{"id":3746,"date":"2020-06-14T22:13:00","date_gmt":"2020-06-14T22:13:00","guid":{"rendered":"https:\/\/www.adminbyrequest.com\/?p=3746"},"modified":"2026-01-25T08:41:50","modified_gmt":"2026-01-25T08:41:50","slug":"snake-ransomware-sinks-teeth-into-honda-and-enel","status":"publish","type":"post","link":"https:\/\/www.adminbyrequest.com\/en\/blogs\/snake-ransomware-sinks-teeth-into-honda-and-enel","title":{"rendered":"Snake Ransomware Sinks Teeth into Honda and Enel"},"content":{"rendered":"\n<p>There seems to be a snake in the grass causing disruptions at two well-known industrial enterprises, Japanese automobile manufacturer, Honda, and Energy Company, Enel Argentina.<\/p>\n\n\n\n<p>Here\u2019s what\u2019s been reported so far:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The two companies were hit by cyber attacks that were both discovered in the late hours of Sunday June 7th.<\/li>\n\n\n\n<li>The\u00a0New York Times\u00a0reports that the following morning, Monday June 8th, employees at Honda were unable to open files and emails, with company representative Misako Saka stating the malware had \u201cpenetrated an internal server and then spread.\u201d<\/li>\n\n\n\n<li>A spokesperson said the organisation suffered a loss in connectivity: experiencing difficulties in accessing email, servers and internal systems. The disruption threw a wrench in the works of business operations and production, with Honda\u2019s computer networks across the globe being affected.<\/li>\n\n\n\n<li>Enel Group also confirmed in a statement to&nbsp;<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/power-company-enel-group-suffers-snake-ransomware-attack\/\" target=\"_blank\" rel=\"noreferrer noopener\">BleepingComputer<\/a>&nbsp;that there was a disruption on its internal IT network, which it then temporarily isolated to \u201ccarry out all interventions aimed at eliminating any residual risk.\u201d<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">A New Breed of Serpent<\/h2>\n\n\n\n<p>The cyber attack is believed to be ransomware: a particularly nasty type of malware that aims to steal or encrypt data and threatens to expose it or continue to block access to it unless a ransom is paid.<\/p>\n\n\n\n<p>The attack has been tied to the Snake ransomware family \u2013 also known as \u2018<em>EKANS<\/em>\u2019 (snake backwards) \u2013 which first reared its head in early 2020.<\/p>\n\n\n\n<p>There are several reasons for the belief that Snake is behind the attack:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Honda and Enel Group are both large, industrial enterprises.<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Snake ransomware is known for targeting large,&nbsp;<strong>Industrial Control System<\/strong>&nbsp;(<strong>ICS<\/strong>) environments, typically used in factories for automating processes. Snake ransomware can lock, shut down or even delete these<strong>&nbsp;ICS<\/strong>&nbsp;processes (effectively halting production for the victim company). It then encrypts data and demands a ransom for decryption. The reason ransomware like Snake targets larger organisations is to extort a greater ransom which is more likely to be paid; under mounting pressure from loss of production, the victim company must weigh up the cost of paying the ransom in the hope of recovering faster vs. withholding the ransom and losing out over extended downtime and a longer recovery period.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>The attack happened on a weekend.<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Snake ransomware is a hand-launched attack, as opposed to an automated one. The attacks on both Honda and Enel were first noticed on a Sunday; most human-controlled attacks are launched on weekends as their operators know there are likely to be fewer security personal on-hand during this time.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>It targeted entire networks.<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Honda suffered compromised connectivity and affected networks in Japan, the US and Europe. Enel also found its corporate network disrupted as a result of the attack. Human-operated attacks such as Snake ransomware often target an organisation and infiltrate the entire network by slowly gaining privileged access. This ensures maximum destruction when they launch the main part of the attack (in the case of Snake ransomware: encryption) and enables attackers to infect multiple devices across the network rather than impacting just one device.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>The attack was targeted.<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Based on samples of the malware posted online, the ransomware appears to have been coded to target Honda and Enel\u2019s networks specifically:<\/p>\n\n\n\n<p>1. It checks for the internal network name of mds.honda.com and enelint.global before executing.<\/p>\n\n\n\n<p>&#8211; When&nbsp;<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/honda-investigates-possible-ransomware-attack-networks-impacted\/\" target=\"_blank\" rel=\"noreferrer noopener\">BleepingComputer<\/a>&nbsp;attempted to analyse the sample of Snake ransomware submitted to VirusTotal, the ransomware would begin and then exit immediately without doing any encryption. This is because the ransomware attempts to resolve to the<em>&nbsp;mds.honda.com<\/em>&nbsp;or&nbsp;<em>enelint.global<\/em>&nbsp;domains but terminates when it fails to do so. It was essentially coded to only encrypt files if it was on the targeted network \u2013 in this case: Honda and Enel.<\/p>\n\n\n\n<p>2. It refers to IP addresses that resolve to the targets\u2019 hostnames.<\/p>\n\n\n\n<p>&#8211; As well as checking for the&nbsp;<em>mds.honda.com<\/em>&nbsp;network name, the Snake sample contains a reference to US IP address 170.108.71.15, which resolves to hostname&nbsp;<em>unspec170108.amerhonda.com<\/em>. A similar check exists against an internal Enel IP address to confirm the malware is running on its target network.<\/p>\n\n\n\n<p>All of these points are strong indicators of Snake ransomware being the culprit behind both companies\u2019 technical issues.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How Does Snake Ransomware Slither In?<\/h2>\n\n\n\n<p>Written in&nbsp;<em>GoLang<\/em>&nbsp;(short for&nbsp;<em>Go Language<\/em>, but also known simply as&nbsp;<em>Go<\/em>), Snake is an aggressive strain of ransomware that uses a high level of obfuscation in its code, making it much more difficult to analyse.<\/p>\n\n\n\n<p>There is a belief that Snake and other forms of ransomware are written in&nbsp;<em>GoLang<\/em>&nbsp;because the code can be compiled by all three major operating systems: Windows, macOS and Linux. This means developers can write a single ransomware application that can target victims across multiple platforms.<\/p>\n\n\n\n<p>According to an&nbsp;<a href=\"https:\/\/www.acronis.com\/en-us\/blog\/posts\/snakeekans-ransomware-attacks-industrial-control-systems-acronis-stops-it\" target=\"_blank\" rel=\"noreferrer noopener\">analysis done by Acronis<\/a>, Snake ransomware infections run through the following processes:<\/p>\n\n\n\n<p>1. Snake is distributed via malicious email attachments, spam, ads, fake updates and infected installers, among others. Its point of entry is often through an insecure&nbsp;<strong>Remote Desktop Protocol<\/strong>&nbsp;(<strong>RDP<\/strong>) configuration.<\/p>\n\n\n\n<p>&#8211; An&nbsp;<strong>RDP<\/strong>&nbsp;is a Microsoft protocol which allows the user to remotely connect to another computer over a network connection using a graphical interface.<\/p>\n\n\n\n<p>2. Once executed, Snake removes the computers&nbsp;<strong>Shadow Volume Copies<\/strong>&nbsp;to eliminate Windows backups.<\/p>\n\n\n\n<p><strong>&#8211; Shadow Volume Copies<\/strong>&nbsp;are snapshots or backup copies of computer files or volumes.<\/p>\n\n\n\n<p>3. The ransomware runs through a hard-coded list of processes to kill. These processes include virtual machines, Supervisory Control And Data Acquisition (SCADA) control systems, network management software and<strong>&nbsp;ICS<\/strong>&nbsp;processes, mentioned earlier. Acronis\u2019 analysis of the virus identifies the following processes force-stopped by Snake, along with their description:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong><em>Process<\/em><\/strong><\/td><td><strong><em>Description<\/em><\/strong><\/td><\/tr><tr><td><em>bluestripecollector.exe<\/em><\/td><td><em>BlueStripe Data Collector<\/em><\/td><\/tr><tr><td><em>ccflic0.exe<\/em><\/td><td><em>Proficy Licensing<\/em><\/td><\/tr><tr><td><em>ccflic4.exe<\/em><\/td><td><em>Proficy Licensing<\/em><\/td><\/tr><tr><td><em>cdm.exe<\/em><\/td><td><em>Nimsoft Related<\/em><\/td><\/tr><tr><td><em>certificateprovider.exe<\/em><\/td><td><em>Ambiguous<\/em><\/td><\/tr><tr><td><em>client.exe<\/em><\/td><td><em>Ambiguous<\/em><\/td><\/tr><tr><td><em>client64.exe<\/em><\/td><td><em>Ambiguous<\/em><\/td><\/tr><tr><td><em>collwrap.exe<\/em><\/td><td><em>BlueStripe Data Collector<\/em><\/td><\/tr><tr><td><em>config_api_service.exe<\/em><\/td><td><em>ThingWorx Industrial Connectivity Suite, Ambiguous<\/em><\/td><\/tr><tr><td><em>dsmcsvc.exe<\/em><\/td><td><em>Tivoli Storage Manager Client<\/em><\/td><\/tr><tr><td><em>epmd.exe<\/em><\/td><td><em>RabbitMQ Server (SolarWinds)<\/em><\/td><\/tr><tr><td><em>erlsrv.exe<\/em><\/td><td><em>Erlang<\/em><\/td><\/tr><tr><td><em>fnplicensingservice.exe<\/em><\/td><td><em>FLEXNet Licensing Service<\/em><\/td><\/tr><tr><td><em>hasplmv.exe<\/em><\/td><td><em>Sentinel Hasp License Manager<\/em><\/td><\/tr><tr><td><em>hdb.exe<\/em><\/td><td><em>Honeywell HMIWeb<\/em><\/td><\/tr><tr><td><em>healthservice.exe<\/em><\/td><td><em>Microsoft SCCM<\/em><\/td><\/tr><tr><td><em>ilicensesvc.exe<\/em><\/td><td><em>GE Fanuc Licensing<\/em><\/td><\/tr><tr><td><em>inet_gethost.exe<\/em><\/td><td><em>Erlang<\/em><\/td><\/tr><tr><td><em>keysvc.exe<\/em><\/td><td><em>Ambiguous<\/em><\/td><\/tr><tr><td><em>managementagenthost.exe<\/em><\/td><td><em>VMWare CAF Management Agent Service<\/em><\/td><\/tr><tr><td><em>monitoringhost.exe<\/em><\/td><td><em>Microsoft SCCM<\/em><\/td><\/tr><tr><td><em>msdtssrvr.exe<\/em><\/td><td><em>Microsoft SQL Server Integration Service<\/em><\/td><\/tr><tr><td><em>msmdsrv.exe<\/em><\/td><td><em>Microsoft SQL Server Analysis Services<\/em><\/td><\/tr><tr><td><em>musnotificationux.exe<\/em><\/td><td><em>Microsoft Update Notification Service<\/em><\/td><\/tr><tr><td><em>n.exe<\/em><\/td><td><em>Ambiguous<\/em><\/td><\/tr><tr><td><em>nimbus.exe<\/em><\/td><td><em>Broadcom Nimbus<\/em><\/td><\/tr><tr><td><em>npmdagent.exe<\/em><\/td><td><em>Microsoft OMS Agent<\/em><\/td><\/tr><tr><td><em>ntevl.exe<\/em><\/td><td><em>Nimsoft Monitor<\/em><\/td><\/tr><tr><td><em>ntservices.exe<\/em><\/td><td><em>Ambiguous<\/em><\/td><\/tr><tr><td><em>pralarmmgr.exe<\/em><\/td><td><em>Proficy Related<\/em><\/td><\/tr><tr><td><em>prcalculationmgr.exe<\/em><\/td><td><em>Proficy Historian Data Calculation Service<\/em><\/td><\/tr><tr><td><em>prconfigmgr.exe<\/em><\/td><td><em>Proficy Related<\/em><\/td><\/tr><tr><td><em>prdatabasemgr.exe<\/em><\/td><td><em>Proficy Related<\/em><\/td><\/tr><tr><td><em>premailengine.exe<\/em><\/td><td><em>Proficy Related<\/em><\/td><\/tr><tr><td><em>preventmgr.exe<\/em><\/td><td><em>Proficy Related<\/em><\/td><\/tr><tr><td><em>prftpengine.exe<\/em><\/td><td><em>Proficy Related<\/em><\/td><\/tr><tr><td><em>prgateway.exe<\/em><\/td><td><em>Proficy Secure Gateway<\/em><\/td><\/tr><tr><td><em>prlicensemgr.exe<\/em><\/td><td><em>Proficy License Server Manager<\/em><\/td><\/tr><tr><td><em>proficy administrator.exe<\/em><\/td><td><em>Proficy Related<\/em><\/td><\/tr><tr><td><em>proficyclient.exe<\/em><\/td><td><em>Proficy Related<\/em><\/td><\/tr><tr><td><em>proficypublisherservice.exe<\/em><\/td><td><em>Proficy Related<\/em><\/td><\/tr><tr><td><em>proficyserver.exe<\/em><\/td><td><em>Proficy Server<\/em><\/td><\/tr><tr><td><em>proficysts.exe<\/em><\/td><td><em>Proficy Related<\/em><\/td><\/tr><tr><td><em>prprintserver.exe<\/em><\/td><td><em>Proficy Related<\/em><\/td><\/tr><tr><td><em>prproficymgr.exe<\/em><\/td><td><em>Proficy Plant Applications<\/em><\/td><\/tr><tr><td><em>prrds.exe<\/em><\/td><td><em>Proficy Remote Data Service<\/em><\/td><\/tr><tr><td><em>prreader.exe<\/em><\/td><td><em>Proficy Historian Data Calculation Service<\/em><\/td><\/tr><tr><td><em>prrouter.exe<\/em><\/td><td><em>Proficy Related<\/em><\/td><\/tr><tr><td><em>prschedulemgr.exe<\/em><\/td><td><em>Proficy Related<\/em><\/td><\/tr><tr><td><em>prstubber.exe<\/em><\/td><td><em>Proficy Related<\/em><\/td><\/tr><tr><td><em>prsummarymgr.exe<\/em><\/td><td><em>Proficy Related<\/em><\/td><\/tr><tr><td><em>prwriter.exe<\/em><\/td><td><em>Proficy Historian Data Calculation Service<\/em><\/td><\/tr><tr><td><em>reportingservicesservice.exe<\/em><\/td><td><em>Microsoft SQL Server Reporting Service<\/em><\/td><\/tr><tr><td><em>server_eventlog.exe<\/em><\/td><td><em>Proficy Event Log Service, Ambiguous<\/em><\/td><\/tr><tr><td><em>server_runtime.exe<\/em><\/td><td><em>Proficy Related, Ambiguous<\/em><\/td><\/tr><tr><td><em>spooler.exe<\/em><\/td><td><em>Ambiguous<\/em><\/td><\/tr><tr><td><em>sqlservr.exe<\/em><\/td><td><em>Microsoft SQL Server<\/em><\/td><\/tr><tr><td><em>taskhostw.exe<\/em><\/td><td><em>Windows OS<\/em><\/td><\/tr><tr><td><em>vgauthservice.exe<\/em><\/td><td><em>VMWare Guest Authentication Service<\/em><\/td><\/tr><tr><td><em>vmacthlp.exe<\/em><\/td><td><em>VMWare Activation Helper<\/em><\/td><\/tr><tr><td><em>vmtoolsd.exe<\/em><\/td><td><em>VMWare Tools Service<\/em><\/td><\/tr><tr><td><em>win32sysinfo.exe<\/em><\/td><td><em>RabbitMQ<\/em><\/td><\/tr><tr><td><em>winvnc4.exe<\/em><\/td><td><em>WinVNC Client<\/em><\/td><\/tr><tr><td><em>workflowresttest.exe<\/em><\/td><td><em>Ambiguous<\/em><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>4. Snake ransomware checks that it doesn\u2019t already exist on the system, searching for&nbsp;<strong>mutex<\/strong>&nbsp;value&nbsp;<em>EKANS<\/em>. If this<strong>&nbsp;mutex<\/strong>&nbsp;exists on the system, the ransomware will stop and show a message indicating the device is already encrypted. If not, the&nbsp;<strong>mutex<\/strong>&nbsp;value is set.<\/p>\n\n\n\n<p>&#8211; A&nbsp;<strong>mutex<\/strong>&nbsp;(short for mutual exclusion) is a synchronizer used to ensure that in a multi-threaded application (an app that has multiple threads executing in a shared address space) only one thread can access the shared resource at a time.<\/p>\n\n\n\n<p>5. Encryption proceeds, with&nbsp;<strong>Windows Management Instrumentation<\/strong>&nbsp;(<strong>WMI<\/strong>) calls executing today\u2019s standard ransomware function of mixing symmetric and asymmetric cryptography algorithms.<\/p>\n\n\n\n<p><strong>&#8211; WMI<\/strong>&nbsp;is essentially a database of specifications on the Windows operating system: a centralised place for the management of applications and devices in a network.<\/p>\n\n\n\n<p><strong>&#8211; WMI<\/strong>&nbsp;allows for the remote and local management of Microsoft computers: programming processes, obtaining lists of installed applications and accessing information on classes and instances, among other functions.<\/p>\n\n\n\n<p>6. With the encryption of each file, Snake ransomware appends a random five-character string to the original file extension. For example, a Python PYD file&nbsp;<em>_multiprocessing.pyd<\/em>&nbsp;could read&nbsp;<em>_multiprocessing.pydHsTYl<\/em>after encryption. Within each file, Snake ransomware appends the file marker&nbsp;<em>.EKANS<\/em>. The adding of a random string adds to the obfuscation of the of the malware and sets Snake apart from most ransomware, which usually adds a discernible string to encrypted files.<\/p>\n\n\n\n<p>7. When encryption is complete, Snake drops the following text doc to the victim:<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/www.adminbyrequest.com\/Images\/Blogs\/RansomNote.png\" alt=\"\"\/><\/figure>\n\n\n\n<p>Throughout the infiltration and attack, Snake ransomware does not shutdown or restart the computer, and it allows user access throughout the encryption process.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Stopping the Snake in its Tracks<\/h2>\n\n\n\n<p>So how do industrial companies prevent unwanted serpents from stealing into the network?<\/p>\n\n\n\n<p>By disrupting Snake ransomware\u2019s infiltration of the system: a task it must undertake in order to launch the encryption attack.<\/p>\n\n\n\n<p>To inflict maximum damage, Snake ransomware needs to gain administrative access.<\/p>\n\n\n\n<p>Admin access enables the ransomware to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Propagate across the network<\/strong><\/li>\n<\/ul>\n\n\n\n<p>&#8211; Snake needs this to target the entire company rather than individual users<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Access system files<\/strong><\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Access the Windows registry<\/strong><\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Stop services<\/strong><\/li>\n<\/ul>\n\n\n\n<p>&#8211; Such as&nbsp;<strong>ICS<\/strong>&nbsp;processes<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Write to the Public directory<\/strong><\/li>\n<\/ul>\n\n\n\n<p>&#8211; (<em>C:\\Users\\Public<\/em>) where it is able to display the ransom note&nbsp;<em>Fix-Your-Files.txt<\/em>&nbsp;as the background of every user in the system. If it does not have administrator access, it cannot access the Public directory and the ransom note will be placed in&nbsp;<em>\\Users\\[yourname]\\AppData\\Local\\VirtualStore<\/em>&nbsp;where users are likely to miss it.<\/p>\n\n\n\n<p>o This point alone is a dead giveaway that Snake assumes it will gain administrator access and everyone in the system will forcibly be made aware of the compromise upon launch.<\/p>\n\n\n\n<p>o Another indicator that Snake is confident in full network infiltration is the following sentence in the ransom note: \u201cThe only way to restore your files is by purchasing a decryption tool loaded with a private key we created specifically for your network\u201d. There is no mention of decrypting files on individual computers; Snake is solely interested in the network as a whole.<\/p>\n\n\n\n<p>To stop the Snake in its tracks, you essentially need to prevent it from gaining administrative access.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Admin By Request: Snake Charmer of the Network<\/h2>\n\n\n\n<p><strong>Privileged Access Management<\/strong>&nbsp;(<strong>PAM<\/strong>) is the solution that allows you to do this.<\/p>\n\n\n\n<p>Admin By Request is one such solution.<\/p>\n\n\n\n<p>It\u2019s easy to deploy, manage and maintain, revoking admin rights with minimal disruption to your users. They can continue as they always have, using one of the&nbsp;<a href=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/local-admin-rights-elevation-served-three-ways\" target=\"_blank\" rel=\"noreferrer noopener\">four methods<\/a>&nbsp;provided to do the things they need to do unhindered \u2013 the difference is, your network is now protected from malware that aims to gain administrative access, like Snake ransomware.<\/p>\n\n\n\n<p>Admin By Request allows you to keep a close eye on users and admins. The auditlog displays recent administrator activity. From here you can detect any activity that could indicate infiltration to your network or privilege escalation.<\/p>\n\n\n\n<p>The user portal enables you to manage different users, with sub-settings allowing for different settings to be configured for individual users or groups of users.<\/p>\n\n\n\n<p>Admin By Request\u2019s&nbsp;<strong>PAM<\/strong>&nbsp;solution comes with an IOS and Android-supported app, meaning you can keep administrative access in check at all times, from any location \u2013 even while away from the office on weekends, when hand-launched attacks like Snake ransomware are more likely to hit.<\/p>\n\n\n\n<p>Admin By Request ensures a malware detection rate of&nbsp;<a href=\"https:\/\/metadefender.opswat.com\/reports\/statistics?lang=en\" target=\"_blank\" rel=\"noreferrer noopener\">99.02%<\/a>&nbsp;thanks to integration with&nbsp;<a href=\"https:\/\/www.opswat.com\/developers\/metadefender-cloud-api\" target=\"_blank\" rel=\"noreferrer noopener\">Opswat\u2019s MetaDefender Cloud<\/a>:&nbsp;an anti-malware solution that scans files with over 30 anti-malware engines.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Need to Sssssseee it to Believe It?<\/h2>\n\n\n\n<p>Admin By Request allows you to create an Admin By Request simulation file \u2013 an XML file with the&nbsp;<em>.abrsim<\/em>&nbsp;extension \u2013 using a checksum that you want to simulate a real-world situation for.<\/p>\n\n\n\n<p>When you double click on the&nbsp;<em>.abrsim<\/em>&nbsp;file that you\u2019ve created, Admin By Request will process the file as if it were the real file with this checksum, but will not execute anything.<\/p>\n\n\n\n<p>This essentially allows you to simulate a malware situation without using a malicious file.<\/p>\n\n\n\n<p>We ran a malware simulation using an Admin By Request simulation file,&nbsp;<em>Snake.abrsim<\/em>; the real-world scenario of this would be to have the actual file and run it as administrator.<\/p>\n\n\n\n<p>Here\u2019s a breakdown of this simulation on a system with Admin By Request installed:<\/p>\n\n\n\n<p>1. Admin By Request blocks the file and displays the following window:<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/www.adminbyrequest.com\/Images\/Blogs\/image002-02(1).png\" alt=\"\"\/><\/figure>\n\n\n\n<p>2. The auditlog in the Admin By Request user portal displays key information about the file, including the details of the user who tried to run it, and that the malware scan came back as&nbsp;<strong>Malicious<\/strong>:<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/www.adminbyrequest.com\/Images\/Blogs\/image002-03.png\" alt=\"\"\/><\/figure>\n\n\n\n<p><strong>NOTE:<\/strong>&nbsp;The user details have been blacked out in these examples.<\/p>\n\n\n\n<p>3. When you click on&nbsp;<strong>Malicious<\/strong>&nbsp;in the<strong>&nbsp;Actions&nbsp;<\/strong>section, Admin By Request takes you to a detailed view of what the malware scan picked up on the file:<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/www.adminbyrequest.com\/Images\/Blogs\/image002-04.png\" alt=\"\"\/><\/figure>\n\n\n\n<p>4. You, as the administrator, then get an email notifying you of the situation:<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/www.adminbyrequest.com\/Images\/Blogs\/image002-01.png\" alt=\"\"\/><\/figure>\n\n\n\n<p>And that\u2019s how advanced threat detection, combined with a&nbsp;<strong>PAM<\/strong>&nbsp;solution that records activity, makes it much harder for malware like Snake ransomware to get into your system \u2013 let alone gain administrator access.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Don\u2019t Hiss Out<\/h2>\n\n\n\n<p>With ransomware now specifically targeting large, industrial organisations and having the ability to bring the production of these targeted companies to a grinding halt, the need for protection has never been greater.<\/p>\n\n\n\n<p>Keep the snakes out of your boot, out from under your hood, and as far away from your network as possible with <a href=\"\/en\/freeplandownload\">Admin By Request<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Industrial companies Honda and Enel were recently attacked by Snake ransomware. Get a breakdown on the malware and see how Admin By Request prevents these attacks out of the box.<\/p>\n","protected":false},"author":2,"featured_media":7642,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[90,129,223,234,149,91,233,232],"ppma_author":[10],"class_list":["post-3746","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogs","tag-cyber-criminal","tag-cyberattack","tag-data-breach","tag-enel","tag-hacked","tag-hacker","tag-honda","tag-snake-ransomware","entry","has-media"],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.9.5.2 - aioseo.com -->\n\t<meta name=\"description\" content=\"Industrial companies Honda and Enel were recently attacked by Snake ransomware. Get a breakdown on the malware and see how Admin By Request prevents these attacks out of the box.\" \/>\n\t<meta name=\"robots\" content=\"max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n\t<meta name=\"author\" content=\"S Dodson\"\/>\n\t<meta name=\"keywords\" content=\"cyber criminal,cyberattack,data breach,enel,hacked,hacker,honda,snake ransomware\" \/>\n\t<link rel=\"canonical\" href=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/snake-ransomware-sinks-teeth-into-honda-and-enel\" \/>\n\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.9.5.2\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Admin By Request \u00bb Local Admin Rights, Managed.\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"Snake Ransomware Sinks Teeth into Honda and Enel \u00bb Admin By Request\" \/>\n\t\t<meta property=\"og:description\" content=\"Industrial companies Honda and Enel were recently attacked by Snake ransomware. Get a breakdown on the malware and see how Admin By Request prevents these attacks out of the box.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/snake-ransomware-sinks-teeth-into-honda-and-enel\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2020-06-14T22:13:00+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2026-01-25T08:41:50+00:00\" \/>\n\t\t<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/adminbyrequest\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:site\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Snake Ransomware Sinks Teeth into Honda and Enel \u00bb Admin By Request\" \/>\n\t\t<meta name=\"twitter:description\" content=\"Industrial companies Honda and Enel were recently attacked by Snake ransomware. Get a breakdown on the malware and see how Admin By Request prevents these attacks out of the box.\" \/>\n\t\t<meta name=\"twitter:creator\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"BlogPosting\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/snake-ransomware-sinks-teeth-into-honda-and-enel#blogposting\",\"name\":\"Snake Ransomware Sinks Teeth into Honda and Enel \\u00bb Admin By Request\",\"headline\":\"Snake Ransomware Sinks Teeth into Honda and Enel\",\"author\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/4-2.png\",\"width\":2197,\"height\":1345,\"caption\":\"A Hacker in a hoodie using their laptop.\"},\"datePublished\":\"2020-06-14T22:13:00+00:00\",\"dateModified\":\"2026-01-25T08:41:50+00:00\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/snake-ransomware-sinks-teeth-into-honda-and-enel#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/snake-ransomware-sinks-teeth-into-honda-and-enel#webpage\"},\"articleSection\":\"Blogs, Cyber Criminal, Cyberattack, Data Breach, Enel, Hacked, Hacker, Honda, Snake Ransomware, Steve Dodson\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/snake-ransomware-sinks-teeth-into-honda-and-enel#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"name\":\"Blogs\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"position\":2,\"name\":\"Blogs\",\"item\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/snake-ransomware-sinks-teeth-into-honda-and-enel#listItem\",\"name\":\"Snake Ransomware Sinks Teeth into Honda and Enel\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/snake-ransomware-sinks-teeth-into-honda-and-enel#listItem\",\"position\":3,\"name\":\"Snake Ransomware Sinks Teeth into Honda and Enel\",\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"name\":\"Blogs\"}}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\",\"name\":\"Admin By Request\",\"description\":\"Local Admin Rights, Managed.\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"telephone\":\"+12622994600\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Circle-Tick-24.svg\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/snake-ransomware-sinks-teeth-into-honda-and-enel\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/snake-ransomware-sinks-teeth-into-honda-and-enel\\\/#organizationLogo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/adminbyrequest\",\"https:\\\/\\\/twitter.com\\\/AdminByRequest\",\"https:\\\/\\\/www.instagram.com\\\/AdminByRequest\\\/\",\"https:\\\/\\\/www.tiktok.com\\\/@adminbyrequest\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCwq1wlbT9m_z3YH-EPaZqKw\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/adminbyrequest\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin\",\"name\":\"S Dodson\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/snake-ransomware-sinks-teeth-into-honda-and-enel#webpage\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/snake-ransomware-sinks-teeth-into-honda-and-enel\",\"name\":\"Snake Ransomware Sinks Teeth into Honda and Enel \\u00bb Admin By Request\",\"description\":\"Industrial companies Honda and Enel were recently attacked by Snake ransomware. Get a breakdown on the malware and see how Admin By Request prevents these attacks out of the box.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/snake-ransomware-sinks-teeth-into-honda-and-enel#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/4-2.png\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/snake-ransomware-sinks-teeth-into-honda-and-enel\\\/#mainImage\",\"width\":2197,\"height\":1345,\"caption\":\"A Hacker in a hoodie using their laptop.\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/snake-ransomware-sinks-teeth-into-honda-and-enel#mainImage\"},\"datePublished\":\"2020-06-14T22:13:00+00:00\",\"dateModified\":\"2026-01-25T08:41:50+00:00\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"name\":\"Admin By Request\",\"alternateName\":\"ABR\",\"description\":\"Local Admin Rights, Managed.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<script type=\"text\/javascript\">\n\t\t\t(function(c,l,a,r,i,t,y){\n\t\t\tc[a]=c[a]||function(){(c[a].q=c[a].q||[]).push(arguments)};t=l.createElement(r);t.async=1;\n\t\t\tt.src=\"https:\/\/www.clarity.ms\/tag\/\"+i+\"?ref=aioseo\";y=l.getElementsByTagName(r)[0];y.parentNode.insertBefore(t,y);\n\t\t})(window, document, \"clarity\", \"script\", \"n4woz8og40\");\n\t\t<\/script>\n\t\t<script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src='https:\/\/www.googletagmanager.com\/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f);})(window,document,'script','dataLayer',\"GTM-PGQ6572W\");<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Snake Ransomware Sinks Teeth into Honda and Enel \u00bb Admin By Request<\/title>\n\n","aioseo_head_json":{"title":"Snake Ransomware Sinks Teeth into Honda and Enel \u00bb Admin By Request","description":"Industrial companies Honda and Enel were recently attacked by Snake ransomware. Get a breakdown on the malware and see how Admin By Request prevents these attacks out of the box.","canonical_url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/snake-ransomware-sinks-teeth-into-honda-and-enel","robots":"max-snippet:-1, max-image-preview:large, max-video-preview:-1","keywords":"cyber criminal,cyberattack,data breach,enel,hacked,hacker,honda,snake ransomware","webmasterTools":{"miscellaneous":""},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BlogPosting","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/snake-ransomware-sinks-teeth-into-honda-and-enel#blogposting","name":"Snake Ransomware Sinks Teeth into Honda and Enel \u00bb Admin By Request","headline":"Snake Ransomware Sinks Teeth into Honda and Enel","author":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author"},"publisher":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/01\/4-2.png","width":2197,"height":1345,"caption":"A Hacker in a hoodie using their laptop."},"datePublished":"2020-06-14T22:13:00+00:00","dateModified":"2026-01-25T08:41:50+00:00","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/snake-ransomware-sinks-teeth-into-honda-and-enel#webpage"},"isPartOf":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/snake-ransomware-sinks-teeth-into-honda-and-enel#webpage"},"articleSection":"Blogs, Cyber Criminal, Cyberattack, Data Breach, Enel, Hacked, Hacker, Honda, Snake Ransomware, Steve Dodson"},{"@type":"BreadcrumbList","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/snake-ransomware-sinks-teeth-into-honda-and-enel#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","position":1,"name":"Home","item":"https:\/\/www.adminbyrequest.com\/en","nextItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","name":"Blogs"}},{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","position":2,"name":"Blogs","item":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs","nextItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/snake-ransomware-sinks-teeth-into-honda-and-enel#listItem","name":"Snake Ransomware Sinks Teeth into Honda and Enel"},"previousItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","name":"Home"}},{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/snake-ransomware-sinks-teeth-into-honda-and-enel#listItem","position":3,"name":"Snake Ransomware Sinks Teeth into Honda and Enel","previousItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","name":"Blogs"}}]},{"@type":"Organization","@id":"https:\/\/www.adminbyrequest.com\/en\/#organization","name":"Admin By Request","description":"Local Admin Rights, Managed.","url":"https:\/\/www.adminbyrequest.com\/en\/","telephone":"+12622994600","logo":{"@type":"ImageObject","url":"\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/snake-ransomware-sinks-teeth-into-honda-and-enel\/#organizationLogo"},"image":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/snake-ransomware-sinks-teeth-into-honda-and-enel\/#organizationLogo"},"sameAs":["https:\/\/www.facebook.com\/adminbyrequest","https:\/\/twitter.com\/AdminByRequest","https:\/\/www.instagram.com\/AdminByRequest\/","https:\/\/www.tiktok.com\/@adminbyrequest","https:\/\/www.youtube.com\/channel\/UCwq1wlbT9m_z3YH-EPaZqKw","https:\/\/www.linkedin.com\/company\/adminbyrequest\/"]},{"@type":"Person","@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author","url":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin","name":"S Dodson"},{"@type":"WebPage","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/snake-ransomware-sinks-teeth-into-honda-and-enel#webpage","url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/snake-ransomware-sinks-teeth-into-honda-and-enel","name":"Snake Ransomware Sinks Teeth into Honda and Enel \u00bb Admin By Request","description":"Industrial companies Honda and Enel were recently attacked by Snake ransomware. Get a breakdown on the malware and see how Admin By Request prevents these attacks out of the box.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#website"},"breadcrumb":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/snake-ransomware-sinks-teeth-into-honda-and-enel#breadcrumblist"},"author":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author"},"creator":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author"},"image":{"@type":"ImageObject","url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/01\/4-2.png","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/snake-ransomware-sinks-teeth-into-honda-and-enel\/#mainImage","width":2197,"height":1345,"caption":"A Hacker in a hoodie using their laptop."},"primaryImageOfPage":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/snake-ransomware-sinks-teeth-into-honda-and-enel#mainImage"},"datePublished":"2020-06-14T22:13:00+00:00","dateModified":"2026-01-25T08:41:50+00:00"},{"@type":"WebSite","@id":"https:\/\/www.adminbyrequest.com\/en\/#website","url":"https:\/\/www.adminbyrequest.com\/en\/","name":"Admin By Request","alternateName":"ABR","description":"Local Admin Rights, Managed.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#organization"}}]},"og:locale":"en_US","og:site_name":"Admin By Request \u00bb Local Admin Rights, Managed.","og:type":"article","og:title":"Snake Ransomware Sinks Teeth into Honda and Enel \u00bb Admin By Request","og:description":"Industrial companies Honda and Enel were recently attacked by Snake ransomware. Get a breakdown on the malware and see how Admin By Request prevents these attacks out of the box.","og:url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/snake-ransomware-sinks-teeth-into-honda-and-enel","og:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","og:image:secure_url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","article:published_time":"2020-06-14T22:13:00+00:00","article:modified_time":"2026-01-25T08:41:50+00:00","article:publisher":"https:\/\/www.facebook.com\/adminbyrequest","twitter:card":"summary_large_image","twitter:site":"@AdminByRequest","twitter:title":"Snake Ransomware Sinks Teeth into Honda and Enel \u00bb Admin By Request","twitter:description":"Industrial companies Honda and Enel were recently attacked by Snake ransomware. Get a breakdown on the malware and see how Admin By Request prevents these attacks out of the box.","twitter:creator":"@AdminByRequest","twitter:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg"},"aioseo_meta_data":{"post_id":"3746","title":"#post_title #separator_sa #site_title","description":"#post_excerpt","keywords":[],"keyphrases":{"focus":{"keyphrase":"","score":0,"analysis":{"keyphraseInTitle":{"score":0,"maxScore":9,"error":1}}},"additional":[]},"primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":null,"og_article_tags":[],"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"ProductReview":[],"Car":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"BlogPosting","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":null,"pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"seo_analyzer_scan_date":"2026-01-25 08:57:36","breadcrumb_settings":null,"limit_modified_date":false,"reviewed_by":null,"open_ai":"{\"title\":{\"suggestions\":[],\"usage\":0},\"description\":{\"suggestions\":[],\"usage\":0}}","ai":null,"created":"2023-05-22 21:56:16","updated":"2026-01-25 08:57:36"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.adminbyrequest.com\/en\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.adminbyrequest.com\/en\/category\/blogs\" title=\"Blogs\">Blogs<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\tSnake Ransomware Sinks Teeth into Honda and Enel\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.adminbyrequest.com\/en"},{"label":"Blogs","link":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs"},{"label":"Snake Ransomware Sinks Teeth into Honda and Enel","link":"https:\/\/www.adminbyrequest.com\/en\/blogs\/snake-ransomware-sinks-teeth-into-honda-and-enel"}],"authors":[{"term_id":10,"user_id":0,"is_guest":1,"slug":"steve-dodson","display_name":"Steve Dodson","avatar_url":{"url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2022\/09\/SteveHeadshotSquareABR.png","url2x":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2022\/09\/SteveHeadshotSquareABR.png"},"author_category":"","user_url":"","last_name":"Dodson","first_name":"Steve","job_title":"","description":"Steve provides research, analysis, insight and commentary on topical issues and events. He lives in New Zealand and has been working at FastTrack Software for 12 years as a cyber security analyst and technical writer."}],"_links":{"self":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/3746","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/comments?post=3746"}],"version-history":[{"count":2,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/3746\/revisions"}],"predecessor-version":[{"id":18130,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/3746\/revisions\/18130"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/media\/7642"}],"wp:attachment":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/media?parent=3746"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/categories?post=3746"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/tags?post=3746"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/ppma_author?post=3746"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}