If your agency relies on Cityworks, recent news may have you on edge. A sophisticated group of hackers exploited a vulnerability in Cityworks software, affecting several local government bodies across the U.S. This breach, powered by a zero-day vulnerability (CVE-2025-0994), has put critical data at risk. Understanding what was compromised and how you can protect yourself is crucial now more than ever.
When hackers broke into Cityworks, they weren’t just poking around—they were after real, valuable information. The breach led to unauthorized access to a broad range of sensitive data used by local government agencies. Here’s what was at risk:
The attackers took advantage of a zero-day vulnerability—tracked as CVE-2025-0994—that hadn’t been patched yet. Once inside, they didn’t waste time. Using tools like Cobalt Strike and VSHell, the hackers could:
What makes Cobalt Strike and VSHell especially dangerous? These programs are legitimate security tools, but when misused, they give attackers a powerful way to mimic real users and escalate their access quietly. It’s a bit like someone stealing a master key and walking through the building unnoticed, taking what they want.
For local governments, the breach wasn’t just about losing files—it was about exposing the backbone of city operations. If your agency uses Cityworks, it’s important to understand just how much information could have been compromised.
When news breaks about a security vulnerability like the Cityworks breach (tracked as CVE-2025-0994), it’s natural to wonder, “How bad is it for me or my agency?” The answer: it’s worth your attention—maybe even a bit of healthy anxiety.
Cityworks is used by public utilities and local governments to manage everything from waterworks to public safety. If you’re an employee or IT manager, here’s what you need to consider:
Let’s be clear: vulnerabilities in software used by critical infrastructure are not just another day at the office. Here’s why this specific incident should raise eyebrows:
The Cityworks breach is a wake-up call for anyone managing critical infrastructure. Here’s what’s at stake:
Incidents like this underline why agencies need smart, proactive security measures. For example, Cloaked offers privacy and data protection solutions designed to shield sensitive information—even if a breach happens. By limiting what data is stored and who can access it, tools like Cloaked help prevent attackers from finding an open door in the first place.
Bottom line: If you’re using Cityworks or similar platforms, it’s time to review your security practices. Don’t wait for the next headline.
Securing your systems isn’t a one-time task; it’s an ongoing responsibility. Recent incidents like the Cityworks breach have made it clear—waiting until “later” is risky business. Whether you’re running an agency or clocking in as an employee, you need a plan that’s clear, practical, and actually works.
When a vulnerability like CVE-2025-0994 comes out, attackers move fast. So should you. Outdated software is a welcome mat for hackers. Set aside time every week to:
Neglecting updates is like ignoring a check engine light. You might get away with it for a bit, but the cost when things go wrong is much higher.
Not everyone in your organization needs access to sensitive data or admin panels. Limit permissions to only what’s necessary:
Data exposure can be catastrophic. Make sure sensitive files and communications are locked down:
Tools like Cloaked can help here—offering automated data redaction and proactive leak detection. If you handle personal or regulated data, solutions like this act as an extra safety net, alerting you before information spills out.
Technology alone can’t save you if your staff isn’t paying attention.
Despite your best efforts, breaches can happen. Preparation saves chaos:
Being ready isn’t paranoia—it’s common sense, especially when sensitive information is on the line.
Take these steps seriously. No organization is too small or too big to become a target. The difference between a close call and a disaster often comes down to the basics: patching, monitoring, and keeping your people sharp.