Listeners to at least three radio stations and one (unidentified) radio network got quite an earful last week when their programming was hijacked by an unknown hacker. The intruder, who used a search engine of internet-connected devices to find unprotected audio transfer equipment in radio stations/networks’ airchains, was able to compromise several of them because the targeted stations/networks either never changed the equipment’s default password, or they used a weak password that was easily bypassed.
The hacked stations all broadcast episodes of a comedy podcast devoted to furries, a subculture of people who like to dress up (and oftentimes, have sex) in animal costumery. “FurCast” is defintiely not-safe-for-work material, and the stations spent more than an hour airing them. According to the podcast’s producers, they noted a spike of “hundreds of connections” in podcast-download traffic last week, all of which were coming from hacked radio stations/networks, and were able to cut off the OTA simulcasts by changing the IP address from which podcast downloads originate. Continue reading “When Will They Learn: Several Radio Stations + One Network Hijacked”
Tag: hack
DAB: A Hacking Vector?
U.S. news media went bonkers a couple of weeks ago when information security researchers, in conjunction with a journalist from Wired, demonstrated how they could remotely access a Jeep Cherokee and take control of various functions, including its engine, steering, and braking. The hack exploits the fact that many cars and trucks today interface with the Internet in some fashion, either directly or via other devices that connect to them (like a smartphone).
That hack targets vehicles on a one-to-one basis, and it is not the first of its kind. But what if you could broadcast an exploit to multiple vehicles at once? Turns out this is possible, too. Researchers in the U.K. say they can transmit code within a DAB digital radio signal that provides control of critical vehicle systems. Continue reading “DAB: A Hacking Vector?”
Radio Stations Fall Victim to Cyberattack (Again)
Several radio stations in small markets throughout the United States are licking their wounds after suffering cyber-intrusions.
The alarm was first sounded by a cluster of radio stations in Louisiana on October 16. When the morning crews arrived, they found they had no access to the stations’ automation systems or music libraries. Instead, the data on their computers had been encrypted and frozen…and then they began to receive e-mails asking them to pay hundreds of dollars in order to set their machines free.
The stations’ owner reports that instead of paying the ransom demand, they’ve reported the intrusions to the police and plan to rebuild their systems from scratch. It will cost “tens of thousands of dollars” to undo the damage that the malicious software has inflicted, and they apparently keep finding more compromises as they continue their damage assessment.
Then last week, stations in Arkansas and Virginia announced that they, too had been infected by software that scrambled several of their computer systems and demanded payment to restore them. And this week, a cluster of stations in Michigan belatedly reported that they suffered the same sort of attack in September. Continue reading “Radio Stations Fall Victim to Cyberattack (Again)”
Hacking the Dial
In the wake of stepped-up enforcement efforts by the FCC and a move by the radio industry to quash new legal community radio stations, microradio activists are thinking of embracing strategies to broadcast that go beyond setting up their own stations.
This fall in Green Bay, someone hijacked the local public radio affiliate by breaking into its transmitter building, splicing a cheap CD player into the air chain and hitting “play.”
Though technically daunting and physically risky, the “station hijacker” was able to broadcast death metal for several hours before someone from the station noticed. Continue reading “Hacking the Dial”