Incident: Industrial Firms Paralyzed by LockerGoga Ransomware Attack

Published Date: 2019-03-25

Postmortem Analysis
Timeline 1. The software failure incident involving LockerGoga impacting Norwegian aluminum manufacturer Norsk Hydro occurred last week before the article was published on March 25, 2019 [Article 81836]. Therefore, the incident likely occurred in March 2019.
System 1. Industrial and manufacturing firms' computers controlling physical equipment were paralyzed by the LockerGoga ransomware, leading to catastrophic consequences [81836].
Responsible Organization 1. The software failure incident involving LockerGoga ransomware was caused by unknown hackers who targeted industrial and manufacturing firms, such as Norsk Hydro, Hexion, and Momentive [81836].
Impacted Organization 1. Norwegian aluminum manufacturer Norsk Hydro [81836] 2. French engineering consulting firm Altran [81836] 3. Manufacturing companies Hexion and Momentive [81836]
Software Causes 1. The failure incident was caused by a new breed of ransomware known as LockerGoga, which paralyzed computers across industrial and manufacturing firms, leading to catastrophic consequences [81836].
Non-software Causes 1. Lack of physical fail-safes in industrial environments that could prevent dangerous accidents [81836] 2. Potential inability to react to changing situations due to loss of control or monitoring capabilities [81836] 3. Possibility of causing emergency shutdowns in industrial facilities, leading to significant disruptions and financial losses [81836]
Impacts 1. The software failure incident involving LockerGoga ransomware had catastrophic consequences for various industrial and manufacturing firms, including Norwegian aluminum manufacturer Norsk Hydro, which had to switch some of its plants to manual operations [81836]. 2. The incident led to a "global IT outage" at Momentive, another manufacturing company affected by LockerGoga [81836]. 3. The ransomware attack resulted in the paralysis of computers, locking out users, and making it difficult for victims to even pay the ransom, causing significant disruptions to the affected companies [81836]. 4. The malware not only encrypted files but also disabled the computer's network adapter, changed passwords, and logged the machine off, further complicating the recovery process for victims [81836]. 5. The disruptive nature of LockerGoga's attack, which went beyond typical ransomware by disabling systems entirely, threw operations into chaos and made it challenging for users to even access the ransom note, potentially delaying recovery efforts [81836].
Preventions 1. Implementing strong cybersecurity measures such as multi-factor authentication and regular security audits to prevent initial network intrusions [81836]. 2. Educating employees on cybersecurity best practices to prevent phishing attacks and credential theft [81836]. 3. Enhancing network security by using advanced threat detection tools to identify and mitigate potential threats [81836]. 4. Regularly updating and patching software to address vulnerabilities that could be exploited by hackers [81836]. 5. Implementing robust backup and disaster recovery plans to ensure quick recovery in case of a ransomware attack [81836].
Fixes 1. Enhancing network security measures to prevent initial access by hackers, such as improving credentials management and implementing stronger authentication methods [81836]. 2. Implementing robust cybersecurity protocols and tools to detect and prevent ransomware attacks, including regular security assessments and updates [81836]. 3. Educating employees on cybersecurity best practices to prevent phishing attacks and unauthorized access to sensitive information [81836]. 4. Developing and testing disaster recovery and incident response plans to quickly recover from ransomware incidents and minimize operational disruptions [81836].
References 1. Security researchers at FireEye [81836] 2. Security research group MalwareHunterTeam [81836] 3. UK security researcher Kevin Beaumont [81836] 4. Earl Carter, a researcher at Cisco's Talos division [81836] 5. Joe Slowik, a researcher at the security firm Dragos [81836] 6. German government report on the incident involving a German steel mill [81836]

Software Taxonomy of Faults

Category Option Rationale
Recurring one_organization, multiple_organization (a) The software failure incident having happened again at one_organization: The incident of the LockerGoga ransomware attack has affected multiple organizations. For example, after an initial infection at the French engineering consulting firm Altran, LockerGoga also hit Norwegian aluminum manufacturer Norsk Hydro, forcing some of the company's aluminum plants to switch to manual operations [81836]. This shows that the same type of software failure incident occurred again within the organization of Norsk Hydro. (b) The software failure incident having happened again at multiple_organization: The LockerGoga ransomware attack has impacted multiple organizations. Apart from Norsk Hydro, other manufacturing companies like Hexion and Momentive have also been hit by LockerGoga, with Momentive experiencing a "global IT outage" [81836]. Additionally, security researchers have dealt with multiple LockerGoga attacks on other industrial and manufacturing targets that were not specifically named, indicating that the incident has occurred at multiple organizations [81836].
Phase (Design/Operation) design, operation (a) The software failure incident related to the design phase can be seen in the case of the LockerGoga ransomware attack on industrial firms like Norsk Hydro, Hexion, and Momentive. The ransomware paralyzed computers across these companies, leading to catastrophic consequences such as global IT outages and forcing some plants to switch to manual operations. The attackers gained initial access to victim networks through various means, possibly including phishing attacks or purchasing credentials from other hackers. They then used common hacking toolkits and techniques to move laterally within the networks and plant their ransomware payload on target machines [81836]. (b) The software failure incident related to the operation phase is evident in how LockerGoga goes beyond typical ransomware attacks by not only encrypting files but also disabling the computer's network adapter, changing user and admin passwords, and logging the machine off. This level of disruption makes it difficult for victims to even see the ransom message, delaying their ability to recover their systems or pay the extortionists and causing greater disruptions to their network operations. The aggressive effects of LockerGoga on industrial firms pose a serious risk, potentially leading to unsafe conditions or industrial accidents if the ransomware infects the computers controlling industrial equipment [81836].
Boundary (Internal/External) within_system, outside_system (a) The software failure incident described in the article is primarily within_system. The ransomware known as LockerGoga is designed to fully paralyze computers within industrial and manufacturing firms by encrypting files, locking out users, disabling network adapters, changing passwords, and logging machines off [81836]. The hackers gain initial access to victim networks through various means such as phishing attacks or purchasing credentials from other hackers. Once inside the network, they use common hacking toolkits to move laterally and exploit vulnerabilities to plant their ransomware payload on target machines. The ransomware then rapidly encrypts the computer's files, making the system inoperable and causing significant disruptions to the affected organizations.
Nature (Human/Non-human) non-human_actions, human_actions (a) The software failure incident in the article was primarily due to non-human actions, specifically the ransomware known as LockerGoga. This ransomware paralyzed computers across industrial firms, leading to catastrophic consequences such as forcing aluminum plants to switch to manual operations and causing global IT outages [81836]. (b) However, human actions also played a role in the software failure incident. The hackers behind LockerGoga gained initial access to victim networks through various means such as phishing attacks or purchasing credentials from other hackers. They used hacking toolkits and exploited vulnerabilities to move through the network and plant their ransomware payload on target machines. Additionally, the hackers disabled antivirus software on target machines before running their encryption code, making it more difficult for victims to defend against the attack [81836].
Dimension (Hardware/Software) software (a) The software failure incident reported in the article is primarily due to factors originating in software rather than hardware. The incident involves a new breed of ransomware known as LockerGoga that has paralyzed industrial firms' computers, leading to catastrophic consequences such as forcing aluminum plants to switch to manual operations and causing global IT outages [81836]. (b) The software failure incident is directly related to software factors, specifically the LockerGoga ransomware, which encrypts files, locks out users, disables computers entirely, changes passwords, and disconnects machines from the network. The ransomware's disruptive nature goes beyond typical ransomware attacks, causing significant chaos and disruptions to the victim's network operations [81836].
Objective (Malicious/Non-malicious) malicious (a) The software failure incident described in the article is malicious in nature. It involves a ransomware attack by a new breed of ransomware known as LockerGoga, which targets industrial and manufacturing firms with the intent to extort money by encrypting files and fully paralyzing computers across the company [81836]. The attackers use various techniques to gain initial access to victim networks, move laterally within the network, disable antivirus software, encrypt files, and demand ransom payments in bitcoin. The ransomware also goes further by disabling the computer's network adapter, changing passwords, and logging the machine off, causing significant disruption and chaos within the victim's network [81836]. (b) The software failure incident is not non-malicious. It is a deliberate and targeted attack by threat actors seeking financial gain through extortion. The attackers demonstrate knowledge of the victim's network, use sophisticated hacking tools, and employ tactics to maximize the impact of the ransomware, indicating a malicious intent to harm the systems and disrupt operations [81836].
Intent (Poor/Accidental Decisions) poor_decisions (a) The intent of the software failure incident: The software failure incident involving LockerGoga ransomware appears to be driven by poor decisions made by the threat actors behind the attack. The ransomware not only encrypts files but also fully paralyzes computers across industrial firms, causing catastrophic consequences. The attackers deliberately target industrial and manufacturing firms, knowing that these companies are highly incentivized to quickly pay the ransom. The attackers use aggressive tactics such as disabling the network adapter, changing passwords, and logging machines off, making it extremely difficult for victims to even pay the ransom. This deliberate and disruptive approach suggests a malicious intent to cause significant harm and financial loss to the targeted companies [81836].
Capability (Incompetence/Accidental) development_incompetence (a) The software failure incident related to development incompetence is evident in the case of the LockerGoga ransomware attack on industrial firms. The attackers behind LockerGoga demonstrated a high level of professional competence in their malicious activities. They were able to gain initial access to victim networks, move laterally within the networks using common hacking toolkits, exploit vulnerabilities, and plant ransomware payloads on target machines [81836]. (b) The accidental aspect of the software failure incident is not explicitly mentioned in the articles. The incident primarily revolves around deliberate and targeted actions by the hackers behind the LockerGoga ransomware, rather than accidental factors.
Duration permanent (a) The software failure incident described in the article is more of a permanent nature. The LockerGoga ransomware attack on industrial firms, such as Norsk Hydro, Hexion, and Momentive, resulted in catastrophic consequences, including global IT outages and the need to switch to manual operations [81836]. The ransomware not only encrypted files but also fully paralyzed computers, leading to significant disruptions and potential physical harm to equipment and staff. The attackers used various techniques to gain access to victim networks, plant ransomware payloads, and disable antivirus measures, making recovery and system restoration challenging for the affected companies. The disruptive nature of LockerGoga, which goes beyond typical ransomware attacks, indicates a more permanent impact on the targeted systems and operations.
Behaviour omission, byzantine, other (a) crash: The software failure incident described in the article is related to a ransomware attack known as LockerGoga. This ransomware fully paralyzes computers across industrial firms, forcing some companies to switch to manual operations and causing global IT outages [81836]. (b) omission: The ransomware incident caused by LockerGoga leads to a failure of the system to perform its intended functions, as it locks out users, disables the network adapter, changes passwords, and logs machines off, preventing victims from even seeing the ransom message in some cases [81836]. (c) timing: The ransomware incident does not specifically mention failures related to timing issues. (d) value: The ransomware incident does not specifically mention failures related to the system performing its intended functions incorrectly. (e) byzantine: The behavior of the ransomware incident can be considered as byzantine due to the erratic and disruptive actions taken by LockerGoga, such as disabling network adapters, changing passwords, and logging machines off, leading to chaos and significant disruptions in the network [81836]. (f) other: The ransomware incident also showcases a behavior where the attackers plant their ransomware payload on target machines across the victim's systems using stolen certificates to make it look more legitimate. They also disable antivirus software on target machines before running their encryption code, making antivirus measures ineffective against the infections [81836].

IoT System Layer

Layer Option Rationale
Perception unknown The software failure incident described in the article does not provide specific details about the failure being related to the perception layer of the cyber physical system that failed. Therefore, it is unknown whether the failure was specifically due to a sensor error, actuator error, processing error, network communication error, or embedded software error.
Communication unknown The articles do not provide specific information about whether the failure was related to the communication layer of the cyber physical system that failed.
Application TRUE The software failure incident described in the article [81836] was related to the application layer of the cyber physical system. The incident involved a ransomware attack by LockerGoga that paralyzed computers across industrial firms, including Norwegian aluminum manufacturer Norsk Hydro, leading to manual operations at some of the company's aluminum plants and causing a "global IT outage" at Momentive. The ransomware fully paralyzed the computers, shut down systems entirely, locked out users, and made it difficult for victims to even pay the ransom, indicating a failure at the application layer due to the malicious actions of the ransomware.

Other Details

Category Option Rationale
Consequence property, non-human (d) property: People's material goods, money, or data was impacted due to the software failure The software failure incident involving LockerGoga ransomware had significant consequences on industrial and manufacturing firms. For example, the incident at Norsk Hydro, a Norwegian aluminum manufacturer, forced some of the company's aluminum plants to switch to manual operations due to the paralysis caused by the ransomware [81836]. Additionally, other manufacturing companies like Hexion and Momentive experienced a "global IT outage" due to the LockerGoga attack, impacting their operations and potentially causing financial losses [81836]. The ransomware encrypted computer files, rendering them inaccessible and disrupting normal business activities, which could have led to financial losses for the affected companies.
Domain manufacturing (a) The failed system was intended to support the manufacturing industry. The software failure incident affected industrial and manufacturing firms, such as the French engineering consulting firm Altran, Norwegian aluminum manufacturer Norsk Hydro, Hexion, and Momentive [81836].

Sources

Back to List