Honda Hit By Ransomware

Japanese carmaker Honda is investigating a cyber-attack after experiencing issues with its IT network. Automotive manufacturer Honda is experiencing a company-wide network outage that is suspected to have been caused by a ransomware attack.

One of the carmaker's servers had become infected with the Ekans malware,  a type of ransomware that targets industrial control systems used for operating factories, and demands payment to open them up again. Ransomware attacks have escalated dramatically in recent years and have largely targeted businesses, often disrupting factories and basic infrastructure.

In 2019, more than 205,000 organisations submitted files that had been hacked in a ransomware attack.

This  attack is reported to have put certain computer programmes off limits to employees. Security researchers at MalwareBytes have posted evidence on the Internet showing a Honda server has become infected in the ‘Ekans’ malware.
Honda workers in America have been sent home from work after getting to their offices to find equipment and phones weren’t working.

In previous cases of the Ekans malware infecting companies it has informed users that it has penetrated their system and demands payment to unencrypt its data. 

Honda said: ‘This is currently under investigation, to understand the cause. At this point, there is no effect on either Japanese production or dealer activities, and no customer impact.... In Europe, we are investigating to understand the nature of any impact. We can confirm some impact in Europe and are currently investigating the exact nature.’ Honda has been targeted by cyber criminals before and in 2017, one of the company’s plants at Sayama, Japan, had to shut down production temporarily after its network was hit by WannaCry ransomware.

The Ekans malware is thought to target systems which control machinery, gaining access and then encrypting data, causing production processes to halt.

Honda:      Car Dealer:        CityAM:      BizJournals:      MalwareBytes:      Telegraph:       Dragos

You Might Also Read:

Volkswagen Launches Automotive Cybersecurity Firm:

WannaCry Returns To Attack Honda:

 

« Artificial Intelligence Takes Microsoft Jobs
Hacked Vehicle Owner Database For Sale »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CERT-EU

CERT-EU

CERT-EU is a permanent Computer Emergency Response Team for the EU institutions, agencies and bodies.

International Telecommunication Union (ITU)

International Telecommunication Union (ITU)

ITU is the United Nations specialized agency for information and communication technologies – ICTs. Areas of activity include cybersecurity.

BeOne Development

BeOne Development

BeOne Development provide innovative training and learning solutions for information security and compliance.

CipherMail

CipherMail

CipherMail provides email security products which allow organizations world wide to automatically protect their email against unauthorized access both in transit and at rest.

TUV Rheinland Group

TUV Rheinland Group

TUV Rheinland Group is a testing services company with nearly 145 years of technological experience. We help you to protect your systems comprehensively, proactively and permanently.

Ntirety

Ntirety

Ntirety Managed Security Services offer enterprise businesses the advanced tools, processes, and support to ensure your infrastructure, networks, and mission-critical applications are secure.

MyCyberSecurity Clinic (MyCSC)

MyCyberSecurity Clinic (MyCSC)

MyCyberSecurity Clinic's main goal is toward establishing an international reference centre for excellence in the field of digital forensics and data recovery services.

AUTOCRYPT

AUTOCRYPT

AUTOCRYPT is a mobility security provider dedicated to the safety of future transportation

LiveAction

LiveAction

LiveAction provides end-to-end visibility of network and application performance from a single pane of glass.

Onyxia Cyber

Onyxia Cyber

Onyxia's unique dynamic cybersecurity platform identifies gaps and prioritizes recommendations for proactive cybersecurity strategy, performance, remediation and management.

DESCERT

DESCERT

DESCERT offers you an extended IT, cyber security, risk advisory & compliance audit team which provides strategic guidance, engineering and audit services.

Beetles Cyber Security

Beetles Cyber Security

Beetles is a crowdsourced penetration testing platform designed to build a trusted, hacker-centric approach to protectan organization’s digital attack surface.

Siometrix

Siometrix

Siometrix addresses digital identity fraud. It steals your attacker's time and prevents many prevalent attack vectors.

Innov8tif

Innov8tif

Innov8tif is an AI company specialised in providing ID assurance solutions — helping digital businesses to prevent frauds by verifying and authenticating customers identity.

ITButler e-Services

ITButler e-Services

At IT Butler, our mission is crystal clear: we are dedicated to providing top-tier cybersecurity solutions and best-practice methodologies to secure and enhance your digital infrastructure’s resilienc

CyberNINES

CyberNINES

CyberNINES is a business specializing in helping US Department of Defense contractors become compliant and attest to federal cybersecurity regulation requirements.