
Smashing Security The hack that brought back the zombie apocalypse
16 snips
Nov 27, 2025 Dan Raywood, a seasoned cybersecurity journalist with 17 years of experience, dives into the eerie world of broadcast hacks. He highlights how unsecured systems allowed hackers to hijack emergency alerts, replacing gospel messages with explicit furry content. The conversation also touches on a recent insider threat at CrowdStrike, raising questions about both intentional and coerced breaches. Plus, a nostalgic nod to the Max Headroom incident and the struggles broadcasters face in prioritizing security adds a fascinating layer to their discussion.
AI Snips
Chapters
Books
Transcript
Episode notes
2013 Zombie Alert Broadcasting Hack
- In 2013 hackers hijacked TV and radio broadcasts to play fake Emergency Alert System messages about a zombie apocalypse.
- The attackers used default passwords published in device manuals to gain access and trigger panic.
Furry Podcast Replaced Radio Shows
- In 2016 multiple stations had their Barricade STL devices hijacked and aired an explicit furry podcast instead of regular shows.
- Broadcasters admitted they had not set passwords on those devices, enabling the intrusion.
Shodan Keeps Old Broadcast Holes Visible
- Many broadcast devices remain exposed because their IPs are indexed by Shodan, making them easy to find.
- Default credentials and public device manuals keep enabling the same class of attacks over years.

