Smashing Security

The hack that brought back the zombie apocalypse

16 snips
Nov 27, 2025
Dan Raywood, a seasoned cybersecurity journalist with 17 years of experience, dives into the eerie world of broadcast hacks. He highlights how unsecured systems allowed hackers to hijack emergency alerts, replacing gospel messages with explicit furry content. The conversation also touches on a recent insider threat at CrowdStrike, raising questions about both intentional and coerced breaches. Plus, a nostalgic nod to the Max Headroom incident and the struggles broadcasters face in prioritizing security adds a fascinating layer to their discussion.
Ask episode
AI Snips
Chapters
Books
Transcript
Episode notes
ANECDOTE

2013 Zombie Alert Broadcasting Hack

  • In 2013 hackers hijacked TV and radio broadcasts to play fake Emergency Alert System messages about a zombie apocalypse.
  • The attackers used default passwords published in device manuals to gain access and trigger panic.
ANECDOTE

Furry Podcast Replaced Radio Shows

  • In 2016 multiple stations had their Barricade STL devices hijacked and aired an explicit furry podcast instead of regular shows.
  • Broadcasters admitted they had not set passwords on those devices, enabling the intrusion.
INSIGHT

Shodan Keeps Old Broadcast Holes Visible

  • Many broadcast devices remain exposed because their IPs are indexed by Shodan, making them easy to find.
  • Default credentials and public device manuals keep enabling the same class of attacks over years.
Get the Snipd Podcast app to discover more snips from this episode
Get the app