Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Threat Actors Exploit Calendar Subscriptions for Phishing and Malware

November 28, 2025

Fortinet Warns of New FortiWeb CVE-2025-58034 Vulnerability Exploited in the Wild

November 28, 2025

Three Black Friday Scams to Watch Out For This Year

November 28, 2025
Facebook X (Twitter) Instagram
Friday, November 28
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»FCC Warns of Hackers Hijacking Radio Equipment For False Alerts
News

FCC Warns of Hackers Hijacking Radio Equipment For False Alerts

Team-CWDBy Team-CWDNovember 27, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Hackers have been hijacking US radio transmission equipment to air bogus emergency tones and offensive material, according to a notice issued Wednesday by the US Federal Communications Commission (FCC).

The wave of intrusions triggered unauthorized uses of the Emergency Alert System’s distinctive Attention Signal, which is normally reserved for tornadoes, hurricanes, earthquakes and other urgent threats.

In particular, threat actors appeared to target Barix network audio devices and reconfigure them to capture attacker-controlled streams instead of regular programming.

Several stations in Texas and Virginia were affected, with broadcasts interrupted by simulated alert tones, the Attention Signal and obscene language.

Read more on emergency alert systems: Cyber-Attack Disrupts OnSolve CodeRED Emergency Notification System

The FCC said these incidents were tied to unsecured equipment that allowed unauthorized users to access transmission paths between studios and remote towers. Some stations learned of the compromise only after listeners reported unexpected emergency tones layered with bigoted or otherwise inappropriate content.

Recommended Steps For Broadcasters

In its notice, DA 25-996, the FCC urged stations to strengthen basic safeguards.

It asked broadcasters, particularly those operating Barix hardware, to:

  • Install manufacturer-issued security patches and upgrade firmware

  • Replace default passwords with robust alternatives and rotate them regularly

  • Place EAS and Barix devices behind firewalls and use VPNs restricted to authorized systems

  • Monitor equipment logs to spot unauthorized access

  • Review best practices previously published by the Communications Security, Reliability and Interoperability Council (CSRIC)

Some of these recommendations echo measures raised in 2016 when, at the time, Barix said its devices are secure “when set up correctly and protected with a strong password.”

The FCC encouraged broadcasters to contact equipment manufacturers if they suspect tampering. Stations experiencing unusual activity should alert the FCC Operations Center and file reports with the FBI’s Internet Crime Complaint Center.

While no broader disruptions have been reported, the FCC emphasized that proper configuration and routine maintenance remain essential as attackers continue to probe broadcast infrastructure nationwide.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleResearchers Detail Tuoni C2’s Role in an Attempted 2025 Real-Estate Cyber Intrusion
Next Article Learn How Leading Companies Secure Cloud Workloads and Infrastructure at Scale
Team-CWD
  • Website

Related Posts

News

Threat Actors Exploit Calendar Subscriptions for Phishing and Malware

November 28, 2025
News

Fortinet Warns of New FortiWeb CVE-2025-58034 Vulnerability Exploited in the Wild

November 28, 2025
News

Three Black Friday Scams to Watch Out For This Year

November 28, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest News

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views

The risks of unsupported IoT tech

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views
Our Picks

Watch out for SVG files booby-trapped with malware

September 22, 2025

Look out for phony verification pages spreading malware

September 14, 2025

Find your weak spots before attackers do

November 21, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2025 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.