• COVID-19
  • About Us
  • Contact Us
  • Events
  • Industries
  • Partners
  • Products & Services
  • Contribute
  • Webinars

Aerospace

  • Québec’s CloudOps Will Build Telesat LightSpeed’s Cloud Network
  • Myriota and Goanna Ag Team Up on IoT Agriculture Solutions
  • Fleet Picks Swissto12 to Deliver Additively Manufactured All-Metal Patch Antennas

Chemical

  • POWER magazine and Chemical Engineering magazine announce Eastman Chemical as the Host Chemical Process Industries (CPI) Sponsor for the 5th annual Connected Plant Conference
  • Evonik deepens partnership with IBM to accelerate AI implementation
  • Achieving Plant Efficiency – the Digital Way

Cybersecurity

  • House Passes Eight Bipartisan Cyber, Homeland Security Bills
  • Biden Administration Targets Electric Utilities For Cybersecurity Protections
  • White House Attributes SolarWinds Hack To Russian Agency

Healthcare

  • CISA Services In High Demand Related To COVID Vaccine Response
  • AI tool detects COVID-19 by listening to patients’ coughs
  • Printing Wearable Sensors Directly onto Skin

Oil & Gas

  • Globalstar Wins Asset Tracking Order from Brazilian Oil and Gas Company
  • Cybersecurity: Continuous Vigilance Required
  • Repsol and Microsoft renew partnership developing AI-powered digital solutions

Power

  • POWER magazine and Chemical Engineering magazine announce Eastman Chemical as the Host Chemical Process Industries (CPI) Sponsor for the 5th annual Connected Plant Conference
  • Self-Tuning Artificial Intelligence Improves Plant Efficiency and Flexibility
  • How to Put the Power Grid to Work to Prevent Wildfires

Transportation

  • Swarm CEO Sara Spangelo Sets Disruptive Pricing on New Satellite IoT Service
  • Trump Issues Cyber Security Plan For Maritime Transportation System
  • Sabic Launches New Compounds for Automotive Radar Sensors

Webinars

  • Anticipating the Unknowns: Accelerating Incident Response Without Losing Control
  • Industrial Endpoint Protection in Operational Technology
  • Known and Unknown: Putting a Stop to OT and IT Threats Before they Act

Sign up today for our free weekly e-letter

sign up
CONNECTING INNOVATIONS
WITH INSIGHT
SIGN UP
LOG IN
  • Aerospace
    Québec's CloudOps Will Build Telesat LightSpeed's Cloud Network
    Read story View all articles
  • Chemical
    POWER magazine and Chemical Engineering magazine announce Eastman Chemical as the Host Chemical Process Industries (CPI) Sponsor for the 5th annual Connected Plant Conference
    Read story View all articles
  • Cybersecurity
    House Passes Eight Bipartisan Cyber, Homeland Security Bills
    Read story View all articles
  • Healthcare
    CISA Services In High Demand Related To COVID Vaccine Response
    Read story View all articles
  • Oil & Gas
    Globalstar Wins Asset Tracking Order from Brazilian Oil and Gas Company
    Read story View all articles
  • Power
    POWER magazine and Chemical Engineering magazine announce Eastman Chemical as the Host Chemical Process Industries (CPI) Sponsor for the 5th annual Connected Plant Conference
    Read story View all articles
  • Transportation
    Swarm CEO Sara Spangelo Sets Disruptive Pricing on New Satellite IoT Service
    Read story View all articles
Chemical Cybersecurity Power
March 19 2019 2:05 pm

Cyberattack Debilitates Major Aluminum and Hydropower Producer

S

Sonal Patel

Norsk Hydro, a major global aluminum producer that is also Norway's third-largest producer of hydropower, has been stricken by an extensive cyberattack–reportedly ransomware–that forced its entire global network offline.

The company powers its sizable aluminum production operations with 20 hydropower plants concentrated in Telemark, Røldal-Suldal, Sogn, and Vennesla, producing a total 10 TWh per year. It told POWER on March 19 that its power operations were not impacted.

Its bauxite and alumina production, and primary metal plants were also operating as usual, though some with a "higher degree of manual operations." The segment that is most affected is Hydro's extruded solutions and rolled products, which show a "lack of ability to connect to the production systems," causing "production challenges and temporary stoppage at several plants," it said.

The company disclosed the attack in line with Norwegian securities law. It said the incident began in the early hours on Tuesday. "IT-systems in most business areas are impacted and Hydro is switching to manual operations as far as possible," Norsk Hydro reported at 3:31 a.m. EST. "Hydro is working to contain and neutralize the attack, but does not yet know the full extent of the situation."

In a 9:41 EST update, the company said it had isolated all plants and operations and was switching to manual operations and procedures "as far as possible." Its main priority was to ensure safe operations, and limit operational and financial impact, and the event had not led to any safety-related incidents, it said. However, the company noted it did not "yet know the full extent of the situation," noting it was "too early to indicate the operational and financial impact, as well as timing to resolve the situation." For now, it said, "Relevant authorities have been notified and are supporting Hydro in the efforts to resolve the problem."

A Possible Ransomware Attack

In the hours following first reports of the attack, NorCERT, Norway's national computer emergency response team and cybersecurity center, reportedly issued a notification that said Norsk Hydro was one of an unspecified number of victims affected by LockerGoga ransomware. "The attack was combined with an attack on Active Directory (AD)," the alert, which was first reported by Norwegian state-owned media NRK, said. NorCERT urged all public enterprises in Norway to be vigilant for further spread of the ransomware virus.

The relatively new strand of ransomware gained prominence after a cybersecurity attack that infiltrated systems at French engineering consultancy firm Altran Technologies on January 24, according to information security and technology news publication Bleeping Computer.

However, ransomware has been an enduring worry for industrial control system (ICS) security, owing in large part to devastating effects of wormable malware such as WannaCry, NotPetya, and BadRabbit. In 2017, NotPetya ransomware reportedly caused $300 million in losses and prompted large logistics firm Maersk to wipe and reinstall 4,000 new servers, 45,000 new computers, and 2,500 applications to restore operations.

ICS cybersecurity firm Dragos in February warned that commodity malware and wormable ransomware continued to pose significant risks. Last August, it noted, an operational error during a software installation at Taiwan Semiconductor Manufacturing Co. caused a WannaCry infection that affected more than 10,000 machines, leading to a financial impact of at least $250 million.

"We anticipate increased risk of operational losses due to incidental malware infections in ICS environments; the results of mishaps during initial intrusion and reconnaissance operations within the [operational technology] realm; and new disruptive attacks based on the results of increasing research and reconnaissance activity," Dragos said in a white paper assessing ICS activity groups and the threat landscape over 2018.

Inside the LockerGoga Crypt

According to Andrea Carcano, co-founder and chief product officer with Nozomi Networks, a firm that performs real-time ICS monitoring, a notable aspect of the Norsk Hydro cyberattack is the company's laudable incident response. Though the company's website is still down as of noon EST on March 19, "They made a live stream with a brief on the attack and they're keeping all informed using their Facebook channel," he told POWER on Tuesday. 

LockerGoga, like other ransomware, seeks to hold data ransom, he noted, but it is especially insidious because it is able to encrypt files that have the following extensions: doc, dot, wbk, docx, dotx, docb, xlm, xlsx, xltx, xlsb, xlw, ppt, pot, pps, pptx, potx, ppsx, sldx, pdf. "The extension types are an indicator that the main goal of the threat actor is to encrypt files containing important data for the users," he said. A user would know they've been infected because the targeted files would be encrypted and the extension ".locked" would be attached to the end of the filenames, he explained. 

Carcano also said that at the end of the encryption phase, attackers dropped a "README-NOW.txt" file inside the filesystem. It contains the following message, which essentially extorts users to pay a ransom using Bitcoin cryptocurrency if they want their files back: 

LockerGoga ransom note as dropped in a "README-NOW.txt" file inside the filesystem. Courtesy: Nozomi Networks

Notably, "The malware is not able to spread itself to other targets. It seems to implement some anti-analysis techniques in order to hide itself from analysts; for example, it seems to detect the presence of a Virtual Machine and have the capability to delete itself from the filesystem trying to avoid the sample collection," Carcano explained. "Considering the fact that the attackers were not interested in adding custom and complex capabilities (C&C, DNS beaconing, etc.) we can assume the scope was merely disruptive and did not have an espionage intent." 

He also pointed out that some research suggests, and NorCERT confirmed–but it remains unconfirmed by Nozomi Networks Labs–that the attackers could have used Active Directory as a mechanism for spreading the malware. That raised a possible scenario of "an attacker that was already able to infect a targeted system registered in the Domain Admin Group could have placed the malicious executable in the Netlogon directory so that could be automatically propagated to every Domain Controller," he said, noting that many firewalls accept the Active Directory by default. 

According to Tyler Moffitt, security analyst at internet security firm Webroot, another notable aspect of LockerGoga is that its encryption process is "slow." That's "because it creates a new process each time it encrypts a new file and also exhibits no detection evasion techniques, showing a lack of sophistication," he said. Moffitt also noted LockerGoga was signed using a valid digital certificate, which has since been revoked. "We have been protecting our customers from LockerGoga since we first encountered it January 14th and do expect it to become a big player in the ransomware scene, but will monitor its progress," he told POWER in a statement on Tuesday. 

A Realm of Vulnerable Targets

As more details about the Norsk Hydro attack emerge, a number of ICS cybersecurity experts noted the incident spurred alarms about how vulnerable critical infrastructure can be to ransomware.

"Manufacturing companies are an obvious target for ransomware because downtime is measured in millions of dollars per day–so as you might expect, CEOs are eager to pay," Phil Neray, vice president of Industrial Cybersecurity at Boston-based IIOT and ICS security firm CyberX, told POWER. "Plus the security of industrial networks has been neglected for years, so malware spreads quickly from infected employee computers in a single office to manufacturing plants in all other countries." Neray noted these attacks are especially serious for metal or chemical manufacturers "because of the risk of serious safety and environmental incidents, and the bottom-line impact from spoilage of in-process materials and clean-up costs."

However, Barak Perelman, CEO of ICS security firm Indegy, on Tuesday told POWER that at this early stage, there was no indication that Norsk Hydro had been specifically targeted. "It is safe to assume that this was a generic ransomware type of attack similar to Wannacry," he said. "It appears that the initial attack began on the IT network and quickly propagated to the [operational technology (OT)] side of the house, which forced production to be taken offline."

But Perelman–and other ICS security experts–stressed that the incident illustrates the risks associated with connecting industrial control system environments to IT networks and/or the internet. "The two main problems have to do with patching and recovery of OT systems," he explained. 

"Many ICS devices are end of life, so vendors do not issue patches for them. Therefore, they cannot be patched against known vulnerabilities. Second, many operators have not invested in security and monitoring tools. This makes it difficult to detect attacks until it's too late. Meanwhile, restoring ICS systems from backups is often not possible since logs and back-ups don't exist. Without tools that provide visibility and security controls across both IT and OT environments, nuisance attacks like this one are difficult to defend against and can cause material damages to operations," he said.

Nozomi Networks' Carcano also noted the attack offered a stark reminder that security requirements are constantly changing as industrial organizations continue to modernize and introduce internet-enabled technology into plants.

"While these new digital processes can offer significant benefits to industrial organizations, they also provide new opportunities for attackers, as potential entry-points into networks," he said. "As industrial organizations automate and digitize plant floors, the security of these new processes must be forethought to reduce the risks of potential attacks."

–Sonal Patel is a POWER associate editor (@sonalcpatel, @POWERmagazine)

Sign up today for our free weekly e-letter

sign up

Aerospace

Chemical

Cybersecurity

Healthcare

Oil & Gas

Power

Quiz

Transportation

Webinars

About Us

IIoT Connection delivers the latest news, trends, insights, events and research surrounding the dynamic and disruptive Industrial Internet of Things (IIoT) marketplace. Brought to you by the publisher of must-read publications Defense Daily, OR Manager, POWER and Chemical Engineering, as well as the conference producers of SATELLITE, Global Connected Aircraft Summit, Connected Plant Conference and ELECTRIC POWER, IIoT Connection is committed to providing the most comprehensive compilation of products and services dedicated to the Industrial Internet of Things. Key verticals with associated products and services include: aerospace, chemical, cybersecurity, healthcare, oil & gas, power, and transportation.


Advertise

  • Privacy Policy
© 2021 Access Intelligence, LLC - All Rights Reserved.
  • × UPS Partners with Wingcopter to Develop, Certify Drone Delivery Fleet
    Read story View all articles
  • × How Industrial Managers Can Identify and Prevent Failures in Facilities
    Read story View all articles
  • × Federal Agencies Partner To Improve Cyber Security Cooperation In Energy Sector
    Read story View all articles
  • × New service lines can create opportunities for ORs
    Read story View all articles
  • × Equinor and Shell to collaborate on digital solutions
    Read story View all articles
  • × Dobroflot to Manage Fuel Savings With IOT Solution By Orange Business Services
    Read story View all articles
  • × The Future of 5G & IoT Technologies in the Transportation Industry
    Read story View all articles
  • ×
    Read story View all articles
  • ×
    Read story View all articles
  • ×
    Read story View all articles
  • ×
    Read story View all articles
  • ×
    Read story View all articles
  • ×
    Read story View all articles
  • ×
    Read story View all articles
  • ×
    Read story View all articles
  • ×
    Read story View all articles
  • ×
    Read story View all articles