Reporting Cyber Incidents, Phishing, Malware or Vulnerabilities

U.S. Dept. of Homeland Security - CyberSecurity and Infrastructure Security Agency - Logo

The Cybersecurity and Infrastructure Security Agency (CISA) provides secure means for constituents and partners to report incidents, phishing attempts, malware, and vulnerabilities.

To submit a report, please select the appropriate method from below:

Incident Reporting Form: report incidents as defined by NIST Special Publication 800-61 Rev 2, to include

  • Attempts to gain unauthorized access to a system or its data,
  • Unwanted disruption or denial of service, or
  • Abuse or misuse of a system or data in violation of policy.

Federal incident notification guidelines, including definitions and reporting timeframes can be found at

Share indicators and defensive measures: submit cyber threat indicators and defensive measures with DHS and the Federal Government (includes sharing under the Cybersecurity Information Sharing Act of 2015).

Report phishing: an attempt by an individual or group to solicit personal information from unsuspecting users by employing social engineering techniques, typically via emails containing links to fraudulent websites.

Report malware: malicious code (e.g., viruses, worms, bots) that disrupts service, steals sensitive information, gains access to private computer systems, etc.

Report software vulnerabilities or ICS vulnerabilities: defects that allow an attacker to violate an explicit (or implicit) security policy to achieve some impact (or consequence). In particular, defects that allow intruders to gain increased levels of access or interfere with the normal operation of systems are vulnerabilities. Insecure configurations, design choices, and changing environmental conditions can also cause vulnerabilities.

Report vulnerabilities in U.S. Government websites: defects that may allow an attacker to violate a security policy to cause some impact or consequence, particularly those vulnerabilities that allow increased levels of access or the ability to interfere with the normal operation of the server or site.

Reporting to the FBI or Secret Service

Some forms of malicious computing activity (e.g. ransomware) can also be reported to your local FBI Field Office or U.S. Secret Service Field Office.