Incident: Aluminium Producer Hit by Severe Ransomware Attack, Operations Disrupted

Published Date: 2019-03-19

Postmortem Analysis
Timeline 1. The software failure incident of the severe ransomware attack on Hydro's aluminium plants happened on Monday night [82020]. Therefore, the estimated timeline for the software failure incident is March 18, 2019.
System 1. Digital systems at Hydro's main smelting plants 2. Computerized systems at some of the facilities 3. Machinery efficiency systems 4. Data backups
Responsible Organization 1. The software failure incident, a severe ransomware attack on Hydro, was potentially caused by a relatively new form of ransomware known as LockerGoga, as suggested by Norwegian security authorities [82020]. 2. The specific entity or group behind the attack was not confirmed by Hydro's spokesman at the time of the incident [82020].
Impacted Organization 1. Hydro, one of the world's biggest aluminium producers, with operations in 40 countries, was impacted by the severe ransomware attack [82020]. 2. US factories and smelting plants in Norway owned by Hydro were affected by the attack [82020].
Software Causes 1. Ransomware attack, specifically the LockerGoga ransomware, causing severe disruption to Hydro's digital systems and operations [82020].
Non-software Causes 1. The failure incident was caused by a "severe" ransomware attack, which is a form of cyber-attack [82020]. 2. The ransomware attack led to the switch to manual operations at some smelting plants [82020]. 3. The attack affected some of the company's factories, leading to halted production in some facilities [82020]. 4. Employees were instructed not to log in to their computers, leading to the use of mobile phones and tablets for accessing emails [82020]. 5. Workers resorted to using printed order lists as they were unable to retrieve order data from their computers [82020]. 6. The cyber-attack potentially involved a relatively new form of ransomware known as LockerGoga [82020]. 7. The attack led to the shutdown of digital systems at Hydro's main smelting plants, which are crucial for ensuring machinery works efficiently [82020].
Impacts 1. Some of Hydro's factories had to halt production due to the ransomware attack, leading to disruptions in operations [82020]. 2. Workers at affected factories had to switch to manual operations, using printed order lists and alternative methods to access necessary data since they were unable to retrieve order data from their computers [82020]. 3. Digital systems at Hydro's main smelting plants had to be turned off, impacting the efficiency of machinery that relied on computerized systems [82020]. 4. Work was stopped at some metal extrusion plants, affecting the processing of aluminium into products like building facades [82020]. 5. Hydro's main public-facing website was offline, potentially impacting communication with stakeholders and customers [82020].
Preventions 1. Implementing robust cybersecurity measures such as regular security audits, penetration testing, and employee training to prevent ransomware attacks [82020]. 2. Ensuring timely software updates and patches to address vulnerabilities that could be exploited by attackers [82020]. 3. Utilizing multi-factor authentication to enhance the security of systems and prevent unauthorized access [82020].
Fixes 1. Restoring systems from data backups could fix the software failure incident at Hydro following the ransomware attack [82020].
References 1. Hydro's chief financial officer Eivind Kallevik 2. Norwegian security authorities 3. Spokesman for Hydro 4. Cyber-security expert Kevin Beaumont 5. Norway's state cyber-security agency [82020]

Software Taxonomy of Faults

Category Option Rationale
Recurring multiple_organization (a) The software failure incident having happened again at one_organization: The article does not mention any previous incidents of a similar ransomware attack happening at Hydro or with its products and services. Therefore, there is no information available to suggest that a similar incident has happened before within the same organization [82020]. (b) The software failure incident having happened again at multiple_organization: The article mentions that the ransomware attack on Hydro was caused by a relatively new form of ransomware known as LockerGoga. This indicates that similar incidents may have occurred at other organizations or could potentially happen in the future with different targets [82020].
Phase (Design/Operation) design, operation (a) The software failure incident in the article is related to the design phase as it mentions that the cyber-attack on Hydro's systems was caused by a relatively new form of ransomware known as LockerGoga. The attack was likely deployed to Hydro's systems manually by an attacker, indicating a design vulnerability that allowed the ransomware to infiltrate the systems [82020]. (b) The software failure incident in the article is also related to the operation phase as it describes how some of Hydro's factories had to halt production and workers had to resort to manual operations using printed order lists due to the cyber-attack. Additionally, employees were instructed not to log in to their computers, and digital systems at Hydro's main smelting plants had to be turned off, impacting the operation of the facilities [82020].
Boundary (Internal/External) within_system, outside_system (a) within_system: The software failure incident at Hydro, a major aluminium producer, was caused by a "severe" ransomware attack that affected the company's digital systems, leading to the shutdown of some factories and the switch to manual operations at smelting plants [82020]. The attack impacted the company's ability to access order data, forcing workers to use printed order lists instead of retrieving data from their computers. Additionally, the cyber-attack disrupted the functioning of computerized systems at the main smelting plants, which had to be turned off as a result [82020]. (b) outside_system: The ransomware attack on Hydro's systems was initiated externally, as it was caused by a cyber-attack involving a relatively new form of ransomware known as LockerGoga. The attack was not confirmed to be specifically caused by LockerGoga, but Norwegian security authorities were investigating this possibility. The attack was likely deployed manually by an attacker who gained administrator access to Hydro's systems, indicating an external origin of the contributing factors leading to the software failure incident [82020].
Nature (Human/Non-human) non-human_actions (a) The software failure incident occurring due to non-human actions: The software failure incident in this case was caused by a "severe" ransomware attack on one of the world's biggest aluminium producers, Hydro. The attack led to the company switching to manual operations at some smelting plants, halting production at some factories, and forcing workers to use mobile phones and tablets for communication as their computers were affected [82020]. (b) The software failure incident occurring due to human actions: The article does not provide specific information indicating that the software failure incident was directly caused by human actions. It primarily focuses on the impact of the ransomware attack on Hydro's operations and the measures taken to address the situation. Therefore, the direct human involvement in causing the software failure incident is not explicitly mentioned in the article.
Dimension (Hardware/Software) software (a) The software failure incident reported in Article 82020 was not directly attributed to hardware issues. The incident was described as a "severe" ransomware attack affecting one of the world's biggest aluminium producers, Hydro. The attack led to the company switching to manual operations at some smelting plants, halting production at some factories, and causing disruptions in accessing computer systems. The focus of the incident was on cyber-attack and ransomware impact rather than hardware-related failures. (b) The software failure incident in Article 82020 was primarily attributed to software-related factors. The incident was described as a ransomware attack, specifically mentioning a form of ransomware known as LockerGoga. The attack affected digital systems at Hydro's main smelting plants, leading to the shutdown of computerized systems and the need to revert to less computerized methods to continue production. The incident highlighted the reliance on computerized systems and the impact of the cyber-attack on software operations within the company.
Objective (Malicious/Non-malicious) malicious (a) The software failure incident in this case is malicious. The incident was a "severe" ransomware attack on one of the world's biggest aluminium producers, Hydro, affecting their operations at smelting plants and forcing them to switch to manual operations [82020]. The ransomware attack was suspected to be caused by a relatively new form of ransomware known as LockerGoga, and it was not yet clear who was behind the attack [82020]. The attack led to the shutdown of some factories, disruption of production, and the need to revert to manual processes due to the inability to access computer systems [82020]. The incident required the company to work on containing and neutralizing the attack with the help of Norway's state cyber-security agency [82020]. (b) The software failure incident is non-malicious. The incident was caused by a ransomware attack, which is a type of malicious software designed to block access to a computer system until a sum of money is paid. The attack on Hydro's systems was not intentional on the part of the company but was initiated by external attackers [82020]. The company had to resort to manual operations and backup systems to continue production and mitigate the impact of the attack [82020].
Intent (Poor/Accidental Decisions) unknown (a) The software failure incident in Article 82020 was related to a severe ransomware attack on one of the world's biggest aluminium producers, Hydro. The attack led to the company switching to manual operations at some smelting plants. The incident was not caused by poor decisions but rather by a deliberate cyber-attack using ransomware, potentially the LockerGoga ransomware. The attack was likely manually deployed by an attacker who gained administrator access to the systems, indicating a deliberate and malicious intent rather than poor decisions [82020].
Capability (Incompetence/Accidental) unknown (a) The software failure incident in Article 82020 was not attributed to development incompetence. The ransomware attack on Hydro, one of the world's biggest aluminium producers, was caused by a cyber-attack using a relatively new form of ransomware known as LockerGoga. The attack was not linked to any incompetence in the development process but rather a deliberate malicious act by an external attacker [82020]. (b) The software failure incident in Article 82020 was accidental in the sense that the ransomware attack was not caused by any accidental factors within the development process. It was a deliberate cyber-attack on Hydro's systems, likely deployed manually by an attacker who gained administrator access to the systems. The attack was not accidental but intentional and malicious in nature [82020].
Duration temporary The software failure incident reported in Article 82020 was temporary. The article mentions that Hydro, one of the world's biggest aluminium producers, switched to manual operations at some smelting plants following a "severe" ransomware attack. Some factories had to halt production, and workers were using printed order lists while being unable to retrieve order data from their computers. However, the firm stated that it was working to contain and "neutralize" the attack and had data backups ready to restore systems once the virus had been dealt with. This indicates that the software failure incident was temporary and efforts were being made to address and recover from the attack [82020].
Behaviour omission, other (a) crash: The software failure incident in the article is not described as a crash where the system loses state and does not perform any of its intended functions [82020]. (b) omission: The incident involves the system omitting to perform its intended functions at some instances, such as workers at some factories using printed order lists while being unable to retrieve order data from their computers [82020]. (c) timing: The software failure incident does not involve the system performing its intended functions correctly but too late or too early [82020]. (d) value: The incident does not describe the system performing its intended functions incorrectly [82020]. (e) byzantine: The behavior of the software failure incident does not involve the system behaving erroneously with inconsistent responses and interactions [82020]. (f) other: The software failure incident in the article involves the system reverting back to less computerized methods to continue production when digital systems had to be turned off at some facilities due to the attack [82020].

IoT System Layer

Layer Option Rationale
Perception processing_unit, network_communication (a) sensor: The articles do not specifically mention any sensor-related errors contributing to the software failure incident. [82020] (b) actuator: The articles do not specifically mention any actuator-related errors contributing to the software failure incident. [82020] (c) processing_unit: The articles mention that digital systems at Hydro's main smelting plants were programmed to ensure machinery worked efficiently. However, these systems had to be turned off at some facilities due to the cyber-attack, indicating a failure related to the processing unit. [82020] (d) network_communication: The articles mention that Hydro's main public-facing website is currently offline, and employees are using mobile phones and tablets to access emails due to the cyber-attack, suggesting a failure related to network communication. [82020] (e) embedded_software: The articles do not explicitly mention any issues related to embedded software contributing to the software failure incident. [82020]
Communication unknown The software failure incident reported in Article 82020 does not provide specific details indicating whether the failure was related to the communication layer of the cyber physical system that failed. The article primarily focuses on the ransomware attack affecting Hydro's operations, including the switch to manual operations, halting production at some factories, and the investigation into the cyber-attack. Therefore, it is unknown whether the failure was specifically related to the communication layer at either the link level or connectivity level.
Application TRUE The software failure incident reported in Article 82020 was related to a ransomware attack on Hydro, one of the world's biggest aluminium producers. The attack affected the company's digital systems, leading to the shutdown of some smelting plants and forcing operations to switch to manual mode. Employees were unable to log in to their computers, and some facilities had to rely on printed order lists due to the inability to access order data from computers. The cyber-attack disrupted the normal functioning of the company's computerized systems, indicating a failure at the application layer of the cyber physical system [82020].

Other Details

Category Option Rationale
Consequence property, delay, non-human, theoretical_consequence (d) property: People's material goods, money, or data was impacted due to the software failure The software failure incident, a ransomware attack on aluminium producer Hydro, led to the company switching to manual operations at some smelting plants. The attack forced some factories to halt production, and employees were instructed not to log in to their computers. Workers had to resort to using mobile phones and tablets for email access, and printed order lists were used as they couldn't retrieve order data from computers. Additionally, digital systems at Hydro's main smelting plants had to be turned off, affecting the efficiency of machinery. The incident also caused the company's website to go offline, impacting its online presence and potentially affecting customer interactions and business operations [82020].
Domain manufacturing (a) The failed system was related to the manufacturing industry. The article mentions that Hydro, one of the world's biggest aluminium producers, had to switch to manual operations at some smelting plants due to a "severe" ransomware attack. This incident impacted the production at the company's factories and metal extrusion plants where aluminium is processed into products [82020].

Sources

Back to List