top of page

Subscribe to our newsletter

Enhancing Cybersecurity Resilience in the Broadcasting Industry: Addressing Vulnerabilities in Interconnected Systems

CVE Image for report on Broadcasting Industry Cybersecurity Report

Executive Summary

The broadcasting industry, a critical pillar in the dissemination of information, is increasingly under siege from sophisticated cyber threats. This report highlights the vulnerabilities faced by broadcasters, focusing on notable incidents, threat actors, and mitigation strategies. The report underscores the importance of adopting international standards and fostering collaboration to enhance cybersecurity resilience.

Technical Information

The broadcasting sector's reliance on interconnected systems makes it a prime target for cyber attacks. The TV5Monde Attack in April 2015 serves as a stark reminder of the potential devastation. Orchestrated by APT28 (Fancy Bear), a group linked to Russian state actors, the attack utilized phishing techniques to infiltrate the broadcaster's infrastructure, resulting in damages exceeding USD 15 million. The incident underscores the need for robust phishing defenses and highlights the persistent threat posed by state-sponsored actors. More details can be found at Security Affairs.

In October 2019, the M6 Ransomware Attack disrupted operations of one of France's largest multimedia groups. This attack exemplifies the growing trend of ransomware being used to extort money from broadcasters. The attack vector involved encrypting critical data, rendering systems inoperable until a ransom was paid. The incident emphasizes the necessity for comprehensive backup strategies and incident response plans. Further information is available at IEC e-tech.

DDoS Attacks on broadcasters such as N1 TV and SVT have also been prevalent. These attacks, often linked to political motives, involve overwhelming broadcasting services with traffic, causing significant disruptions. The perpetrators include state actors and business interests, with some attacks subcontracted to operators in China. This highlights the need for robust network defenses and traffic monitoring solutions.

APT28 (Fancy Bear) is notorious for employing spear-phishing, zero-day exploits, and malware to compromise targets. Their involvement in high-profile attacks on media and government entities underscores the persistent threat they pose. More insights into their tactics can be found at CrowdStrike.

Exploitation in the Wild

Phishing and spear-phishing remain the primary methods used by APT28 to gain initial access to networks. These techniques involve crafting convincing emails to trick recipients into divulging credentials or downloading malicious attachments. Ransomware attacks are increasingly used to disrupt operations and extort money, with attackers often demanding payment in cryptocurrency to avoid detection. DDoS attacks are employed to overwhelm and disrupt broadcasting services, often linked to political motives.

APT Groups using this vulnerability

APT28 (Fancy Bear) is the primary group exploiting these vulnerabilities. They have been involved in numerous high-profile attacks on media and government entities, using a combination of spear-phishing, zero-day exploits, and malware to achieve their objectives.

Affected Product Versions

The vulnerabilities discussed affect a wide range of broadcasting systems and software. Specific product versions are not detailed in this report, but broadcasters are advised to conduct thorough assessments of their systems to identify potential vulnerabilities.

Workaround and Mitigation

To mitigate these threats, broadcasters should implement international standards such as the ISO/IEC 27000 Series, which provides a framework for IT service management and security, and the IEC 62443 Series, which addresses vulnerabilities in operational technology (OT) systems. More information on these standards can be found at ISO/IEC JTC 1/SC 27 and IEC 62443.

Industry recommendations, such as the NAB Guide to Broadcasting Cybersecurity and the WBU Cyber Security Recommendations, offer guidelines based on the NIST Cybersecurity Framework and focus on mitigating third-party and supply chain risks. Collaboration and information sharing among broadcasting unions and associations are crucial for developing cybersecurity recommendations and sharing threat intelligence.

References

Rescana is here for you

At Rescana, we understand the complexities of cybersecurity in the broadcasting industry. Our Continuous Threat and Exposure Management (CTEM) platform is designed to help you identify and mitigate vulnerabilities, ensuring your systems remain secure. We are committed to supporting you in navigating the ever-evolving threat landscape. Should you have any questions about this report or any other issue, please do not hesitate to contact us at ops@rescana.com.

bottom of page