Skip to content

Oklahoma's Cleveland County Sheriff's Office hit by ransomware

County says internal systems affected but 911 and patrol services remain fully operational

Front view of the Cleveland County Courthouse in Norman, Oklahoma, on a clear summer day.
The Cleveland County Courthouse in Norman, Oklahoma. (Photo by Michael Barera, CC BY-SA 4.0.)
Published:

The Cleveland County Sheriff's Office in Oklahoma says a ransomware attack hit parts of its internal computer system but did not disrupt 911 service, deputy response or other public safety operations.

The sheriff's office said it was "recently impacted" by the attack, which affects portions of its internal system, in a brief statement shared with local media and in a Facebook post.

In the public notice, the office said it was sharing the incident proactively to keep residents informed and limit rumors while the investigation continues.

County information technology staff are leading the response and working to restore affected systems while the sheriff's office assesses the scope of the attack.

Officials have not said when systems might be fully restored, whether any sensitive records were accessed or whether a ransom demand has been made.

The sheriff's office says public safety services have not been interrupted. Deputies continue responding to calls, 911 remains fully operational and daily operations continue.

Officials did not specify which internal systems were affected, describing the disruption only as involving "parts of our internal computer system." The Facebook notice said public-facing services are continuing without disruption and that public safety remains the office's top priority.

No impact has been reported to countywide 911 dispatch, detention operations or court schedules, and the county has not announced any service changes for residents.

The sheriff's office says the county IT department is "actively working to resolve the issue" and that the scope of the incident is still being assessed.

The office has not announced any data breach notifications, and there is no public indication that personal information or law enforcement records have been confirmed compromised.

Officials say they will share updates as more information becomes available. Residents are being told to continue calling 911 for emergencies and to use normal nonemergency channels for routine matters.

Cleveland County, part of the Oklahoma City metropolitan area, is Oklahoma's third-most populous county, with about 296,000 residents and Norman as its county seat.

This is at least the second Oklahoma sheriff's office this year to report a ransomware incident. In June, the Payne County Sheriff's Office confirmed a ransomware attack on its internal IT systems and urged anyone who filed a report before mid-May to monitor financial accounts after a gang calling itself SafePay claimed to have stolen data.

Oklahoma has seen a string of cyber incidents in 2025, including a ransomware attack on the city of Durant that disrupted services, a breach at Bartlesville Public Schools that postponed state testing, a second ransomware attack on Braum’s Ice Cream and Dairy Stores that disrupted operations across its locations, and a cyber incident under investigation at the University of Oklahoma that prompted the isolation of some IT systems. Public safety networks have also been targeted at the 911 level: in 2024, the Muskogee City-County Enhanced 911 Trust Authority reported a ransomware attack and later notified about 180,000 people that their health information may have been exposed after cybercriminals accessed its systems for several months.

For now, Cleveland County officials have not reported any impact on public safety. Residents are being urged to use 911 for emergencies and watch official channels for further updates from the sheriff's office and county government.

DysruptionHub Staff

DysruptionHub Staff

A collaborative project to bring you the latest cyberattacks impacting the availability of services and goods in the United States.

All articles

More in Government

See all

More from DysruptionHub Staff

See all