Honda became the third automaker affected by the WannaCry virus: in May 2017, the encryptor blocked the Nissan and Renault networks.
The virus attacks seemed to have subsided at the end of May, after a cyber security specialist under the pseudonym MalwareTech, found an "emergency breaker" in the virus code: before exiting, the extranet turns to the domain iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com. As long as the domain did not exist, the virus began to encrypt the files. However, when MalwareTech registered the domain, the process of infection was able to stop.
How the infection of the Honda computer network has occurred is still unknown. There is a version that someone with access to network computers could block access to the domain-switch, or the company was faced with a new version of the virus or the WannaCry simulator.
At the moment, representatives of Honda have not commented on what happened. It is only known that besides the factory in Sayam, the networks in China, North America and Europe also suffered, but the most serious damage was caused to the Japanese company.
Wow...these attacks are certainly becoming more sophisticated.
I read somewhere that many companies are now purchasing crypto's as a backup strategy in such a case.
Ironically, the same technology used by these hackers (cryptocurrency) to receive their funds may very well be the same tech that may very well prevent these types of attacks (blockchain DNS)
DNS on a BlockChain