WannaCry Ransomware Makes A Honda Car Plant Come To Rest

It might have been a month since we first heard about WannaCry, but the ransomware is still making news every now and then. WannaCry recently brought production in a Honda Car Plant in Japan to a halt. Moreover, according to a report, around 5.5 million devices are still vulnerable to WannaCry.

The production lines at Honda’s Sayama plant in Japan where Accord, Odyssey Minivan, and Step Wagon vehicles are manufactured, hasn’t moved an inch, the company said on Wednesday.

The shutdown happened after the car makers realized that the WannaCry Ransomware which targets Windows machines had entered the computer network of the plant, which has a daily output of 1000 cars.

The one-day halt was pulled off on Tuesday. A company spokesperson told Reuters that the production in Honda’s other facilities wasn’t affected.

More than 5.5 million devices are still vulnerable to WannaCry

According to Rapdi7’s 2017 National Exposure Index report, obtained by Data Center Knowledge, more than 5.5 million machines have an open file-sharing SMB port 445. The same is used by the cruel WannaCry to infect Windows PCs. SMB (Server Message Block) is an application layer protocol which allows devices to share files and printers over a network.

Out of the 5.5 million machines, around 800,000 machines have been identified to be running the Windows operating system. Also, the number of open SMB ports has escalated since last year, when it was recorded at 4.6 million.

Overall, the report includes stats of over 3 billion IP-addressable public internet devices which were scanned for 30 ports. It concludes that over 160 million devices have open ports which shouldn’t be exposed to the internet.

2.3 million internet-connected devices have been identified with an open SMB port, according to a blog post by John Matherly, the founder of the search engine Shodan.

Moreover, around 970,000 of these devices have “guest access” enabled, thus, allowing open access to the data shared via SMB file-sharing protocol. Other than being vulnerable to WannaCry, these devices might be compromised even by simple malware.

Jai Prajapati

Jai Prajapati is a security analyst and author for Securityleaks, where he passion for covering latest happening in cybersecurity world such as malware, breaches, vulnerabilities, exploits, white-papers, hacking newsbytes, Dark Web, hacking tutorials and a few more.

Leave a Reply

Your email address will not be published. Required fields are marked *