WannaCry is not dead yet, it just attacked Honda and Australia's traffic camera system
A month has passed since WannaCry caused chaos around the world, we are starting to mention it as a phrase of the past, but . WannaCry hasn't died yet .
This self-infecting Ransomware is still alive and well. WannaCry's latest victim is Honda Motor Company and 55 cameras of traffic lights and speed in Australia.
On May 12, 2017, WannaCry attacked and disrupted the operation of hospitals, telecommunications service providers and businesses worldwide, infecting over 300,000 Windows systems running SMBv1 at more than 150 countries within 72 hours.
The computer worm used NSA's Windows SMB vulnerability, called EternalBlue, which was released by the famous hacker group Shadow Brokers during the data publicity in April, along with other Windows vulnerabilities. [EternalRocks - more dangerous malicious code than WannaCry exploits up to seven NSA vulnerabilities]
Honda stopped production after WannaCry attacked its computers
Honda said the company was forced to stop production for more than 24 hours at one of its factories in Japan after it discovered that the computer network was infected with WannaCry.
The automaker stopped producing more than 1,000 cars at the Sayama factory, northwest of Tokyo, on Monday June 19 after discovering that ransomware has affected networks across Japan and the North. The US, Europe, China and other regions regardless of its efforts to protect the system since mid-May, according to a report on Wednesday from Reuters.
While Honda did not say how WannaCry has entered their network after 37 days since a researcher activated the kill tool, it is clear that computers inside the Honda network are running unsupported versions. of Windows OS or they did not have an important Microsoft patch installed in March.
Honda's Sayama factory produces Accord, Odyssey Minivan sedans, Step Wagon compact utility vehicles and many other product lines, with about 1,000 cars / day.
Renault and Nissan were also infected with WannaCry last month, forcing them to suspend production at factories in the UK, India, Japan, France and Romania.
WannaCry attacked 55 speed surveillance cameras and traffic lights in Australia
A more recent "victim" of WannaCry was discovered in Australia when Victoria police confirmed that ransomware had infected a total of 55 red-light cameras and speed cameras in Victoria through the Redflex camera operator.
Morning radio program, 3AW said, malware has locked important files and ransom requests (WannaCry often requires 300USD to open files).
"A system patch has been applied, preventing the spread of the virus," officials said. "The ministry is in the process of removing [WannaCry] virus from affected cameras and the remaining sites will be repaired in the next few days."
Authorities believe that this infection is the result of a targeted cyberattack, rather than "human error", which seems to be caused by a camera technician, and WannaCry has available on USB drive. "Despite the virus detection, the camera system is not compromised," police said.
Yes, it is surprising that WannaCry has been around for quite a long time, the patch has been released that large companies have not yet implemented appropriate security measures to protect themselves, against the threat. .
Ransomware has become a "heavy chain" wrapped around people's necks. Recently, a South Korean web hosting provider confirmed that the company had to pay a $ 1 million ransom to hackers to retrieve their data after the money attack. net net on the weekend.
In the virtual space, stupid is not happy. So, download and install the patch, disable the unsafe, 30-year-old SMBv1 file sharing protocol on your system.
- Prevent WannaCry variants by turning off this Windows 10 installation
- Download selling Windows patches for all versions to avoid being affected by WannaCry
You should read it
- All about WannaCry, Ransomware has been confusing for the past few days
- 2 effective and free ways to check WannaCry
- Download the free WannaCry malware checker now
- Warning with 4 dangerous variants of WannaCry malware
- How to remove / fix ransomware WannaCry
- Honda's database leaked, revealing many 'deadly' weaknesses in the intranet system
- Network security researcher claims to find a way to decode WannaCry
- WannaCry remains one of the most dangerous global security threats
- How to identify WannaCry malicious code from Vietnam Computer Emergency Response Center (VNCERT)
- Address to buy genuine Honda, Oshima low-cost lawn mowers in Hanoi and Ho Chi Minh City. HCM
- The more dangerous WannaCry version 2.0 has appeared
- How to handle the emergency WannaCry malicious code from the National Information Security Department
Maybe you are interested
What is WannaCry, how to prevent Wanna cry for computers
How to configure a firewall to block the WannaCry ransomware attack
Instructions to remove WannaCry Ransomware from your computer
2 effective and free ways to check WannaCry
List of file names, HASH SHA-256 codes containing WannaCry malware
The attack on Microsoft Exchange increased while WannaCry showed signs of return