Yes! Wanna Cry Ransomware Attack Is Still Alive And Infecting Again

0
537
Wanna Cry Ransomware

Another victim was spotted recently in Deniers Australia when the Victoria police confirmed that Wanna cry Ransomware attack injured a total of 55 cameras at red lights and radars in Victoria via a private Redflex camera operator.

Malicious files and secure reviews required a ransom in exchange (and Wanna cry ransomware usually charge $ 300 to open files), according to the morning 3AW radio program.

Officials said the exposure “has been applied the correction system, which prevents the spread of the virus. “Management is in the process of eliminating the virus [and Wanna cry Ransomware attack from the affected cameras and will be corrected for the remaining sites within the next two days. ”

Also Read: How To Lock Anyone Facebook Account Without Password

The authorities believe that the infection was the result of a targeted attack, cyber, rather than “human error”, probably on the technical side of the camera, and that Wanna cry Ransomware attack has on board via a USB key.

Police said, “Our advice at this point is the discovery of antivirus software, but the camera system was not compromised. “We’re going to look at all the incidents that were detected by the radars and the red light during the period in question, of course, the security camera system was not affected. ”

Well, it is quite surprising that even after becoming aware of the cause and Wanna cry Ransomware for a sufficient period of time, large companies are not yet appropriate security measures to defend themselves against the threat implemented.

Wanna cry Ransomware attack became the albatross around the neck of everyone. Recently, South Korean web hosting provider has confirmed that the company has paid a record $ 1 million ransom to hackers in exchange for their data after Wanna cry Ransomware attack the weekend.

In cyberspace, ignorance is not happiness. So go and apply patched patches and disable SMBv1 file sharing protocol is guaranteed, 30 years has on your own systems.

Also Read: Data of 200 Million Voters Compromised On Unsecured Server

The event took place last week and led to a local radio station. According to the latest news, infections occurred during maintenance operations, a human operator, connect the infected USB cable to the cameras, which apparently worked on the Windows operating system.

Cameras belong to the government contractor

Cameras owned by RedFlex Inc., a government contractor, and placed on streets that cross the streets and Victorian. Because the cameras are not connected to the Internet or to the other, and Wanna cry Ransomware was contained in the device.

Well damaged, the cameras stayed in line and keep a job, even if it kicked every few minutes. The authorities say that notices related to the rapid spread of red light during this period will remain in force.

The spokesman for the Department of Justice and the organization in Victoria check the incident on Monday. The official said that maintenance workers installed the patches to stop Wanna cry Ransomware attack from the root.

The spokesman said: “A 3” station at the local radio station that revealed a disease outbreak “was installed the patch system, which prevents the spread of the virus.

“Administration in the process of eliminating the virus from the affected cameras. The remaining sections will be corrected over the next two days. ”

“Administration in the process of eliminating the virus from the affected cameras. The remaining sections will be corrected over the next two days. ”

Honda stopped production after hitting Wanna Cry computer

 

The Honda Motor Company issued a statement this week saying that the company had to stop production for more than 24 hours in one of the Japanese factories after finding injuries and Wanna Cry Ransomware Attack in computer networks.

And stopped the automotive industry producing more than 1,000 plants in the Sayama plant in northwestern Tokyo on Monday, June 19 after discovering that the ransom had affected networks throughout Japan, North America, Europe, China and other regions despite efforts to secure the systems in mid-May, according to a Reuters report.

While Honda did not say how it arrived and deniers to their networks after 37 days of dead Key Finder activation, it is clear that the computers inside the Honda network worked on the versions are not taken into account Loaded by the Windows operating system, or do not install a very critical patch launched by Microsoft in which March.

Syama Honda, which produces a sedan deal, Odyssey Minivan, Stip and Lagoon Vehicle Factory compact vehicle and more, and produces about 1,000 cars a day.

Wanna Cry Ransomware Attack Renault and Nissan last month also hit, which also forced them to temporarily stop production in factories in Britain, India, Japan, France, and Romania.

Although doing most of their damage in mid-May, Wanna Cry Ransomware Attack continues to raise corruption around the world, and finds new computer-based infection devices, referring to people or organizations who do not See the advice from Microsoft and install MS17-010, security news that denies the primary infection carriers and Deniers.

LEAVE A REPLY

Please enter your comment!
Please enter your name here