Japanese Automaker Honda Infected With Wannacry Ransomware

Honda Wannacry

Just when you think it’s all over, it’s not over. Honda has become the latest company to fall victim to the infamous Wannacry Ransomware. On Wednesday, the automaker announced that it was forced to shut down production its Sayama plant in the Saitama prefecture, Japan. The incident was first detected on Sunday, June 18. This lead Honda to shut down production on the plant to remove the malware and prevent it from spreading.

Due to the temporary halt in operations of the plant, the plant was unable to produce its daily quota of 1000 vehicles. It is unknown how Wannacry managed to infect the Sayama plant. According to a statement released by the automaker, the malware seems to have affected a few old production line computers. It is likely that these terminals weren’t running the latest security patches released by Windows. Fortunately, other Honda plants weren’t affected by the malware and production was able to resume the following day at the Sayama plant.

On June 19, 2017, Honda’s Sayama Auto Plant experienced a short interruption in normal production caused by the shutdown of several older production line computers infected with the “Wannacry” virus. A total of approximately 1,000 units were not produced as planned as a result of this interruption. Production has resumed, and Honda has taken steps to reinforce its virus protection regimen to avoid any similar occurrences in the future.

— Source: https://threatpost.com

The news of Honda being affected by Wannacry comes only days after a Korean web hosting company, NAYANA, fell victim of a ransomware attack. NAYANA was forced to pay $1 million dollars in ransom which became the biggest payout in ransomware history. This trend of companies being held at ransom is likely to become more proliferate and damaging given that would be hackers are now aware just how much they can extort from companies to release their data. Let us not also forget of the upcoming exploit leak by TheShadowBrokers.

Leave a Reply

Your email address will not be published. Required fields are marked *