Norsk Hydro Ransomware Attack (2019)

Victim:

Norsk Hydro

Attacker/Malware:

FIN6’s LockerGogo Ransomware

Industry:

Manufacturing

Estimated Cost:

~$75M in losses, global production dropped ~15,000 tons in Q1 2019

Primary Attack Vector:

Spear Phishing

Prevention Failure:

Weak Credentials, Lack of Segmentation

BlastWave Solution:

Network Cloaking, Passwordless Secure Access, and Segmentation

Kill Chain Analysis:

Rapid Lateral Spread and Production Disruption

Norsk Hydro, a global aluminum producer, was hit by the LockerGoga ransomware in March 2019.

After initial access through a spear-phishing campaign, the ransomwarespread rapidly across the company’s network, disrupting logistics and production data systems. The company made the strategic decision to shut downaffected OT systems and revert to manual production operations, in somecases using paper copies of orders, to limit the spread of the ransomware andprevent permanent damage.

The operational disruption led to an estimated loss of between $40 million and$75 million. The failure was rooted in widespread lateral connectivity between ITand OT domains.

BlastWave Prevention Analysis:

Zero Trust Containment

The LockerGoga wormable ransomware exploited implicit network trust to facilitate its rapid lateral spread.

BlastWave’s microsegmentation would have contained the infection to the initialpoint of compromise (likely an infected IT workstation). Any attempt by the LockerGoga executable to scan the network or propagate to adjacent OT systems(such as the logistical servers or process control HMIs) would have been metwith a cloaked, unresponsive network, as the malware would lack the authenticated identity required to establish a secure tunnel, thereby confining the damageand maintaining the continuity of core OT production.

Malware would lack the authenticated identity required to establish a secure tunnel, thereby confining the damage and maintaining the continuity of core OT production.

Download Hackopedia Volume 1 Now – It's Free

Our Privacy Policy applies.

Take the Next Step

Reading about past failures is only useful if it changes future outcomes. If attackers can see your OT network, they can target it. If they can target it, compliance, safety, and uptime are already at risk.

BlastWave eliminates reconnaissance, initial access, and lateral movement — without agents, without downtime, and without changing IPs, protocols, or PLCs.

Secure Your OT Network