Saturday, February 22, 2025
HomeCyber AttackCleveland City Closes Offices Following Attack on IT Systems

Cleveland City Closes Offices Following Attack on IT Systems

Published on

SIEM as a Service

Follow Us on Google News

Cleveland City Hall and Erieview offices will remain closed for a second consecutive day, June 11, as officials continue investigating a significant “cyber event” that has disrupted city operations.

A recent tweet from the City of Cleveland shared that the City Hall and Erieview are closed today June 10, except for essential staff, as we investigate a cyber incident.

Mayor’s Briefing on the Incident

During a media briefing, Mayor Justin Bibb provided an update on the situation.

Analyze any MaliciousURL, Files & Emails & Configuration With ANY RUN Start your Analysis

He announced that city phone services have been restored, and efforts are underway to bring other critical IT systems back online.

“Though we continue to investigate the nature and scope of the incident, we do know that certain city data is currently unaffected,” Mayor Bibb stated.

“Those include taxpayer information held by the Central Collection Agency Division of Taxation and customer information held by public utilities.”

Despite the cyber event, basic city services, including public safety, public works, public utilities, and airport operations, remain functional, albeit with limited computer capabilities.

The incident did not impact emergency services such as police, fire, and EMS.

Investigation and Response

The FOX 8 I-Team reported that the city of Cleveland was actively investigating the incident.

The city’s information technology commissioner Kim Roy Wilson revealed that officials had identified “abnormalities” in its IT environment.

While Mayor Bibb referred to the incident as a “breach” in his opening remarks, Wilson preferred the term “cyber event,” emphasizing the need to withhold specific details to avoid compromising the ongoing investigation.

“You’re seeing this happen all across the country from city governments to large Fortune 500 companies, to large health care companies as well,” Mayor Bibb noted.

“We wanted to make sure that we contain, manage, and get back to business as quickly as possible.”

Office Closures and Public Impact

Cleveland City Hall and the Erieview offices were closed on June 10 and will remain closed on June 11.

As the city works to recover from the cyber event, residents requiring critical documents or services supported by city networks must wait until the issue is resolved and the offices reopen.

City officials are working diligently to restore full functionality to all IT systems and ensure the security of city data.

The incident is a stark reminder of the growing threat of cyber attacks on public institutions and the importance of robust cybersecurity measures.

Looking for Full Data Breach Protection? Try Cynet's All-in-One Cybersecurity Platform for MSPs: Try Free Demo

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...

ACRStealer Malware Abuses Google Docs as C2 to Steal Login Credentials

The ACRStealer malware, an infostealer disguised as illegal software such as cracks and keygens,...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...