Aluminium manufacturer Hydro crippled by ransomware

Mixed reports suggest a relatively new form of ransomware, LockerGoga, is behind the firm’s IT issues

Norsk Hydro aluminium maunfacturer website logo

Hydro, one of the world's biggest aluminium producers, has suffered a cyber attack, forcing its smeltery to continue operations manually.

The company runs operations in 40 countries, is based in Norway, and employs more 35,000 people. It said that the "extensive cyber attack" had impacted the operations of several business areas.

"Hydro has isolated all plants and operations and is switching to manual operations and procedures as far as possible," it said.

"Hydro's main priority is to continue to ensure safe operations and limit operational and financial impact. The problem has not led to any safety-related incidents."

Speaking to the Reuters agency, a spokesperson from the Norwegian National Security Authority (NSM) said the company had been exposed to a ransomware known as LockerGoga, a claim which a Hydro spokesperson declined to confirm.

Advertisement - Article continues below
Advertisement - Article continues below

Hydro said in a more recent update via its Facebook page that most of its business areas are running as normal, albeit on analogue operational systems. The only caveat was that a "lack of ability to connect to the production systems [is] causing production challenges and temporary stoppage at several plants".

Hydro said that the relevant authorities have been notified and are supporting the metal manufacturer through the situation.

What's really going on?

Until we get any real confirmation on the specifics of the attack, we can't say for certain what exactly happened. "The things we don't know outweigh the things we do know, and that generally means there will be a lot of speculation," said Tim Erlin, VP at TripWire.

IT Pro contacted several analysts about this and there seems to be some consensus on the method of attack, providing reports which suggest it was a ransomware attack can be believed. Most seem to think that in order for the attack to take place, the attacker would have had to deploy the ransomware manually.

"The description of the attack from NOR-CERT so far sounds like the attackers manually deployed the malware after gaining access to the networks," said Chris Doman, security researcher at AT&T Cybersecurity.

Advertisement - Article continues below

"The take-down of a number of different geographic locations is reminiscent of the kind of damage seen in incidents like NotPetya."

Kevin Beaumont, security operations centre manager at BNFL, speaking to the BBC, echoed Doman's thoughts. He said that if the LockerGoga ransomware had been used, then it was likely planted manually by an attacker that gained administrator privileges.

"For an industrial manufacturing business this is potentially bad news, as it may have spread across their company, including near industrial control systems," he added.

Whether or not the attack was caused by ransomware, analysts are keen to express how important it is to continually monitor systems for vulnerabilities.

"This attack provides a lesson in the value of both network segmentation and ensuring that threat models are created, assuming the threat comes from an internal source," said Tim Mackey, senior technical evangelist at Synopsis.

Advertisement - Article continues below

"With increasingly sophisticated attacks, organisations must assume attackers could compromise internal systems as easily as they might attempt to breach a firewall into a production system."

Advertisement - Article continues below

Comparisons have been drawn with the Russian-linked NotPetya attack that struck businesses in 2017, just a month after WannaCry crippled Britain's NHS systems. Of these businesses, shipping giant A.P. Mller-Mrsk was affected hugely - all of its IT systems were rendered useless.

In an event like this, companies are reduced to unorthodox methods in order to maintain operations and keep the chain of command alive. In A.P. Mller-Mrsk's case, the firm famously turned to WhatsApp group messaging and Google Drive file transfers in order to pass down messages through the ranks and fully restore systems.

"We planned and scheduled vessels with marginal data, without incurring delays outside of our normal planning. Many people used their own equipment and took late-night phone calls to make this happen. It was a team effort across the board," says Stephen Davis, Maersk Line's marine manager on the US east coast.

In the wake of the 10-day NotPetya ordeal, A.P. Mller-Mrsk was forced to scrap and replace between 1,500-2,000 of its systems, incurring a total cost of $300m and a marvellous effort from those tasked with replacing the systems. Caleb Barlow, vice president of IBM's X-force threat intelligence cyber security team, said a job like that would usually have taken over a month, but they got it done in a matter of days.

Featured Resources

How inkjet can transform your business

Get more out of your business by investing in the right printing technology

Download now

Journey to a modern workplace with Office 365: which tools and when?

A guide to how Office 365 builds a modern workplace

Download now

Modernise and transform your sales organisation

Learn how a modernised sales process can drive your business

Download now

Your guide to managing cloud transformation risk

Realise the benefits. Mitigate the risks

Download now



How can you protect your business from crypto-ransomware?

4 Nov 2019
internet security

Avast and AVG extensions pulled from Chrome

19 Dec 2019

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Microsoft Windows

Microsoft pulls disastrous Windows 10 security update

17 Feb 2020

How to use Chromecast without Wi-Fi

5 Feb 2020
Business operations

HP shareholders invited to come dine with Xerox

17 Feb 2020
operating systems

How to fix a stuck Windows 10 update

12 Feb 2020