Norsk Hydro ransomware losses estimated at $40m
A week after suffering a crippling ransomware infection, Norwegian aluminum producer Norsk Hydro estimates that total losses from the incident have already reached $40 million.
The company said most of this estimate consists of lost revenue, especially from its Extruded Solutions business division, the one most impacted by the ransomware attack.
In an update on its site today, Norsk Hydro said it almost fully recovered from the attack and that most operations are now running at normal capacity.
The only Norsk Hydro business division still impacted by last week's ransomware attack is the aforementioned Extruded Solutions where production is at 70-80 percent.
Three of the divisions' four business units are running normally --namely Extruded Solutions Europe, Extruded Solutions North America, and Precision Tubing.
In a press release today, Norsk Hydro said "operations remain almost at a standstill" in its Building Systems unit --the one that develops and sells aluminum-based window, door and facade products.
However, current expectations are that the unit would "gradually ramp up production and shipments during the week."
Norsk Hydro expects to fully recover following the incident, something that cannot be said for US chemical firm Momentive, which was hit by the same LockerGoga ransomware strain. The US firm has already ordered new computers to replace the ones encrypted by LockerGoga, according to a report.
On the other hand, Norsk Hydro said last week it intended to restore from backups, and it followed through on its plan with minimal financial losses.
The $40 million estimated losses are small in comparison to the $100 millions in damages Spanish food giant Mondelez reported in 2017 when it was hit by the NotPetya ransomware, and the $300 million figure reported by Danish shipping giant Maersk for the same incident.
It now remains to be seen how much of the $40 million losses will be covered by Norsk Hydro's cyber-insurance policy. Most cyber-insurance policies don't necessarily cover revenue losses caused by loss of business capabilities. Instead, most cover costs directly generated by the cyber-incident, such as IT consulting, incident response costs, and replacing computers and software.
Norsk Hydro will without a doubt have a much better chance at convincing its cyber-insurer in covering some of these costs.
Over the past few months, two different insurers have refused to cover damages caused during the NotPetya ransomware incident, citing an "act of war" clause included in insurance contracts. The insurers refused payments after several countries including the US, the UK, Australia, and Canada have blamed Russia for releasing NotPetya as part of its cyber-war against Ukraine.
Currently, Mondelez and DLA Piper (Britain's biggest law firm) have not been able to cash in their cyber-insurance policies in relation to the NotPetya attack for this reason.
Industry: Cyber Security News
- Head of Penetration Testing
- United Kingdom
Head of Penetration Testing needed to join a security consultancy that are delivering client facing penetration testing services around Web app and Infrastructure. Looking for someone hands on that is able to manage a highly skilled technical team of testers. 50-60% of the time is expected to be hands on, other duties will include, but not be limited to; leading and managing the day to day running of the team, mentoring, team upskill, recruitment, reporting, escalation, process improvement etc. Flexible location although south east is preferred. Anyone with Check / CREST experience is highly desirable. MUST be able to achieve SC clearance. UK based role. All details kept in confidence.
- CONTRACT SOC Manager. London / Birmingham. URGENT Immediate role.
REF7847 Contract SOC Manager. SC cleared, London / Birmingham. Initial 3 month Contract. SOC Manager needed to for an URGENT 3-4 month CONTRACT. SC clearance is essential. The project is to aid in the setup, implementation and management of resources to help with the initial stand up stages of a new SOC within a greenfield site. This is a short term contract role whilst a permanent hire is brought on over the coming 3 to 4 months. Experience engaging with and managing client stakeholder relationships as well as 3rd party relationships is critical. The role will involve; setting up, implementing and fine tuning the various initial stages of a SOC environment. Experience establishing and building out technical process / operational capability, managing of technical teams (analysts, engineers and architects, creation of policy / playbooks, fine turning is key. SPLUNK is the tooling of choice… Interviewing immediately. Set up a call with me today on https://calendly.com/chris-holt/arranged-call-with-chris-holt-remote-soc-role Direct contact details Chris.Holt@dclsearch.com or 07884666351
- SPLUNK Level 3 SOC Consultant, SIEM Splunk, London / Birmingham
REF CH7825 Level 3 SOC Consultant, SIEM Splunk, London / Birmingham £55,000 + Level 3 SOC Consultant, SIEM SPLUNK needed. Security Clearance. Permanent role Level 3 SOC Consultant, SIEM SPLUNK needed to join a public sector client. The ability to achieve SC clearance is essential. MUST have experience working with SPLUNK ideally to an Advanced Power User level. Splunk Enterprise Security (ES) knowledge and hands on experience highly desirable. The role will include, but not be limited to; managing and handling incidents end to end, supporting and mentoring level 1 / level 2 staff, supporting the SOC manager in the delivery of the SOC roadmap, engaging with the client stakeholders (other technical teams) as and where needed, use case development, advanced search and reporting etc. The individual MUST currently be living in the UK and be able to achieve UK security clearance. (SC) This is a permanent role To arrange a call with Chris Holt use this calendy link https://calendly.com/chris-holt/arranged-call-with-chris-holt-remote-soc-role Chris.Holt@dclsearch.com
- Aspiring Cyber Partner. Business lead, market maker.
Aspiring Cyber Partner (management consultancy) with Cyber specialism into Healthcare, Utilities and or Public Sector. Working with new and existing clients to help them solve, transform or evolve their cyber capabilities. MUST have; A proven management consultancy background in cyber. A history of identifying and closing new business opportunities. Currently Revenue generating / must be able to demonstrate recent wins. Client facing to board level with international businesses. Team leadership / mentoring experience. Extensive cyber industry experience. Digital transformation, Start-up environments etc. Experienced presenter at industry events, to be the public face of a business / capability. Breadth of knowledge across Cyber security. Service definition / creation. Would consider a senior director with experience delivering the above looking to step up. All conversations kept in confidence. To arrange a discreet call book a time to speak in my diary via https://calendly.com/chris-holt/cyber-partner-call Chris.Holt@dclsearch.com