Regular coffee machine has become the source of the spread of the virus WannaCry
About this on the Reddit forum reported one of the employees of the company, his name is not called. According to the specialist, his duties include monitoring information security through a remote control room located in the head office. In case of any problems, the employees contact the dispatchers, and the matter is resolved either directly by the head office through the connection, or by sending instructions to the appropriate responsible persons in the field.
In this case, the central office received a call from a remote control center, the problem was the failure of the monitoring system computers. The scan revealed the presence of a WannaCry virus on the network. The difficulty was that when reinstalling the operating system of all available computers, the virus reappeared.
Restoration of the system is possible only if you pay an amount equivalent to $ 300 in the event that the payment is made within three days, and $ 600 - if the payment is delayed for a longer period of time. Computer security of large companies and corporations has in its arsenal ways to circumvent, preventing infection, so the main danger of the virus is for ordinary users of home computers.
In the course of the study, a local wi-fi network was identified as the source of infection. The only device connected was a modern coffee machine model with built-in wifi connection. In parallel with the local, the machine was also connected to the control network, so the virus penetrated the computers of this network. Only the cure of the coffee machine from the virus helped to restore the efficiency of the unit.
The recently widely used “smart” technology often has access to the Internet in its arsenal. This is done so that the manufacturer can quickly receive information about the actions of the user, thus identifying the statistics of the processes being performed,consumer preferences and structure of difficulties arising in the process of use. In fact, personal information about the movements and preferences of the consumer becomes publicly available, and only by disabling the network access unit in a timely manner, can it protect itself from invasion of privacy.