In April 2016, media reports of audio hijacking at an FM radio station in the Colorado Rockies surfaced. The hostile takeover of the output heard by listeners involved unsecured Barix devices. The following January, a Spanish-language operation serving Nashville and several LPFMs in various markets Barix Exstreamer security lapses created another hijack. Most recently, default Barix logins at KFNC-FM “ESPN Houston 97.5” on November 23 couldn’t prevent the station’s signal from being hacked, with fake EAS tones airing in a loop along with a not-fit-for-broadcast Country song and mentions of now non-functioning social media channels.
Now, Barix has commented on the nearly decade-long attacks — which led the FCC’s Public Safety and Homeland Security Bureau on November 26 to remind broadcasters “to ensure they comply with best practices to prevent cyberattacks.”
In an email distributed to audio over IP users in the 9am hour, Central European Time, on Tuesday, the company founded by Chief Technology Officer Johannes Rietschel admitted, “The world has changed — and so has the internet. What once enabled unprecedented innovation and connectivity has now become a high-risk environment where unsecured devices are easy targets.”
Recent incidents have shown just how serious this can get, Barix acknowledged.
“Several radio transmitters were hijacked by unknown actors who injected inappropriate audio into the live program feed,” it said. “These attacks triggered an FCC investigation and ultimately led to an FCC Public Notice. In every case, the root cause was the same: STL receiver devices were exposed on the public internet with weak or no password protection for their web interface.”
How is Barix responding, given it is their products that were compromised?
“The message couldn’t be clearer — if you operate Barix devices with accessible Web based GUI directly on the internet without robust network security, it’s time to reconsider,” the company said.
Barix products such as RetailPlayer by Barix address network security as a system, it added. “However, when setting up devices with integrated web interfaces, then the network needs to be protected.”
The company then directed its customers to read “important guidance” from Rietschel — offered to Radio World on October 6, weeks prior to the KFNC on-air hijack.
Additionally, Barix believes “a possible solution for STL is the Reflector service” from Humboldt County, Calif.-headquartered Streamguys.
CYBER INTRUSIONS WARRANT FCC WARNING
The November 26 Public Notice from the FCC’s Public Safety and Homeland Security Bureau was issued in response “to the recent string of cyber intrusions against various radio broadcasters” that resulted in the broadcast of obscene materials and the misuse of the Emergency Alert System (EAS) Attention Signal.
In the past, false EAS tones aired by a radio or TV station — knowingly — generated huge proposed fines. However, these broadcasts did not originate from the station itself, and the recent hacks are not likely to result in proposed forfeitures to the owners of the stations involved.
As such, the PSHSB clearly understands that the hacks were caused by a compromised studio-transmitter link (STL)— the broadcast equipment that carries program content from the studio to remote transmitters—”with threat actors often accessing improperly secured Barix equipment and reconfiguring it to receive attacker-controlled audio in lieu of station programming.”
For its part, the FCC urged all broadcasters, “especially those using Barix equipment,” toinstall software security patches issued by the equipment manufacturer as soon as they become available, and upgrade equipment firmware and software to the most recent versions recommended by the manufacturer.
The FCC bureau also directed stations to change their devices’ default passwords and replace them with “robust alternatives,” and regularly change passwords to promote continued security.
Additionally, the Commission directed stations, “where reasonably feasible,” to install EAS, Barix, and other equipment interconnected to the broadcast signal processing system behind network firewalls, and utilize VPNs that are configured to limit remote management access to only authorized devices.
Lastly, the Commission recommended that stations continually monitor EAS equipment and software and review audit logs to detect and report incidents of unauthorized access, and review the list of recommended best practices to address potential data security vulnerabilities issued by the Communications Security, Reliability, and Interoperability Council in 2014.
“If you suspect that broadcast equipment has been subject to attempts at unauthorized access, we recommend you contact the equipment manufacturer and/or a data security firm,” the FCC urged.
The one key manufacturer involved has now spoken.
AN END TO A LONGTIME STAND
Meanwhile, Barix has attracted attention for a decision that impacts its presence at one of its most visible annual conferences and expos.
The annual Integrated Systems Europe (ISE) affair, held in early February in Barcelona, has long seen Barix invest in its biggest booth, resulting in its highest spending. This year, with better ROI and impact from North American trade shows fueling the decision, Barix will be forgoing a stand at ISE.
Instead, Barix CEO Reto Brader will be available for one-on-one meetings at the entrance of Hall 3 (Multi Technology). Barix explains, “We’ve had an excellent year. What we realized after ISE 2025 is that we mostly met people we already knew — just like you. So instead of spending time behind a booth, we decided that dedicated personal meetings during the event are a far more effective way to stay connected and to give you the focused updates you deserve. This change does not mean you’ll miss out on anything. You can still get a full update on what’s new at Barix, discuss ongoing or upcoming projects, and explore plans, products, and innovation topics firsthand.
At the NAB Show, Barix has been present with a small table on the expo floor; Barix ended its presence at IBC in Amsterdam, held each September, several years ago.



