TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

How France's TV5 was almost destroyed by hackers

118 pointsby dan1234over 8 years ago

10 comments

raitomover 8 years ago
Haha I remember this story. I haven&#x27;t fully read this article but do they mention that their passwords were shown during an interview? (source, in french: <a href="http:&#x2F;&#x2F;www.tuxboard.com&#x2F;tv5-monde-mots-de-passe-clair-interview&#x2F;" rel="nofollow">http:&#x2F;&#x2F;www.tuxboard.com&#x2F;tv5-monde-mots-de-passe-clair-interv...</a>)
评论 #12679023 未加载
davidf18over 8 years ago
I once worked as a consultant to a subsidiary of one of the larger Cybersecurity vendors.<p>Many institutions have weak cybersecurity including healthcare concerns. In this Fortune article about he Sony hack, the CEO said basically that they did not want to spend the money for Cybersecurity. <a href="http:&#x2F;&#x2F;fortune.com&#x2F;sony-hack-part-1&#x2F;" rel="nofollow">http:&#x2F;&#x2F;fortune.com&#x2F;sony-hack-part-1&#x2F;</a><p>Target and Lowe&#x27;s POS terminals were hacked because they were told to upgrade their software to a newer version of the OS and they didn&#x27;t do it. The CEO of Target was canned as a result.<p>Many firms and other institutions love the power of computing without spending the money and hiring the expertise needed to maintain the security. There are private security contractors that these groups can hire <i>to ensure that their environment is fully secure </i>.<p>In addition to financial audits, shareholders should insist on cyber security audits to ensure that the firm or institution is acting in a responsible manner.<p>Obviously acting in a responsible manner regarding Cybersecurity is not a guarantee, but many cases of hackers breaking in is because of not even making the attempt to be secure.
评论 #12680372 未加载
评论 #12681498 未加载
评论 #12683338 未加载
alvaover 8 years ago
Hijacking live broadcasts seems to be one of the ultimate hacker accomplishments. There is something about it that is far more disconcerting than just defacing a webpage. Seems like it would feel far more invasive, popping on your living room tv. Would love to know how much someone like the BBC spend on security, must be huge.<p>The most famous TV hack, Max Headroom [1] (NSFW), from what I recall involved overriding the terrestrial signal, presumably with very powerful broadcasting hardware. BBC are digital now, so I am surprised they haven&#x27;t had a successful incident yet.<p>[1] <a href="https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=tWdgAMYjYSs" rel="nofollow">https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=tWdgAMYjYSs</a>
评论 #12679607 未加载
joezydecoover 8 years ago
<i>&quot;Any substantial delay would have led satellite distribution channels to cancel their contracts, placing the entire company in jeopardy.&quot;</i><p>Can someone explain that a little more? Are satellite carriage contracts so twitchy that going dark on a channel for more than a few hours forfeits your service?
评论 #12678857 未加载
评论 #12678442 未加载
rasz_plover 8 years ago
&quot;The attackers used seven different points of entry. Not all of them were part of TV5Monde or in France. In one case, a company based in the Netherlands was targeted because it supplied the remote controlled cameras used in TV5&#x27;s studios.&quot;<p>= cameras with a backdoo^^^^cloud integration&#x2F;permanently connected to manufacturers server.
评论 #12682764 未加载
dredmorbiusover 8 years ago
I&#x27;d be really interested in seeing informed commentary on what is gained by this.<p>In general, crippling hacks aren&#x27;t terribly useful -- they&#x27;re embarassing and harmful to the targets, especially in shaking confidence. But they&#x27;re not particularly useful to a general attacker. Having insider access to a television or broadcast entity would itself be useful.<p>Other options might be to test (or prove) the capability to take a target down, particularly in preparation for other more advanced capabilities.<p>The more successful parasites don&#x27;t disable hosts, but hijack them to their own ends. That is something I&#x27;d find more troubling.<p>Online searches don&#x27;t show much at Schneier or other security-minded blogs. Am I missing something?<p>I did find a Friday Squid discussion: <a href="https:&#x2F;&#x2F;www.schneier.com&#x2F;blog&#x2F;archives&#x2F;2015&#x2F;04&#x2F;friday_squid_bl_473.html" rel="nofollow">https:&#x2F;&#x2F;www.schneier.com&#x2F;blog&#x2F;archives&#x2F;2015&#x2F;04&#x2F;friday_squid_...</a>
woliveirajrover 8 years ago
&gt; And that is indicative of a new trend: attacks with physical-world consequences.<p>In general, I think all attacks made against computers have physical world consequences. Time, money, disrupted services...
smoyerover 8 years ago
The cost is $3m per year for each year after the attack for extra protection ... I&#x27;d argue they were discounting their security posture by $3m every year before the attack.
TwoBitover 8 years ago
Im guessing they were targeted merely because they had poor security and random scanning found a gaping hole.
etieneover 8 years ago
Is no one paying attention to the fact that the guy is called Mr. Bigot? xD
评论 #12682775 未加载