If you thought the WannaCry ransomware attack in May was a one-and-done deal, you may find this unsettling. Since May, the ransomware has beaten the network security of Honda other large automakers. And, according to American and British cyber-security experts, it might have come from North Korea.

This begs the immediate questions: Have you updated your network security against WannaCry and have you stepped up your network security against other malware that is no doubt around the corner?

WannaCry Is Still Out There

While the May attack was the big news-getter, the WannaCry ransomware has quietly continued its mayhem.

For one, there was an attack on the traffic lights in Australia. It got into the lights and started issuing traffic tickets.

Between June 6 and June 22, WannaCry hacked 55 traffic cameras which issued 590 tickets for speeding and running red lights during that time. Local police have voided everyone’s tickets so they didn’t have to pay them to reassure the public and maintain trust in the camera system.

For another, an attack occurred last month on Nissan and Renault. According to Forbes, the automakers had to temporarily shut down factories in Britain, France, India, Japan and Romania.

And now there’s last week’s attack on Honda. Honda had to stop production at its plant near Tokyo after WannaCry shut down several older computers on the production line, according to Forbes. None of Honda’s other plants have been affected so far, but the company said they found the malware in their networks in Japan, China, North America and Europe. So, as it turns out, not even huge corporations are immune to ransomware.

WannaCry from North Korea?

Cyber security experts in the British and American governments have linked the WannaCry ransomware to North Korea.

The National Security Agency (NSA) and Britain’s version of the NSA have been investigating WannaCry, and they both think it came from North Korea.

Evidently, WannaCry has some code overlaps with other malware created by a known North Korean hacker group. Code overlaps are identical sections of code in different programs that security experts can use to identify authors.

And, unfortunately, the hacker group British and American experts are saying behind WannaCry is what they call a state actor. In other words, the government of North Korea.

SMBs: Low-Hanging Fruit

While you might hope that you are less of a target because you are smaller than Honda, that really isn’t the case.

Small- and medium-sized businesses (SMBs) are ripe targets for hackers—what you might call low-hanging fruit. Hackers are savvy and sophisticated, and they don’t risk a lifetime in prison when they don’t have to.

SMBs are lucrative targets for hackers because they tend to have weaker network security. It’s not anyone’s fault, but smaller companies have less money and fewer resources to dedicate to security.

Step Up Your Network Security

Unfortunately, the WannaCry ransomware is still wreaking havoc around the globe. If you haven’t taken steps to defend your company’s network against WannaCry yet, you need to because the threat is still out there. If you haven’t stepped up your network security against the next piece of malware to come around the corner, you need to do that too.

It might be time to put your company’s network security into the hands of experts who will keep you on the latest software and security updates. If you think you might need some help in that regard, please give us a call. Avitus Group has IT experts who can answer your questions about WannaCry and network security.

 

By Charlie Smith