• Thanks for stopping by. Logging in to a registered account will remove all generic ads. Please reach out with any questions or concerns.

Hackers can easily breach Emergency Alert Systems

cupper

Army.ca Veteran
Inactive
Reaction score
4
Points
430
Hackers can easily breach Emergency Alert Systems

http://news.cnet.com/8301-1009_3-57569322-83/hackers-can-easily-breach-emergency-alert-systems/

Security researchers warn that many emergency alert system devices used by radio and TV stations are susceptible to cyberattacks, which could cause widespread panic.


Hackers broke into several television stations' Emergency Alert Systems this week and broadcast that zombies were "rising from their graves" and "attacking the living."

While a comical hoax, security consultancy firm IOActive warns that this type of behavior is dangerous and not that hard for hackers to do, according to Computerworld. This week it's zombies, but next time it could be something that might make people really panic, such as an anthrax or terrorist attack.

IOActive says that devices used by TV and radio stations to air emergency alerts have critical vulnerabilities that make them susceptible to cyberattacks. If these devices are breached, hackers could feasibly broadcast anything they like to millions of viewers and listeners.

"We found some devices directly connected to the Internet and we think that it's possible that hackers are currently exploiting some of these vulnerabilities or some other flaws," chief technology officer of IOActive Cesar Cerrudo told Computerworld.

Cerrudo says that at least two types of Emergency Alert System devices are especially vulnerable to attacks. "We contacted CERT [U.S. Computer Emergency Readiness Team] almost a month ago and CERT is coordinating with the vendor to get the issues fixed," he said.

The hacker that got into the television stations' systems for the zombie hoax reportedly used a "back door" attack.

"It has been determined that a 'back door' attack allowed the hacker to access the security of the EAS equipment," station manager for ABC 10, one of the stations affected, Cynthia Thompson wrote in a blog post. "The nature of the message Monday night was not necessarily dangerous, but the fact that the system was vulnerable to outside intrusion is a danger."
 
I would argue anything that is plugged into the internet is susceptible to hackers no matter who and what kind of systems you have in place.  It's a game of brain versus brain, and the smarter of the two wins.  All the programmer who wants to keep people out of their computer systems needs to do is make a simple mistake and overlook, miss estimate a variable and there you have it, a entry a point for a hacker.

A real life example is Microsoft,  the company spends 100's of million of dollars on a new copy of windows, employees 97,000 personal at a all levels in the company.  Write several thousand builds of the new operating system.  Then Microsoft releases Alpha and Beta versions of the new software as a trial run.  Take the feed back make the required fixes, then they build several more polished potentials for commercial sales called release candidates.

After all that investment in design and security.  There software is always hacked with in a couple of days and sometimes while it is still in the Beta (pre-commercial) phase.

The reason being? There is always a countless number of potential holes.  Microsoft has never been able to plug them all and they been trying too.  For decades.
 
Back
Top