Wednesday, February 13, 2013

Hackers Attack Emergency Alert System in the US

Inside Radio is reporting that hackers from outside the US have apparently hacked into what used to be called the Emergency Broadcast System. They certainly showed that getting this system to work is obviously not the priority of most radio and TV stations.  A station in Montana was one of several in the US that broadcast a Zombie attack warning.




I wonder if this will be blamed on Chinese hackers? Remember the New York times report a few days back? I think the blame needs to be shared with the station engineers who used default passwords on the EAS equipment. I'm guessing those behind the zombie prank are inside the US. Just listen to the voices.

For the last four months, Chinese hackers have persistently attacked The New York Times, infiltrating its computer systems and getting passwords for its reporters and other employees.

Readers’ Comments

Readers shared their thoughts on this article.
After surreptitiously tracking the intruders to study their movements and help erect better defenses to block them, The Times and computer security experts have expelled the attackers and kept them from breaking back in.
The timing of the attacks coincided with the reporting for a Times investigation, published online on Oct. 25, that found that the relatives of Wen Jiabao, China’s prime minister, had accumulated a fortune worth several billion dollars through business dealings.
Security experts hired by The Times to detect and block the computer attacks gathered digital evidence that Chinese hackers, using methods that some consultants have associated with the Chinese military in the past, breached The Times’s network. They broke into the e-mail accounts of its Shanghai bureau chief, David Barboza, who wrote the reports on Mr. Wen’s relatives, and Jim Yardley, The Times’s South Asia bureau chief in India, who previously worked as bureau chief in Beijing.
The rest of the story comes from Inside Radio


Hackers now targeted EAS across the US

The FCC, FBI and several state and local law enforcement agencies are investigating what now appears to have been a widespread hack attack on the Emergency Alert System. The full extent of the attack isn’t yet clear, but several HD2 stations aired a bogus message about zombies. Engineers say the hackers apparently had a solid working knowledge of EAS. Bonneville Director of engineering John Dehnel says the company’s Salt Lake City stations were one target.  While it never made it to news-talk KSL (1160) — the LP1 station for the area — or its sister KSL-TV, the bizarre message was broadcast on the cluster’s three HD2 stations.  Dehnel believes the culprit was EAS boxes that were left set to factory-installed default passwords to accommodate tech support crews.  “We left the default password in and frankly I forgot about it — my guess is you’ll find everyone still had the default password on it,” he says.
The Bonneville HD2 stations broadcast the bogus EAS messages about one hour before a Great Falls, MT television station that made headlines yesterday.  Several other stations also aired a fake EAS message, including TV stations in Albuquerque and Marquette, MI. A radio station in Los Angeles apparently thwarted its attack.  It’s possible other stations also broadcast the alert.
Following Monday’s breach of the Emergency Alert System, tech manufacturers are scrambling to make sure there are no open security windows in their equipment.  Monroe Electronics said its customers should change passwords and step up EAS’ security by putting the system behind a firewall.
Hours before their fake EAS activation, Dehnel says Bonneville has been able to piece together that someone outside the U.S. was “probing around” in the middle of the night on its Dasdec boxes.  Because of how the fake alert was created, such as using live codes, a duration time, and knowing how to send an audio cut, Dehnel is convinced the hackers know a lot about the inner-workings of EAS.  “A normal hacker hitting that thing would not know how to do that,” he says.
Rudman agrees. “It would require a little bit more expertise than the average hacker would have to do what appears to have happened,” he says.
Besides blatantly bogus messages about a “zombie attack,” the message also told listeners to tune to 920 AM which Dehnel believes shows it was written for a market other than Salt Lake City.  Bonneville has taken its box offline to preserve any data it may contain — data which could be used as evidence.  Besides violating FCC rules, the hacker could face federal criminal charges.

1 comment:

Always interested in constructive feedback.