55 Victorian Speed Cameras corrupted by WannaCry virus

A maintenance worker in Victoria has inadvertently infected some 55 intersection speed and red-light cameras with the WannaCry virus bringing into question the accuracy and legitimacy of any infringements captured during the period of infection.

Revealed exclusively by Neil Mitchell on the 3AW morning program, the 55 cameras are apparently in a state of almost constant reboot having detected the virus.

Each camera is a complex bit of kit, clearly there are several components, the camera itself, the radar to detect speed and the computer to record the infringement.

The Victorian Sheriff told Neil Mitchell no infringements have been affected by the virus, though it is unclear how if at all operational the units have been during this period of infection which it appears has been at least a week.

Each camera is networked back to a central location, though the Sheriff told Neil Mitchell the central server was not windows based and therefor could not be infected, and also confirmed the cameras could not infect each other.  This indicates the maintenance worker attended each site – infecting them individually.

How?  A USB stick.  An infected USB stick inserted into an unpatched and vulnerable computer will result in infection, though it appears each computer detected the virus which is what has forced the reboot cycles.

An investigation is ongoing, and the outcome looks certain to be (given the attention on it) that no fines could be issued for the period since the initial inspection.

Lawyers for anyone issued with a fine would likely argue the infection impacted the processing power of the computer at the time of the detection and thus calibration could not be relied apon.

Each camera is being re-installed with a clean (and we hope patched and updated) operating system with a dozen more still to be fixed as of this date.

A good additional warning to all that you’ve got to patch your computers, no matter what software they are running or task they perform.



  1. Chris W

    June 23, 2017 at 7:29 am

    Surely that brings into question the accuracy and legitimacy of any infringements captured by these devices. Not the fact that they were infected by a virus but the fact that they run on Windows software!

  2. Mike

    June 23, 2017 at 8:01 am

    A 9m15s train crash. Conceited Mitchell lacking a shred of technical capability and a Bureaucrat caught in the headlights. Interview could have been 8:20 – 8:45 (25sec) in length.

Leave a Reply

Your email address will not be published. Required fields are marked *

To Top

Join the EFTM Man Cave

Join the EFTM Man Cave for exclusive giveaways!

Welcome! (almost) - Please check your inbox or spam folder to confirm your subscription.