Honda WannaCry: Production of 1,000 Cars Halted After Cyberattack
CYBER NEWS

Honda WannaCry: Production of 1,000 Cars Halted After Cyberattack

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)
Loading...

Honda has suffered a WannaCry cyberattack which led to the interruption of one of their domestic vehicle plants in Japan for a whole day. The Japanese automobile company said that it had shut its plant in Sayama, near Tokyo, on Monday after it found out its computer system was compromised by the WannaCry ransomware.

Related Story: Wana Decrypt0r 2.0 Ransomware In a Massive Outbreak (May 2017)

WannaCry Attack at Honda Halts the Production of 1,000 Cars

According to a Honda spokeswoman, the ransomware affected the production of approximately 1,000 cars. “There is a possibility that our overseas facilities were also infected… We´re now investigating that,” the Honda spokeswoman added.

The WannaCry (.WNCRY, Wana Decrypt0r 2.0) ransomware outbreak is definitely among the most devastating cybersecurity events of the last couple of years. The ransomware took down the systems of Telefonica in Spain, as well as multiple hospitals in the UK. It also affected the National Health Services machines in England and Scotland, and many government agencies. Victims of WannaCry are found in more than 150 countries, the latest one being Honda.


Renault, Nissan Also Hit by WannaCry Ransomware

In May when the outbreak started Renault was also hit, and was forced to halt production at factories in France, Slovenia and Romania. Another automobile giant was also affected – Nissan’s British unit in Sunderland. As for Japan alone – 2,000 computers at 600 companies were hit this May, the statistics reveal.

Japanese conglomerate Hitachi was attacked as well, with its systems becoming unstable and its email systems crippled by WannaCry.

Related Story: Top 5 WannaCry Ransomware Mitigations to Adopt Now

The WannaCry ransomware has several iterations, the first one of which used the .wcry file extension appended to the victim’s encrypted files. The second version of the ransomware came out in a massive campaign on the 12th of May and was more devastating than the first one, infecting more victims and organizations all around the globe. Users are strongly advised to patch their systems and to be extra cautious when dealing with files attached in emails sent by unknown entities.

Avatar

Milena Dimitrova

An inspired writer and content manager who has been with SensorsTechForum for 4 years. Enjoys ‘Mr. Robot’ and fears ‘1984’. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles!

More Posts

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...