How to Protect Barix Audio Codecs from Radio Broadcast Hijacking
Manage episode 517473102 series 3654641
Radio stations across America are getting hacked through vulnerable Barix audio codecs, and your station could be next. In September 2025, hackers hijacked KPOG in Des Moines and KRLL in Missouri during Labor Day weekend, broadcasting explicit content and fake Emergency Alert System messages. Over 600 Barix Instreamer and Exstreamer devices remain exposed on the public internet, discoverable through Shodan searches by anyone with basic technical knowledge.
This episode breaks down exactly how these Barix STL (studio-to-transmitter link) hijacking attacks work, why legacy broadcast equipment remains vulnerable despite years of warnings, and most importantly—how to protect your radio station's audio codecs from exploitation.
Learn the critical security measures every broadcast engineer needs to implement, including VPN tunnel deployment, proper firewall configuration, and alternative security approaches when full VPN implementation isn't immediately feasible. Hear directly from industry experts like Fletcher Pride (Family First Radio Network), Shane Toven (Frandsen Media), and Barix founder Johannes Rietschel about preventing codec hijacking.
Whether you're running a small-market station with limited IT resources or managing broadcast infrastructure for multiple facilities, this episode provides actionable cybersecurity strategies to keep your Barix equipment secure and your station protected from internet-based attacks.
Topics covered: Barix Instreamer/Exstreamer security, Shodan vulnerability scanning, VPN tunneling for broadcast equipment, STL link protection, port forwarding risks, emergency alert system security, and IoT device hardening for radio stations.
Send me a text message with your thoughts, questions, or feedback
If you enjoyed the show, be sure to follow The Tyler Woodward Project and leave a rating and review on Apple Podcasts or your favorite podcast app—it really helps more people discover the show.
Instagram: @tylerwoodward.me
Threads: @tylerwoodward.me
Bluesky: @tylerwoodward.me
⚠️ All views and opinions expressed in this show are solely those of the creator and do not represent or reflect the views, policies, or positions of any employer, organization, or professional affiliation.
Chapters
1. Holiday Hijack Case Studies (00:00:00)
2. What Audio Codecs Actually Do (00:03:05)
3. Shodan, Defaults, And Easy Targets (00:06:40)
4. Why VPNs Are Non‑Negotiable (00:10:50)
5. Interim Fixes And Jump Box Tactics (00:14:20)
6. Hardening Steps That Matter (00:18:20)
7. The EAS Trust Problem (00:21:10)
39 episodes