from source code. The crates, named faster_log and async_println, were published by the threat actor under the alias rustguruman and dumbnbased on May 25, 2025, amassing 8,424 downloads in total, according to software supply chain
Read More

First Malicious MCP Server Found Stealing Emails in Rogue Postmark-MCP Package

Cybersecurity researchers have discovered what has been described as the first-ever instance of a Model Context Protocol (MCP) server spotted in the wild, raising software supply chain risks. According to Koi Security, a legitimate-looking developer managed to slip in rogue code within an npm package called "postmark-mcp" that copied an official Postmark Labs library of the same name. The
Read More