Cybersecurity News Hub
No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us
No Result
View All Result
Cybersecurity News Hub
No Result
View All Result
Home Cyber Security

Hack halts Dutch broadcaster, forcing radio hosts back to LPs

Cyberinchief by Cyberinchief
November 10, 2025
Reading Time: 2 mins read
0
Hack halts Dutch broadcaster, forcing radio hosts back to LPs


RELATED POSTS

How Russia’s Largest Private University is Linked to a $25M Essay Mill – Krebs on Security

Malicious Go Packages Impersonate Google’s UUID Library to Steal Sensitive Data

Warning: React2Shell vulnerability already being exploited by threat actors

A Dutch TV and radio broadcaster has found itself at the mercy of cybercriminals after suffering a cyber attack, and leaving it scrambling to find ways to play music to its listeners.

RTV Noord, which provides TV and radio programming in the northern province of Groningen in the Netherlands, discovered it had been hacked on November 6, 2025.

On Thursday morning, staff on the “De Ochtendploeg” breakfast show discovered their access to computer systems was blocked, forcing them to resort to manually playing CDs, and even putting LP vinyl records on a turntable to keep listeners entertained.

By the following morning, the broadcaster had begun publishing updates on its news website and app again – for “extremely major news” at least.

Although the precise nature of the hack against RTV Noord has not been disclosed, it would be a brave person who bet against it being a ransomware attack.

RTV Noord confirmed that the attackers left a message on its network, though it has not been made public.

Buy JNews
ADVERTISEMENT

Given the disruption and the trend in similar incidents, the obvious suspicion is that this was a ransom note demanding payment for decryption or to prevent stolen data being leaked.

That being said, it’s always possible that whoever has compromised the broadcaster has not done so with a financial motivation. In the past, for instance, there have been TV and radio stations that have found themselves hacked for political reasons.

Regardless of motive, hacking a broadcaster can have serious repercussions which go beyond the financial. RTV Noord is not just providing television and radio services to the local population – it also acts as an official emergency broadcaster that provides information to citizens in the event of a disaster or crisis.

In a brief statement, RTV Noord said that its newsroom could only be “reached via WhatsApp” — a clear indication that internal communications systems were either inaccessible or untrustworthy during the incident.

Coincidentally – or perhaps not – the attack on RTV Noord became public on the same day that the Rhysida ransomware gang claimed responsibility for an attack on Spanish radio station KISS-FM, offering its stolen data for approximately US $300,000 worth of Bitcoin.

Broadcasters like RTV Noord have increasingly become targeted by cybercriminals hoping to amplify their notoriety. In past years similar attacks have managed to impact many other stations, sometimes even knocking programmes off the airwaves, or broadcasting bogus warnings about missile strikes.

Broadcast infrastructure is both public-facing and time-critical. Even short-term disruption is reputationally damaging and can cascade into real-world harm, especially when broadcasters have emergency notification responsibilities. And that’s exactly the kind of leverage that a ransomware group loves to have at its disposal.



Source link

Tags: broadcasterDutchforcinghackhaltshostsLPsradio
ShareTweetPin
Cyberinchief

Cyberinchief

Related Posts

How Russia’s Largest Private University is Linked to a $25M Essay Mill – Krebs on Security
Cyber Security

How Russia’s Largest Private University is Linked to a $25M Essay Mill – Krebs on Security

December 8, 2025
Malicious Go Packages Impersonate Google’s UUID Library to Steal Sensitive Data
Cyber Security

Malicious Go Packages Impersonate Google’s UUID Library to Steal Sensitive Data

December 8, 2025
Warning: React2Shell vulnerability already being exploited by threat actors
Cyber Security

Warning: React2Shell vulnerability already being exploited by threat actors

December 7, 2025
News brief: RCE flaws persist as top cybersecurity threat
Cyber Security

News brief: RCE flaws persist as top cybersecurity threat

December 7, 2025
Barts Health NHS Confirms Cl0p Ransomware Behind Data Breach – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Cyber Security

Barts Health NHS Confirms Cl0p Ransomware Behind Data Breach – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More

December 6, 2025
GOLD BLADE’s strategic evolution – Sophos News
Cyber Security

GOLD BLADE’s strategic evolution – Sophos News

December 6, 2025
Next Post
Cyber Security | What is Cyber Security? and Need of Cyber Security | CLASS-1 | Telugu

Cyber Security | What is Cyber Security? and Need of Cyber Security | CLASS-1 | Telugu

privare browsing cyber crime telugu #staysafeonline #1930helpline

privare browsing cyber crime telugu #staysafeonline #1930helpline

Recommended Stories

Women In Cybersecurity Report, Fall 2025

Women In Cybersecurity Report, Fall 2025

October 30, 2025
A new technique to prevent LLM jailbreaks – Sophos News

A new technique to prevent LLM jailbreaks – Sophos News

October 25, 2025
Have I Been Pwned: Hello Cake Data Breach

Have I Been Pwned: Hello Cake Data Breach

October 20, 2025

Popular Stories

  • Allianz Life – 1,115,061 breached accounts

    Allianz Life – 1,115,061 breached accounts

    0 shares
    Share 0 Tweet 0
  • Prosper – 17,605,276 breached accounts

    0 shares
    Share 0 Tweet 0
  • साइबर अपराध | Illegal Payment Gateway & Rented Bank Accounts | MAMTA CHOPRA

    0 shares
    Share 0 Tweet 0
  • Miljödata – 870,108 breached accounts

    0 shares
    Share 0 Tweet 0
  • Snowflake Data Breach Explained: Lessons and Protection Strategies

    0 shares
    Share 0 Tweet 0

Search

No Result
View All Result

Recent Posts

  • Top 5 Mobile App Security Threats Leaders Must Prepare for in 2026
  • Microsoft On Women In Cybersecurity At Black Hat Europe 2025 In London
  • Polisi kembali ungkap sindikat Cyber Crime kejahatan Internasional – iNews Malam 09/03

Categories

  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos

Newsletter

© 2025 All rights reserved by cyberinchief.com

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us

© 2025 All rights reserved by cyberinchief.com

Newsletter Signup

Subscribe to our weekly newsletter below and never miss the latest News.

Enter your email address

Thanks, I’m not interested