Government Alert System Exploited in Nationwide Email Scam


A major breach in the GovDelivery email system has triggered scam alerts across multiple states, raising cybersecurity concerns.


 

Government Alert System Breached, Used to Send Widespread Scam Emails

A trusted email alert platform used by U.S. government agencies has been hijacked to spread scam messages, exposing a dangerous new front in the battle against cyber fraud. GovDelivery, an official communication system managed by government tech firm Granicus, is at the center of a growing scandal that has already affected multiple states and prompted urgent warnings to residents.

On Tuesday, the Indiana state government acknowledged that fraudulent emails were being sent to its citizens from official addresses. These emails claimed recipients had unpaid tolls and contained disguised links that redirected unsuspecting users to malicious websites.

The messages were strikingly convincing, bearing the hallmarks of legitimate government correspondence — including email addresses tied to Indiana’s Emergency Operations Center. But behind the official-looking interface lurked a phishing scam designed to collect sensitive personal and financial information.

Indiana Confirms Compromised Account, Denies System Breach

In a public statement, Indiana’s Office of Technology admitted that a third-party contractor’s account had been compromised and used to send the scam messages. While they asserted that “no current state systems” had been breached, the agency stopped short of ruling out a previous security lapse.

Interestingly, the state revealed that its contract with Granicus had officially ended in December 2024. However, the company allegedly failed to deactivate Indiana’s account — a misstep that may have left the door open for attackers.

Granicus, one of the largest providers of digital communication platforms for U.S. governments, confirmed that the breach stemmed from a compromised user account and not a direct hack of its systems. “We are aware of the recent malicious emails sent via GovDelivery from Indiana’s government domain,” said company spokesperson Sharon Rushen. She added that Granicus has the capability to determine how many users were affected, though the company has yet to release specific figures.

Fake Toll Notices: A Growing Threat

This isn’t an isolated incident. Similar scams have cropped up in other jurisdictions as well, including Doña Ana County in New Mexico. There, an official govdelivery.com address was used to send out emails masquerading as communications from a professional services firm — complete with links to fake payment portals.

According to cybersecurity analysts, the tactics align with a broader trend. In January, the Federal Trade Commission issued a warning about fake toll scams targeting U.S. residents through email and SMS. These scams claim the recipient owes unpaid road tolls and threaten penalties if they don’t act swiftly. By exploiting systems used by legitimate government entities, attackers increase the odds that victims will take the bait.

In the Indiana case, the email link appeared to redirect users to TxTag, the official toll system in Texas. However, users landed on a fraudulent site mimicking the look and feel of the real TxTag portal. The fake site requested names, addresses, phone numbers, and credit card information — all data that could be used for identity theft or financial fraud.

Granicus Faces Scrutiny Across States

Granicus, which serves hundreds of government clients, now faces mounting scrutiny over its security protocols. The company acknowledged an uptick in what it calls “targeted social engineering” attacks aimed at GovDelivery customers. These attacks appear to be part of a coordinated effort to exploit trust in government systems.

Doña Ana County’s IT director, Kent English, described the breach as a “system-wide issue affecting other government clients,” raising broader concerns about how secure communication tools are managed at the local and state level.

Cybersecurity Experts Urge Vigilance

Experts warn that government entities must bolster their defenses and act swiftly when contracts expire. “When systems used to distribute emergency alerts and public service messages are repurposed for scams, the stakes are extraordinarily high,” said Laura Klein, a cybersecurity analyst with the Digital Integrity Coalition. “Public trust erodes, and the consequences can be both financial and deeply personal.”

To protect themselves, residents are urged to verify any email that demands immediate action, particularly those involving financial transactions. Checking URLs carefully, looking for misspellings, and cross-referencing with official websites can help individuals avoid falling victim.

Conclusion: A Breach of Trust With Nationwide Implications

The misuse of GovDelivery to send scam messages has not only compromised the security of residents’ personal information but also shaken confidence in systems designed to keep the public informed and safe. As more details emerge, state and federal agencies must reassess how these platforms are managed, especially when contracts end or user credentials are no longer in active use.

This incident serves as a stark reminder: in an age of increasing digital threats, even trusted government systems are not immune — and vigilance remains the first line of defense.


Disclaimer:
This article is for informational purposes only. While every effort has been made to verify the information presented, readers should refer to official government communications for the latest updates regarding the GovDelivery breach.


source :   tech crunch

Leave a Reply

Your email address will not be published. Required fields are marked *