Ransomware Forces Two Chemical Companies to Order ‘Hundreds of New Computers’



shutterstock_1084060253

Motherboard reported: "It appears that LockerGoga, the same ransomware that hit aluminum manufacturing giant Norsk Hydro this week, also infected American chemicals companies Hexion and Momentive, leaving employees locked out of their computers.

Hexion and Momentive, which make resins, silicones, and other materials, and are controlled by the same investment fund, were hit by the ransomware on March 12, according to a current employee. An internal email obtained by Motherboard and signed by Momentive’s CEO Jack Boss refers to a “global IT outage” that required the companies to deploy “SWAT teams” to manage.

Based on the ransom message, the ransomware that hit Hexion and Momentive appears to be LockerGoga, the same ransomware that forced an aluminum manufacturing giant Norsk Hydro to shut down its worldwide network this week. Motherboard cross-referenced the ransom message associated with the Momentive attack to known LockerGoga attacks, and found that the language and formatting were identical.

On the day of the attack, some of the companies’ Windows computers were hit with a blue screen error and their files encrypted, said the current employee, who asked to remain anonymous as they were not authorized to speak to the press.

“Everything [went down]. Still no network connection, email, nothing,” they said in an online chat on Thursday. Boss’s email said that the data on any computers that were hit with the ransomware is probably lost, and that the company has ordered "hundreds of new computers.”

On Friday evening, Hexion announced in a press release that it was working to resume normal operations “in response to a recent network security incident.”

Boss's email indicates that the ransomware first hit the company last week, and explains what the company is doing to recover. Among the measures taken, Boss wrote that the Momentive is giving some employees new email accounts because their old ones are still inaccessible." No news yet exactly how they got infected. Full Story here.

Graeme Newman, chief innovation officer at CFC Underwriting, a London-based cyber liability specialist, commented on the Hydro cyber attack and the possible lessons learned for other insurance buyers.

“The long-term implications of the cyber-attack on Norsk Hydro will depend on whether it affected solely the corporate network or industrial control systems too. If the former, the initial investigation and remediation costs could potentially run into the millions,” said Newman in an emailed statement.

“The company will also likely be hit with lost production value (which, based on their gross profit could equate to more than $5 million per day),” he added. “If ransomware has infected Hydro’s industrial control systems, the consequences could be severe. For example, if aluminum smelting pots freeze they can be out of action for almost two years.”

While cyber insurance is designed to cover this form of attack and help ensure the impact on business operations is limited, if a company only has bought traditional property policy insurance, then coverage for this type of event would likely be excluded, which could create “devastating” losses, Newman continued...
https://www.insurancejournal.com/news/international/2019/03/22/521473.htm

PS: Did you know that there are now over 700 ransomware families? ID Ransomware has all of them. 


Free Ransomware Simulator Tool

Threat actors are constantly coming out with new strains to evade detection. Is your network effective in blocking all of them when employees fall for social engineering attacks?

KnowBe4’s "RanSim" gives you a quick look at the effectiveness of your existing network protection. RanSim will simulate 24 ransomware infection scenarios and 1 cryptomining infection scenario and show you if a workstation is vulnerable.

RansIm-Monitor3Here's how it works:

  • 100% harmless simulation of real ransomware and cryptomining infections
  • Does not use any of your own files
  • Tests 25 types of infection scenarios
  • Just download the install and run it 
  • Results in a few minutes!

Get RanSim!

PS: Don't like to click on redirected buttons? Cut & Paste this link in your browser:

https://www.knowbe4.com/ransomware-simulator

Topics: Ransomware



Subscribe to Our Blog


Comprehensive Anti-Phishing Guide




Get the latest about social engineering

Subscribe to CyberheistNews