Skip to content

Services, Wiki-Artikel, Blog-Beiträge und Glossar-Einträge durchsuchen

↑↓NavigierenEnterÖffnenESCSchließen
Cyber attack on aluminium company Norsk Hydro!
Offensive Security

Cyber attack on aluminium company Norsk Hydro!

Cyber attack on aluminium group - automated operation is no longer possible. With a turnover of 109 billion dollars, Norsk Hydro is one of the largest in its in...

Chris Wojzechowski Chris Wojzechowski Geschäftsführender Gesellschafter
Updated: October 9, 2024 2 min read read
IT-Grundschutz-Praktiker (TÜV) IT Risk Manager (DGI) § 8a BSIG Prüfverfahrenskompetenz Ausbilderprüfung (IHK)

TL;DR

In March 2019, Norwegian aluminium giant Norsk Hydro was hit by the LockerGoga ransomware, disrupting automated operations across plants in Europe and America. With over $109 billion in turnover, the attack highlighted that even large enterprises with dedicated security resources are not immune. Active Directory compromise prevented authentication and authorization. The company switched to manual operations and shared updates via Facebook. The stock dropped 3%, though no personnel were injured. The attack origin and infection vector remained unknown.

Table of Contents (3 sections)

Cyber attack on aluminium group - automated operation is no longer possible. With a turnover of 109 billion dollars, Norsk Hydro is one of the largest in its industry. On the night of Tuesday the company was attacked by hackers according to its own statements.

Norsk Hydro is active in 50 countries, plants in Europe and America affected!

The company has its own company spokesman Halvor Molland say that the situation is "very serious". The company does not allow itself to be carried away by further statements. It is still too early to estimate or even quantify the extent of the attack. In the meantime, however, it has turned out that the ransom commodity "LockerGoga" is responsible for the failure. The encryption strojan is still quite new in the scene. Victims of this Trojan have already been Altran Technologies. Despite NorCert's indications that the company was in the focus of ransomware, it did not protect against infection. Since the Active Directory is affected, neither authentication nor authorization can be performed.

Cyberattacke on aluminium company - updates available on Facebook!

The Company does not only share information at the 18-minute press conference. Updates are available regularly on Facebook. Currently, you can read there that neither the damage nor the extent can be estimated for other areas. All efforts are currently focused on the elimination and containment of the Trojan. Where the attack came from, how the Trojan made it into the company - and above all how it spread so quickly and so successfully - is not known. A good backup strategy and routines is available. This would answer the most important question for the time being. With the big waves of Petya/NotPetya the claim "No backup, no pity" has not got around for nothing. People are not injured either. The losses due to the limited position are minimal. The share, on the other hand, slips by 3%. Cyberattack on aluminium company - Hydro Norsk is under attack! (Source: bleepingcomputer.com)

Group infrastructure, high budgets and automation do not protect against modern attacks!

A Ransomware attack on a company is not uncommon. On the other hand, it is not uncommon for a company of this size to be affected. Was it a targeted attack, a mail with attachment or a security hole? Let's wait and see!

Next Step

Our certified security experts will advise you on the topics covered in this article — free and without obligation.

Free · 30 minutes · No obligation

Share this article

About the author

About the Author

Chris Wojzechowski
Chris Wojzechowski

Geschäftsführender Gesellschafter

E-Mail

Geschäftsführender Gesellschafter der AWARE7 GmbH mit langjähriger Expertise in Informationssicherheit, Penetrationstesting und IT-Risikomanagement. Absolvent des Masterstudiengangs Internet-Sicherheit an der Westfälischen Hochschule (if(is), Prof. Norbert Pohlmann). Bestseller-Autor im Wiley-VCH Verlag und Lehrbeauftragter der ASW-Akademie. Einschätzungen zu Cybersecurity und digitaler Souveränität erschienen u.a. in Welt am Sonntag, WDR, Deutschlandfunk und Handelsblatt.

10 Publikationen
  • Einsatz von elektronischer Verschlüsselung - Hemmnisse für die Wirtschaft (2018)
  • Kompass IT-Verschlüsselung - Orientierungshilfen für KMU (2018)
  • IT Security Day 2025 - Live Hacking: KI in der Cybersicherheit (2025)
  • Live Hacking - Credential Stuffing: Finanzrisiken jenseits Ransomware (2025)
  • Keynote: Live Hacking Show - Ein Blick in die Welt der Cyberkriminalität (2025)
  • Analyse von Angriffsflächen bei Shared-Hosting-Anbietern (2024)
  • Gänsehaut garantiert: Die schaurigsten Funde aus dem Leben eines Pentesters (2022)
  • IT Security Zertifizierungen - CISSP, T.I.S.P. & Co (Live-Webinar) (2023)
  • Sicherheitsforum Online-Banking - Live Hacking (2021)
  • Nipster im Netz und das Ende der Kreidezeit (2017)
IT-Grundschutz-Praktiker (TÜV) IT Risk Manager (DGI) § 8a BSIG Prüfverfahrenskompetenz Ausbilderprüfung (IHK)
Certified ISO 27001ISO 9001AZAV