The Hydro-attack cost 350 million – this is how it happened & why you should care
Today, not all systems are running yet and they estimated that it may take several months before they are up and running again. The attack probably started as a targeted email attack, so called spear phishing, which has allowed a ransomware called LockerGoga to be installed and then spread throughout the network. It is unclear whether there was a ransom, but preliminary information indicates that the purpose of the attack was to sabotage the business in order to a large extent reduce the company's operational ability. As soon as the attack was discovered, "the cord was pulled" from 22,000 computers and systems, thus also affecting non-infected devices. In the end, the attack means disruption and reduced production of aluminum. So why would someone do this - we can so far only speculate.
||"Targeted attacks like this one are becoming more common. Unfortunately, many still believe that ransomware is unusual. Next time, it may as well be your business that is hit. The fact that the attack on Norsk Hydro has received a great deal of attention is partly due to the fact that Norsk Hydro has had a relatively transparent approach to the attack and that they are a large listed company where there is an obligation to provide information.” says Jonas Lejon, IT security specialist and member of Holm Security's Advisory Board.
Ransomware & LockerGogaRansomware is a type of malicious software with the purpose to blackmail organisations or persons by taking files as hostage via encryption. The software sometimes also exploits vulnerabilities in the systems to spread. To lift the encryption or regain control of the computer, the extortionist requires a ransom, often in traceable currency such as Bitcoin, or any other act that favors the offender behind the program. Frequently, the ransom increases gradually after a deadline of a few days to stress the victim.
Simple rules to keep your organization protected
- Keep your systems up to date - and ensure that they really are patched.
- Educate your users to be more resilient against email attacks.
- Frequently take backups.
- Restrict user permissions.
- Have an antivirus installed and make sure it is up to date.
- Have a secure gateway for your email that efficiently stops email attacks.
- Create a security-conscious culture in your organization, not least through continuous education and training. This must be a top down priority - from the board and all the way to the end user.
- Read Norsk Hydro's own press conference regarding the attack (external link):
- Read Norsk Hydro's own updates regarding the attack (external link):
- Norsk Hydro's report (external link):
About the author
+46 (0)739-99 33 12