North Carolina public radio station hit by ransomware attack

RadioInsight Community Forums Southeast Eastern North Carolina North Carolina public radio station hit by ransomware attack

The login box issue should be resolved. If you are still having issues you can still use the alternate link, but please inform us so we can investigate.

This topic contains 2 replies, has 2 voices, and was last updated by  Bill Recto 1 year, 6 months ago.

Viewing 3 posts - 1 through 3 (of 3 total)
  • Author
    Posts
  • #147827

    Bill Recto
    Participant

    Well WHQR-FM in Wilmington, N.C. is the target here of this computer break in

    #147839

    Bongwater
    Participant

    Radio stations and automation/production software need to stop using Windows OSs and move to Linux-based systems. It’s outright impossible to pull such an attack on an encrypted Linux system.

    The Windows system is STILL based on the compromised and antiquated old DOS system – that’s right, DOS is still very much alive and well in today’s Windows systems. It’s just harder to find, but it’s still there. The updated cores of the newer versions from XP on up to Windows 10 haven’t changed it. If it has a native C:\ prompt anywhere deep within the system base, it’s STILL DOS and the Windows architecture itself is still the same as always. Only the core (or kernel) of the Windows system itself is changed periodically, but that doesn’t change the architecture or the base. This is why viruses/malware/spyware and ransomware still thrive on Windows and are much harder to create for Mac and especially Linux systems because to alter a Mac/Linux system, it requires an entirely different set of protocols and the system file paths are completely different than Windows and on Linux, they can even vary on individual Linux computers depending on user preferences whereas Windows system file paths are exactly the same on every Windows computer. That alone stops ALL malicious software dead in it’s tracks because it doesn’t know where to go. The instructions in it’s source code say one thing, but on Linux systems, it’s faced with something it doesn’t know how to deal with and is rendered impotent. And with encrypted Linux, every file is a wall that needs to be authenticated every step of the way for a malicious attack (even if the file is just in the path of the intended target and not the target itself) and it’s just not worth it to your average Eastern European ransomware scammer. It’s just way too complicated when all they want is an easy and stealth takeover.

    https://www.youtube.com/watch?v=00sy6_jv7Lc

    #147843

    Bill Recto
    Participant
Viewing 3 posts - 1 through 3 (of 3 total)

You must be logged in to reply to this topic.

css.php