{"id":11911,"date":"2016-04-21T09:00:17","date_gmt":"2016-04-21T13:00:17","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=11911"},"modified":"2019-11-15T06:57:38","modified_gmt":"2019-11-15T11:57:38","slug":"radio-furry-hack","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/radio-furry-hack\/11911\/","title":{"rendered":"What happens when criminals hack a radio station?"},"content":{"rendered":"<p>In the morning of April 5, 2016 a number of American radio stations treated their listeners to quite the unusual broadcast. Over the course of 90 minutes, the hosts discussed the the sexual subculture of furry fandom \u2013 an interest in humanlike characters from popular cartoons, comics and science fiction. Now, the station\u2019s employees weren\u2019t looking to shock their listeners, the station\u2019s equipment was hacked.<\/p>\n<p>In an hour and a half, citizens of some cities in Colorado and Texas became intimately acquainted with <a href=\"https:\/\/en.wikifur.com\/wiki\/Paradox_Wolf\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Paradox Wolf<\/a>, <a href=\"https:\/\/en.wikifur.com\/wiki\/Fayroe\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Fayroe<\/a> and their friends. These nicknames belong to the authors of <a href=\"https:\/\/en.wikifur.com\/wiki\/FurCast\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">FurCast \u2014 a fan webcast<\/a> created by two guys and a girl from New York. Their channel was never intended to be heard by the wide public, but the hackers didn\u2019t care.<\/p>\n<h3>How could it happen?<\/h3>\n<p>At least one of the shows on the stations were sent over the Internet from Denver to four remote transmitters. Of those, one was located in the city of Breckenridge, Colorado. It was this transmitter, <a href=\"http:\/\/www.fccbulletin.com\/callsign\/?q=k258as\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">K258AS<\/a>, that was hacked. The hacker replaced the intended program with <a href=\"https:\/\/en.wikifur.com\/wiki\/furcast\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Furcast<\/a> <a href=\"https:\/\/www.youtube.com\/watch?v=o6kg4smekms\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Episode 224<\/a>. Broadcast engineers could not regain control over transmitters remotely so <a href=\"http:\/\/alwaysmountaintime.com\/kift\/articles\/statement-todays-morning-broadcast\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">they had to leave Denver<\/a> and travel to the remote transmitter site, where they reprogrammed the system manually.<\/p>\n<p>During the hack the actual creators of FurCast detected an increase in connections to their podcast archive. This lasted several hours, and was turned off after the team discovered the problem on <a href=\"http:\/\/alwaysmountaintime.com\/kift\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">KIFT-FM<\/a> (Colorado) and <a href=\"http:\/\/www.kxaxradio.com\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">KXAX<\/a> (Texas) and temporarily disabled access to the database. The majority of the connections made had the user agent \u201cBarix Streaming Client.\u201d<\/p>\n<p>Barix is a popular manufacturer of audio streaming hardware and these devices were used by the hacked radio stations.<\/p>\n<p>Ars Technica reported, that the hackers had spent some time accumulating passwords. Barix translators support up to 24 symbols combinations, \u201cbut in at least two cases 6 character passwords were cracked.\u201d<\/p>\n<p>A number of those transmitters were also visible on <a href=\"https:\/\/www.kaspersky.com\/blog\/shodan-censys\/11430\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Shodan<\/a> \u2014 a search engine through the Internet of Things, which lets people find connected devices.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">What are <a href=\"https:\/\/twitter.com\/hashtag\/IoT?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#IoT<\/a> search engines Shodan and Censys and what are they capable of? We take a look: <a href=\"https:\/\/t.co\/mLszoMwAOv\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/mLszoMwAOv<\/a> <a href=\"https:\/\/t.co\/D0xCgt700n\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/D0xCgt700n<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/704403452181487616?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">February 29, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>The Furcast team blocked the IP addresses used by the hacked Barix transmitters and launched archives back online to the delight of their actual audience. Currently the Furcast team is working with law enforcement agencies to investigate this incident.<\/p>\n<p>Though only a few small radio stations broadcasted the podcast, the incident turned into a big stink. KIFT-FM alone received hundreds of calls and emails from alarmed listeners who demanded that no one at the station let it happen again.<\/p>\n<p>https:\/\/twitter.com\/dangeredwolf\/status\/718409169510998016<\/p>\n<p>Dan Cowen, KIFT Director of Programming, <a href=\"http:\/\/denver.cbslocal.com\/2016\/04\/05\/mountain-radio-station-signal-apparently-hacked\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">described<\/a> the radio employee\u2019s reaction as following: <em>\u201cAs horrified as our listeners were, believe me, we were a whole lot more horrified. It was a slow-motion car crash and it something where we really value \u2014 especially family \u2026 to have them wake up to this is beyond horrifying.\u201d<\/em><\/p>\n<p>While the <a href=\"http:\/\/www.bbc.co.uk\/news\/technology-35995893\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">BBC<\/a>, <a href=\"http:\/\/arstechnica.com\/security\/2016\/04\/nation-wide-radio-station-hack-airs-hours-of-vulgar-furry-sex-ramblings\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Ars Technica<\/a> and <a href=\"https:\/\/www.youtube.com\/watch?v=5Ab1sg7Pkfs\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">some TV channels<\/a> have already had some laughs covering the episode, it is in fact a serious incident. In the past stations have lost their broadcast licenses over similar situations.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/5Ab1sg7Pkfs?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<p>On February 11, 2013 a criminal <a href=\"https:\/\/en.wikipedia.org\/wiki\/Broadcast_signal_intrusion%23Television_signal_intrusions\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">hacked<\/a> <a href=\"http:\/\/en.wikipedia.org\/wiki\/Emergency_Alert_System\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Emergency Alert System<\/a> devices belonging to four American TV stations. These devices are designed to alert the public of local weather emergencies such as tornadoes and flash floods. The hooligan used the Emergency Alert System to tell the world about zombies rising from their graves and invading living districts (a clear reference to the Walking Dead series). The Federal Communication Commission found the stations liable for the broadcast intrusion as they did not protect their devices properly from unauthorized remote access.<\/p>\n<p>In 1987 Chicago TV stations also <a href=\"https:\/\/en.wikipedia.org\/wiki\/Max_Headroom_broadcast_signal_intrusion\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">suffered<\/a> from malicious actions but they were found to be not liable as there had been no actual hack: the culprit simply generated a more powerful signal at the same frequency.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>How hackers aired a #furry podcast on the radio, spoiling the morning for 100s of American families<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FBXj5&amp;text=How+hackers+aired+a+%23furry+podcast+on+the+radio%2C+spoiling+the+morning+for+100s+of+American+families\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>The impacted radio stations are responsible for the Furcast incident happening to a large extent. They had to use reliable passwords and protect their devices with the help of firewalls. It depends on the Federal Communication Commission if they are found to be liable or not.<\/p>\n<p>As for you and me, this incident once again reminds us <a href=\"https:\/\/www.kaspersky.com\/blog\/surviving-iot\/10480\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">how dangerous connected devices are<\/a> and why you <a href=\"https:\/\/www.kaspersky.com\/blog\/massive-webcam-breach\/6833\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">should not leave the default password on your newly-bought IP-camera<\/a>. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hackers took control over several USA FM stations\u2019 equipment and released a provocative podcast on the air.<\/p>\n","protected":false},"author":522,"featured_media":11913,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[1560,93,1562,1563,1564,78,187,485,1559,1561],"class_list":{"0":"post-11911","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-break","9":"tag-cybercriminals","10":"tag-furcast","11":"tag-furry","12":"tag-furry-fetish","13":"tag-hackers","14":"tag-passwords","15":"tag-podcast","16":"tag-radio","17":"tag-radio-stations"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/radio-furry-hack\/11911\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/radio-furry-hack\/7053\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/radio-furry-hack\/7087\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/radio-furry-hack\/7024\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/radio-furry-hack\/8182\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/radio-furry-hack\/8031\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/radio-furry-hack\/11702\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/radio-furry-hack\/5561\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/radio-furry-hack\/6208\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/radio-furry-hack\/7486\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/radio-furry-hack\/11120\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/radio-furry-hack\/11702\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/radio-furry-hack\/11911\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/radio-furry-hack\/11911\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/break\/","name":"break"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/11911","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/522"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=11911"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/11911\/revisions"}],"predecessor-version":[{"id":30284,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/11911\/revisions\/30284"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/11913"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=11911"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=11911"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=11911"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}