TheMurrow

U.S. Issues Nationwide Safety Alert After Major Cyber Disruption Hits Multiple Critical Services

The viral framing doesn’t match the public record. But a late-2025 CodeRED disruption and federal warnings about pre-positioned threats show how “national” failure can start locally.

By TheMurrow Editorial
January 24, 2026
U.S. Issues Nationwide Safety Alert After Major Cyber Disruption Hits Multiple Critical Services

Key Points

  • 1Find no federal paper trail: no DHS/CISA/FBI/FEMA bulletin confirms a single nationwide safety alert tied to a simultaneous multi-sector cyber collapse.
  • 2Track the real nationwide signal: a late-2025 cyberattack on OnSolve’s CodeRED disrupted local emergency notifications across many U.S. jurisdictions.
  • 3Connect warnings to resilience: CISA’s Volt Typhoon advisory and vendor concentration show how pre-positioning and single points of failure amplify risk.

The most alarming cyber stories are often the ones that almost happened—or the ones that happened in plain sight without a single dramatic headline to mark the moment.

As of Jan. 24, 2026, there is no authoritative evidence that the U.S. government issued a single, nationwide public “safety alert” because a major cyber disruption simultaneously knocked out multiple critical services nationwide—power, water, hospitals, air traffic, and 911 all at once. Searches for that specific scenario turn up no matching DHS, CISA, FBI, or FEMA bulletin.

And yet, it would be complacent to stop there.

What the public record does show is a quieter, more modern vulnerability: a single vendor’s failure can ripple across hundreds of jurisdictions. In late 2025, a cyberattack on OnSolve’s CodeRED—a mass-notification system used by many local governments and public safety agencies—disrupted emergency messaging for communities across the country. Some agencies reported they could not send certain alerts through their normal pipelines during the outage. The system that tells people what to do in an emergency became, briefly, another thing that needed contingency plans.

“The scariest cyber incidents don’t always turn off the lights. Sometimes they silence the systems that tell you what’s happening.”

— TheMurrow Editorial

What we can verify—and what we can’t—about a “nationwide safety alert”

The internet rewards a particular kind of narrative: a clean, cinematic chain of events leading to a federal warning siren. The research record here resists that simplicity.

No single federal alert matches the viral framing

As of Jan. 24, 2026, there is no confirmed evidence that the U.S. government issued one nationwide public safety alert explicitly because a “major cyber disruption” simultaneously hit multiple critical services across the country. That matters because it separates two very different realities:

- A coordinated, multi-sector collapse (power + water + hospitals + air traffic + 911) would likely produce obvious federal messaging and widespread public documentation.
- A broad vendor outage in a widely used public-safety platform can feel “national” to residents and local officials without triggering a singular federal alert moment.

The distinction isn’t pedantic. It’s how we measure risk. It’s also how we avoid turning legitimate concern into a rumor mill.

What is clearly documented instead: significant, consequential disruptions

The record does show multiple cyber-related disruptions and warnings affecting critical or quasi-critical services in the U.S., including:

- A cyber incident affecting OnSolve CodeRED, disrupting emergency notifications across many jurisdictions. (Local reporting and agency statements; see Cambridge Police community notice and broader coverage.)
- Federal warnings that nation-state actors have positioned inside U.S. critical infrastructure networks for potential disruptive attacks during crises—such as the Volt Typhoon advisory from CISA.
- High-stakes outages and “near misses” that underscore fragility—even when not confirmed as cyber-caused, such as the FAA’s acknowledged temporary outage and reliance on contingency systems.

“A rumor about a nationwide cyber blackout spreads fast. A documented vendor outage that hampers emergency messaging can be just as consequential—and far more plausible.”

— TheMurrow Editorial

The 2025 CodeRED cyberattack: the most substantiated “nationwide” disruption signal

Among the material surfaced in the research, the incident with the strongest nationwide footprint is the late-2025 disruption involving CodeRED, a mass-notification platform owned by OnSolve (also associated with Crisis24 in reporting and public descriptions).

What CodeRED is—and why its failure matters

CodeRED is widely used by local governments, police, fire departments, and emergency management agencies to send alerts through multiple channels: phone calls, text messages, emails, and app notifications. TechRadar described the disruption as affecting emergency alert systems across the U.S., reflecting how concentrated the market for notification tools has become.

When a single platform sits between a local agency and the public, the platform becomes a form of civic infrastructure—even if it’s privately operated and not a federal system.

What’s confirmed about impact: disrupted availability and altered procedures

Public statements from local agencies describe a cyberattack against CodeRED that disrupted service availability. The Cambridge Police Department posted a community notice describing the event and emphasizing protective steps for residents, particularly around passwords. The details underline the real-world stakes: when a mass-notification platform goes down, public safety agencies lose a fast, scalable way to reach residents.

Some reporting indicates a deeper operational consequence: at least some agencies said that during downtime they could not send IPAWS alerts via CodeRED—meaning they could not originate certain IPAWS messages through that vendor’s integration and had to use alternative methods. (The Sundance Times reported that CodeRED being “cancelled” reflected local concern and practical disruption.)

“When mass-notification software fails, it doesn’t just break an app. It changes how a city communicates during a crisis—minute by minute.”

— TheMurrow Editorial

A key clarification: CodeRED is not the federal Emergency Alert System

It’s easy to hear “emergency alerts disrupted nationwide” and imagine the Emergency Alert System (EAS) or Wireless Emergency Alerts (WEA) collapsing. The research does not support that claim.

The better framing is narrower and, in some ways, more unsettling: a vendor platform used by many local agencies suffered a cyber incident, creating widespread disruption in local notification capacity. In a country where many emergency processes are locally administered, “local” can add up to something that feels national.

Vendor concentration is a public-safety issue, not a procurement footnote

A major lesson from the CodeRED incident isn’t simply “a company got hacked.” It’s that modern civic capacity is increasingly mediated through a handful of vendors.

When one vendor is everywhere, one incident is everywhere

Mass-notification tools serve cities, counties, school districts, and emergency offices. They are attractive precisely because they simplify complex outreach: templated messages, automated dialing, geofencing, and multi-channel dispatch.

But that scale cuts both ways. A disruption at the vendor layer can create a multi-jurisdiction problem without touching a power plant or hospital network.

Here’s the practical implication: resilience no longer means only backup generators and redundant radio towers. It also means asking uncomfortable questions about:

- vendor dependencies,
- contractual obligations for incident response,
- whether alternate messaging pathways have been rehearsed,
- and whether “single pane of glass” convenience has quietly become “single point of failure.”

The trust problem: not just downtime, but confidence

TechRadar reported that some customers terminated contracts after the incident due to trust and privacy concerns. That response is rational—even if the outage is temporary, emergency messaging depends on credibility. Residents must believe alerts are authentic, timely, and secure.

A city can’t afford a public moment where people ask, “Is this message real?” and decide to ignore it.

Key Insight

A vendor outage can feel “national” without any federal siren—because the same tool sits in hundreds of local emergency workflows at once.

Federal warnings: Volt Typhoon and the logic of pre-positioning

The most sobering federal signal in the research isn’t a post-crisis nationwide alert. It’s the warning that adversaries may already be inside critical systems.

What CISA has warned about

CISA’s Volt Typhoon advisory (AA24-038A) warned that a nation-state actor was positioning within U.S. networks connected to critical infrastructure, potentially to enable disruptive attacks during a geopolitical crisis. The key idea is pre-positioning: gaining and maintaining access so disruption is an option later, not an improvisation.

That distinction matters for how the public thinks about cyber risk. The question isn’t always, “Can they hack it?” The question is, “Are they already there, waiting?”

Why that warning should change how we read local incidents

A vendor incident like CodeRED and a strategic warning like Volt Typhoon aren’t the same category. One is an event; the other is a posture. But together they point to an uncomfortable truth: the U.S. doesn’t have to experience a Hollywood-style simultaneous collapse to be living in a persistent state of cyber vulnerability.

Even without a single “nationwide safety alert,” the warning signs are already public.

The FAA outage example: “not confirmed cyber” still teaches a cyber lesson

The research also references an FAA example—an outage that was not necessarily cyber-caused, but still instructive. The FAA has published statements about service interruptions and the existence of contingency systems.

Critical systems fail; the question is how gracefully

For readers, the point isn’t to label every outage “a hack.” That reflex helps no one and can mislead the public.

The useful lesson is operational: when high-dependence systems fail, the difference between disruption and catastrophe is often redundancy, procedures, and trained workarounds. Cyber resilience and operational resilience increasingly overlap. An outage is an outage to the person stranded in an airport or the family waiting for an emergency update.

A mature public conversation resists easy attribution

Cyber incidents require careful attribution. Misattribution can:

- distort policy responses,
- unfairly damage institutions,
- and create an information environment where facts struggle to keep up with vibes.

A measured approach is not softness; it’s seriousness.

Editor's Note

The article distinguishes between a multi-sector collapse and a vendor-layer outage. Conflating the two changes risk perception and can fuel misinformation.

What the CodeRED disruption means for local governments—and for residents

“Critical infrastructure” usually conjures energy grids and water treatment plants. But for many communities, communications are the infrastructure that makes every other response possible.

Local governments: resilience has to include communications vendors

The documented disruption suggests several practical lessons for agencies that rely on third-party notification systems:

- Contingency planning: If your primary alert tool fails, what’s the second and third method?
- Exercises: If staff have never practiced sending alerts without the standard platform, the backup plan is theoretical.
- Vendor accountability: Contracts should clarify incident reporting expectations, service restoration targets, and customer notification obligations.
- Integration risk: If IPAWS origination depends on a vendor’s integration, agencies should know what happens when that integration goes down.

These are governance questions as much as technical ones.

Residents: where you get emergency info matters

Individuals can’t patch municipal systems. But residents can reduce their dependence on any single channel.

Practical steps—especially during a known disruption—include:

- Follow your city/county emergency management office on at least two platforms (website + social media, for instance).
- Keep a list of local emergency numbers and official pages bookmarked.
- Avoid password reuse, especially if your contact information is tied to local alerting services—an emphasis echoed in local agency notices related to CodeRED.

The uncomfortable reality: in a crisis, the first failure might be information.

Resident checklist: reduce single-channel risk

  • Follow your local emergency management office in at least two places (official website + a social platform)
  • Bookmark official city/county alert pages and save local emergency numbers
  • Avoid password reuse—especially for accounts tied to public alert signups

The real story: not a nationwide blackout, but a nationwide stress test

The internet likes binary outcomes: either everything collapsed or everything is fine. The public record suggests something more nuanced and, frankly, more believable.

What’s missing: a single, definitive federal “safety alert” moment

The research found no authoritative bulletin matching the claim of a nationwide public safety alert issued because a multi-sector cyber disruption hit multiple critical services simultaneously. That kind of event would leave an unmistakable paper trail across DHS/CISA/FBI/FEMA communications.

What’s present: a pattern of fragility and interdependence

What we can document is still serious:

- A cyber incident hit a widely used emergency notification platform, disrupting local agencies’ ability to communicate at scale.
- Federal agencies have warned about nation-state actors positioning within critical infrastructure for potential future disruption.
- Major systems can and do experience outages; contingency planning becomes the difference between inconvenience and danger.

The deeper takeaway isn’t that catastrophe has arrived. It’s that the systems people rely on—especially the systems that tell them what’s happening—are more centralized and more brittle than most residents realize.

A society doesn’t need to go dark to be vulnerable. It only needs to lose the ability to coordinate.

“A society doesn’t need to go dark to be vulnerable. It only needs to lose the ability to coordinate.”

— TheMurrow Editorial

1) Did the U.S. government issue a nationwide safety alert because multiple critical services were hit at once?

As of Jan. 24, 2026, the research found no authoritative evidence of a single nationwide public “safety alert” tied to a simultaneous, multi-sector cyber disruption across power, water, hospitals, air traffic, and 911. Searches did not turn up a matching DHS/CISA/FBI/FEMA bulletin for that specific scenario. That doesn’t rule out serious incidents—only that this specific framing lacks documented federal confirmation.

2) What was the CodeRED incident, and why did it feel “national”?

CodeRED is a mass-notification platform used by many local governments and public safety agencies. In late 2025, a cyberattack disrupted its service availability, limiting some agencies’ ability to send alerts through their normal channels. Because so many jurisdictions rely on the same vendor, one incident created widespread disruption across many communities—national in footprint, even if not a federal alert-system failure.

3) Was the federal Emergency Alert System (EAS) knocked out?

The research does not support the claim that EAS or Wireless Emergency Alerts (WEA) suffered a nationwide collapse tied to this incident. The more substantiated disruption involved a vendor platform (CodeRED) used by local agencies. Some agencies reported they could not originate certain IPAWS messages via CodeRED during downtime, which is a meaningful constraint—but not the same as EAS going dark nationwide.

4) What is IPAWS, and how does it relate to CodeRED?

IPAWS (Integrated Public Alert and Warning System) is a federal framework that helps authorized officials send public alerts across channels. Some local agencies use vendor tools that integrate with IPAWS. Reporting indicates that during the CodeRED disruption, at least some agencies said they could not send IPAWS alerts through that vendor integration and had to use other communication methods. The key issue is dependency on a single pathway.

5) What did CISA warn about with “Volt Typhoon”?

CISA’s Volt Typhoon advisory warned that a nation-state actor had positioned within networks tied to U.S. critical infrastructure, potentially to enable disruptive attacks during a crisis. The emphasis is on pre-positioning—access maintained over time—rather than a one-off smash-and-grab attack. It’s a strategic warning about capability and intent, not a report of a single nationwide outage event.

6) Should residents change anything about how they receive emergency alerts?

Yes—without panic. Residents should avoid relying on a single channel for emergency information. Follow local emergency management on more than one platform, bookmark official pages, and keep basic preparedness contacts accessible. Also avoid password reuse, especially where personal contact details are associated with public alert signups—local agencies highlighted password hygiene in response to the CodeRED incident.

7) What should local governments do differently after a vendor-wide disruption?

Local agencies should treat mass-notification as mission-critical infrastructure. That means rehearsed backup procedures, alternate communication channels, and clearer vendor accountability in contracts. If a platform is also the conduit for originating IPAWS messages, agencies should understand failure modes and maintain tested alternatives. Resilience isn’t only technical—it’s procedural, contractual, and organizational.
Jan. 24, 2026
As of this date, the article finds no authoritative evidence of a single nationwide federal “safety alert” matching the viral multi-sector-collapse claim.
Late 2025
A cyberattack on OnSolve’s CodeRED disrupted emergency messaging across many jurisdictions—widely felt, heavily documented at the local level.
AA24-038A
CISA’s Volt Typhoon advisory identifier referenced in the article, warning of nation-state pre-positioning in U.S. critical infrastructure networks.
200 wpm
Reading-time estimate uses ~200 words per minute, consistent with the site’s guideline for calculating minutes to read.
T
About the Author
TheMurrow Editorial is a writer for TheMurrow covering breaking news.

Frequently Asked Questions

Did the U.S. government issue a nationwide safety alert because multiple critical services were hit at once?

As of Jan. 24, 2026, the research found no authoritative evidence of a single nationwide public “safety alert” tied to a simultaneous, multi-sector cyber disruption across power, water, hospitals, air traffic, and 911. Searches did not turn up a matching DHS/CISA/FBI/FEMA bulletin for that specific scenario. That doesn’t rule out serious incidents—only that this specific framing lacks documented federal confirmation.

What was the CodeRED incident, and why did it feel “national”?

CodeRED is a mass-notification platform used by many local governments and public safety agencies. In late 2025, a cyberattack disrupted its service availability, limiting some agencies’ ability to send alerts through their normal channels. Because so many jurisdictions rely on the same vendor, one incident created widespread disruption across many communities—national in footprint, even if not a federal alert-system failure.

Was the federal Emergency Alert System (EAS) knocked out?

The research does not support the claim that EAS or Wireless Emergency Alerts (WEA) suffered a nationwide collapse tied to this incident. The more substantiated disruption involved a vendor platform (CodeRED) used by local agencies. Some agencies reported they could not originate certain IPAWS messages via CodeRED during downtime, which is a meaningful constraint—but not the same as EAS going dark nationwide.

What is IPAWS, and how does it relate to CodeRED?

IPAWS (Integrated Public Alert and Warning System) is a federal framework that helps authorized officials send public alerts across channels. Some local agencies use vendor tools that integrate with IPAWS. Reporting indicates that during the CodeRED disruption, at least some agencies said they could not send IPAWS alerts through that vendor integration and had to use other communication methods. The key issue is dependency on a single pathway.

What did CISA warn about with “Volt Typhoon”?

CISA’s Volt Typhoon advisory warned that a nation-state actor had positioned within networks tied to U.S. critical infrastructure, potentially to enable disruptive attacks during a crisis. The emphasis is on pre-positioning—access maintained over time—rather than a one-off smash-and-grab attack. It’s a strategic warning about capability and intent, not a report of a single nationwide outage event.

Should residents change anything about how they receive emergency alerts?

Yes—without panic. Residents should avoid relying on a single channel for emergency information. Follow local emergency management on more than one platform, bookmark official pages, and keep basic preparedness contacts accessible. Also avoid password reuse, especially where personal contact details are associated with public alert signups—local agencies highlighted password hygiene in response to the CodeRED incident.

More in Breaking News

You Might Also Like