Skip Ribbon Commands
Skip to main content
Mauritian National Computer Security Incident Response Team (CERT-MU)
Mauritian National Computer Security Incident Response Team>Wannacry Is Not Dead and Strikes Again

Wannacry Is Not Dead and Strikes Again


It has been over a month since the WannaCry ransomware caused chaos worldwide and people have started counting its name as 'the things of past,' but the ransomware is not dead. The self-spreading ransomware is still alive and is working absolutely fine. The latest victims of WannaCry are Honda Motor Company and 55 speed and traffic light cameras in Australia. The WannaCry ransomware shut down hospitals, telecom providers, and many businesses worldwide, infecting over 300,000 Windows systems running SMBv1 in more than 150 countries within just 72 hours on 12th of May 2017.
Honda Motor Company Hit
Honda Motor Company released a statement this week, saying the company was forced to halt its production for more than 24 hours at in one of its Japan-based factories after finding the WannaCry infections in its computer networks. The automaker halted production of more than 1,000 at its Sayama plant, northwest of Tokyo, on Monday 19th June after it discovered that the ransomware had affected networks across Japan, North America, Europe, China, and other regions despite its efforts to secure systems in mid-May.
While Honda did not say how WannaCry got into their networks 37 days after a researcher activated the kill switch, it is clear that the computers inside the Honda network were running unsupported versions of Windows OS or it did not install a highly critical patch released by Microsoft in March. The Honda’s Sayama plant, which produces the Accord sedan, Odyssey Minivan, Step Wagon compact multipurpose vehicle and more, produces around 1,000 vehicles per day.
WannaCry Hits 55 Traffic-Light and Speed Cameras in Australia
Another recent WannaCry victim was spotted in Australia when the Victoria Police confirmed that the ransomware infected a total of 55 red light cameras and speed cameras in Victoria via private camera operator Redflex. The malware locked down critical files and demanded a ransom in return. The Department is in the process of removing the WannaCry virus from the affected cameras. The remaining websites will be rectified in the next couple of days. The authorities believed the infection was the result of a targeted cyber-attack, rather than 'human error,' likely on the part of a camera technician and that WannaCry got onboard via a USB drive.
Source:
Hacker News
 
Reuters
 
Contact Information
Postal address
Mauritian Computer Emergency Response Team (CERT-MU)
National Computer Board
7th Floor, Stratton Court
La Poudriere Street
Port Louis