Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Incident Response

Honda Halts Production at Japan Plant After Cyber Attacks

Honda said Wednesday it had temporarily halted production at a plant in Japan after it suffered a cyberattack from the same ransomware that struck hundreds of thousands of computers worldwide last month.

Honda said Wednesday it had temporarily halted production at a plant in Japan after it suffered a cyberattack from the same ransomware that struck hundreds of thousands of computers worldwide last month.

The Japanese automaker said it had shut its plant in Sayama, near Tokyo, on Monday after discovering its computer system was infected with the so-called WannaCry virus.

The virus encrypts computer files, making them inaccessible until users pay a ransom.

“The malware affected the production of about 1,000 cars,” a Honda spokeswoman told AFP, adding that production restarted on Tuesday.

“There is a possibility that our overseas facilities were also infected… We’re now investigating that,” she added.

Honda’s plant produces a number of models including the Accord sedan and Odyssey Minivan.

The unprecedented global cyberattacks, which started in mid May, struck banks, hospitals and government agencies in more than 150 countries, exploiting known vulnerabilities in old Microsoft computer operating systems.

In May, French auto giant Renault was hit, forcing it to halt production at sites in France, Slovenia and Romania as part of measures to stop the spread of the virus.

Nissan’s British unit in Sunderland was also hit in the attack.

In Japan, 2,000 computers at 600 companies and organisations had been affected by the May virus, according to media reports.

Japanese conglomerate Hitachi was also affected, saying its computer networks were “unstable”, crippling its email systems.

Authorities across the world have issued public alerts warning computer users to beware of suspicious emails and beef up their computer security measures.

Related: Why WannaCry Was a Wake Up Call for Critical Infrastructure Security

Written By

AFP 2023

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Expert Insights

Related Content

Data Breaches

GoTo said an unidentified threat actor stole encrypted backups and an encryption key for a portion of that data during a 2022 breach.

Malware & Threats

Microsoft plans to improve the protection of Office users by blocking XLL add-ins from the internet.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

CISA, NSA, and MS-ISAC issued an alert on the malicious use of RMM software to steal money from bank accounts.

Cybercrime

No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.

Cyberwarfare

Russia-linked cyberespionage group APT29 has been observed using embassy-themed lures and the GraphicalNeutrino malware in recent attacks.

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Malware & Threats

Security researchers are warning of a new wave of malicious NPM and PyPI packages designed to steal user information and download additional payloads.