[EAS] [BC] EAS Zombie Attack

Barry Mishkind barry at oldradio.com
Wed Feb 13 13:06:34 CST 2013


At 10:59 AM 2/13/2013, Dave Kline wrote:
>I am posting this to the three reflectors that I monitor about EAS stuff.
>I hope that is OK with everyone.
>
>With the start of the whole Zombie EAS incident, I have been reading a lot of people's suggestions about what to do to beef up security.
>I admittedly do not know a lot about this stuff. (Root Admin? vs GUI admin?) (Roots vs Shoots?) and a lot of other deep knowledge buzzwords.
>The point being that if someone has solutions to some of this, could you share what you are doing rather than just say you're doing it.

        Dave, 
        I hear your pain. The flood of emails over the past two days
        has been quite difficult to parse - and segregate the good
        information from the speculation and rumors.

        That is why I've been trying to keep the EAS Page at 
        the BDR updated: www.theBDR.net/articles/fcc/eas/eas.html
        (It also keeps me from having to retype all this over and over.)

        For the overwhelming vast majority of stations, there is *no need* to panic.

        The investigation into the event continues - and more is known,
        but the focus is often on the wrong place.

        First - the event was not an EAS box "hack"  ... all of the
        EAS boxes that were used in the zombie alerts were
        either sitting naked on the Internet - no firewall - or
        an improperly provisioned firewall.

        The intruder was only able to access the EAS system
        (it appears that was their intent - no other parts of
        any station's network appears compromised such as 
        transmitter remote control, console control, etc), because:
        1. There was no effective firewall at the station
        2. The original default password was still in place, 
                despite manufacturers' instructions to change them.  
                (Other instructions are to change them regularly.)

        Among the reasons the broadcast community got very 
        anxious yesterday was that:
        1. The attacks followed an 11 hour outage of the IPAWS OPEN server
        2. The attacks followed a threat by "Anonymous" to disrupt the President's speech on the Internet
        3. The late in the day advisory from the FCC
        4. The obvious issues if the EAS is easily attacked, especially at stations that automatically relay CEM or LAE.

        According to information I have developed quite a few agencies - those with
        letters - are investigating various aspects of what happened.
        More information will come out, in due course.

        Key point:  It is not only EAS, but your whole company that should
        be protected by an appropriate firewall.  This is especially
        true for LP1 and LP2 sites, that could cause a casade of
        false alerts.  This is not something "end of the line" stations can do,
        but should be an SECC and LECC topic - and *certainly* will be 
        an FCC and FEMA topic in upcoming weeks.

        While it is true that we went some 16 years with little in the
        way of EAS pranks like this, we are in a different time, a different
        world, so to speak.  It is time to be careful. Most are.

        Again, it appears this was a targeted attack - otherwise why 
        was nothing else at these stations attacked?

        So ... ratchet the alert level down a bit. More information will
        come out.  I specifically plan some direct firewall information
        in the next few days on the BDR.

        Stay tuned.

        

        

  



More information about the EAS mailing list