Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Tyler Woodward. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Tyler Woodward or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

How to Protect Barix Audio Codecs from Radio Broadcast Hijacking

20:02
 
Share
 

Manage episode 517473102 series 3654641
Content provided by Tyler Woodward. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Tyler Woodward or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

Radio stations across America are getting hacked through vulnerable Barix audio codecs, and your station could be next. In September 2025, hackers hijacked KPOG in Des Moines and KRLL in Missouri during Labor Day weekend, broadcasting explicit content and fake Emergency Alert System messages. Over 600 Barix Instreamer and Exstreamer devices remain exposed on the public internet, discoverable through Shodan searches by anyone with basic technical knowledge.

This episode breaks down exactly how these Barix STL (studio-to-transmitter link) hijacking attacks work, why legacy broadcast equipment remains vulnerable despite years of warnings, and most importantly—how to protect your radio station's audio codecs from exploitation.

Learn the critical security measures every broadcast engineer needs to implement, including VPN tunnel deployment, proper firewall configuration, and alternative security approaches when full VPN implementation isn't immediately feasible. Hear directly from industry experts like Fletcher Pride (Family First Radio Network), Shane Toven (Frandsen Media), and Barix founder Johannes Rietschel about preventing codec hijacking.

Whether you're running a small-market station with limited IT resources or managing broadcast infrastructure for multiple facilities, this episode provides actionable cybersecurity strategies to keep your Barix equipment secure and your station protected from internet-based attacks.

Topics covered: Barix Instreamer/Exstreamer security, Shodan vulnerability scanning, VPN tunneling for broadcast equipment, STL link protection, port forwarding risks, emergency alert system security, and IoT device hardening for radio stations.

Send me a text message with your thoughts, questions, or feedback

Support the show

If you enjoyed the show, be sure to follow The Tyler Woodward Project and leave a rating and review on Apple Podcasts or your favorite podcast app—it really helps more people discover the show.

Instagram: @tylerwoodward.me

Threads: @tylerwoodward.me

Bluesky: @tylerwoodward.me

⚠️ All views and opinions expressed in this show are solely those of the creator and do not represent or reflect the views, policies, or positions of any employer, organization, or professional affiliation.

  continue reading

Chapters

1. Holiday Hijack Case Studies (00:00:00)

2. What Audio Codecs Actually Do (00:03:05)

3. Shodan, Defaults, And Easy Targets (00:06:40)

4. Why VPNs Are Non‑Negotiable (00:10:50)

5. Interim Fixes And Jump Box Tactics (00:14:20)

6. Hardening Steps That Matter (00:18:20)

7. The EAS Trust Problem (00:21:10)

39 episodes

Artwork
iconShare
 
Manage episode 517473102 series 3654641
Content provided by Tyler Woodward. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Tyler Woodward or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

Radio stations across America are getting hacked through vulnerable Barix audio codecs, and your station could be next. In September 2025, hackers hijacked KPOG in Des Moines and KRLL in Missouri during Labor Day weekend, broadcasting explicit content and fake Emergency Alert System messages. Over 600 Barix Instreamer and Exstreamer devices remain exposed on the public internet, discoverable through Shodan searches by anyone with basic technical knowledge.

This episode breaks down exactly how these Barix STL (studio-to-transmitter link) hijacking attacks work, why legacy broadcast equipment remains vulnerable despite years of warnings, and most importantly—how to protect your radio station's audio codecs from exploitation.

Learn the critical security measures every broadcast engineer needs to implement, including VPN tunnel deployment, proper firewall configuration, and alternative security approaches when full VPN implementation isn't immediately feasible. Hear directly from industry experts like Fletcher Pride (Family First Radio Network), Shane Toven (Frandsen Media), and Barix founder Johannes Rietschel about preventing codec hijacking.

Whether you're running a small-market station with limited IT resources or managing broadcast infrastructure for multiple facilities, this episode provides actionable cybersecurity strategies to keep your Barix equipment secure and your station protected from internet-based attacks.

Topics covered: Barix Instreamer/Exstreamer security, Shodan vulnerability scanning, VPN tunneling for broadcast equipment, STL link protection, port forwarding risks, emergency alert system security, and IoT device hardening for radio stations.

Send me a text message with your thoughts, questions, or feedback

Support the show

If you enjoyed the show, be sure to follow The Tyler Woodward Project and leave a rating and review on Apple Podcasts or your favorite podcast app—it really helps more people discover the show.

Instagram: @tylerwoodward.me

Threads: @tylerwoodward.me

Bluesky: @tylerwoodward.me

⚠️ All views and opinions expressed in this show are solely those of the creator and do not represent or reflect the views, policies, or positions of any employer, organization, or professional affiliation.

  continue reading

Chapters

1. Holiday Hijack Case Studies (00:00:00)

2. What Audio Codecs Actually Do (00:03:05)

3. Shodan, Defaults, And Easy Targets (00:06:40)

4. Why VPNs Are Non‑Negotiable (00:10:50)

5. Interim Fixes And Jump Box Tactics (00:14:20)

6. Hardening Steps That Matter (00:18:20)

7. The EAS Trust Problem (00:21:10)

39 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play