Norsk Hydro ransomware losses estimated at $40m
A week after suffering a crippling ransomware infection, Norwegian aluminum producer Norsk Hydro estimates that total losses from the incident have already reached $40 million.
The company said most of this estimate consists of lost revenue, especially from its Extruded Solutions business division, the one most impacted by the ransomware attack.
In an update on its site today, Norsk Hydro said it almost fully recovered from the attack and that most operations are now running at normal capacity.
The only Norsk Hydro business division still impacted by last week's ransomware attack is the aforementioned Extruded Solutions where production is at 70-80 percent.
Three of the divisions' four business units are running normally --namely Extruded Solutions Europe, Extruded Solutions North America, and Precision Tubing.
In a press release today, Norsk Hydro said "operations remain almost at a standstill" in its Building Systems unit --the one that develops and sells aluminum-based window, door and facade products.
However, current expectations are that the unit would "gradually ramp up production and shipments during the week."
Norsk Hydro expects to fully recover following the incident, something that cannot be said for US chemical firm Momentive, which was hit by the same LockerGoga ransomware strain. The US firm has already ordered new computers to replace the ones encrypted by LockerGoga, according to a report.
On the other hand, Norsk Hydro said last week it intended to restore from backups, and it followed through on its plan with minimal financial losses.
The $40 million estimated losses are small in comparison to the $100 millions in damages Spanish food giant Mondelez reported in 2017 when it was hit by the NotPetya ransomware, and the $300 million figure reported by Danish shipping giant Maersk for the same incident.
It now remains to be seen how much of the $40 million losses will be covered by Norsk Hydro's cyber-insurance policy. Most cyber-insurance policies don't necessarily cover revenue losses caused by loss of business capabilities. Instead, most cover costs directly generated by the cyber-incident, such as IT consulting, incident response costs, and replacing computers and software.
Norsk Hydro will without a doubt have a much better chance at convincing its cyber-insurer in covering some of these costs.
Over the past few months, two different insurers have refused to cover damages caused during the NotPetya ransomware incident, citing an "act of war" clause included in insurance contracts. The insurers refused payments after several countries including the US, the UK, Australia, and Canada have blamed Russia for releasing NotPetya as part of its cyber-war against Ukraine.
Currently, Mondelez and DLA Piper (Britain's biggest law firm) have not been able to cash in their cyber-insurance policies in relation to the NotPetya attack for this reason.
source zdnet
Industry: Cyber Security News
Latest Jobs
-
- PCI QSA needed. Discreet Opportunity | London | Client facing
- London
- N/A
-
CH08421 PCI QSA needed. Discreet Opportunity | London | Client facing. Payment Card Industry - Qualified Security Assessor - London Seeking someone looking to accelerate their career, into a variety of interesting clients / projects. Must be happy to be onsite with clients- this is not a fully remote role. You must currently hold a valid CISSP or CISM or ISO27001 lead implementer certification AND one of the following; CISA, GSNA, iso27001 lead Auditor, CIA or IRCA ISMS auditor+ Visa sponsorship not available. Apply today for more information chris.holt@dclsearch.com Use this whatapp link to reach out https://wa.me/message/6USF5RAQBOZIP1
-
- Network / Security Infrastructure Engineer | West London | Permanent
- London
- N/A
-
Network / Security Infrastructure Engineer | West London | Current Config, Install, upgrade experience On prem / Datacetner experience essential. Hands on experience MUST include: Routing, Switching, Network Security (firewall, IDS etc), Microsoft exchange / Exchange 365. Scripting / automation experience wanted. Python, Powershell etc Regular travel to West London is required. Visa sponsorship not available. Apply today for more information chris.holt@dclsearch.com Use this whatapp link to reach out https://wa.me/message/6USF5RAQBOZIP1
-
- Security Operations / information Security Analyst / Engineer. London
- London
- N/A
-
Security Operations / information Security Analyst / Engineer needed for a London opportunity. A technical hands on role to investigate, escalate and proactively work to protect a globally recognised brand. Someone with SOC Analyst / security engineering background would be well suited. This position will join a small team and would suit someone that has broad experience across the security threat landscape. Experience / knowledge across industry GRC standards such NIST, ISO27001 etc very advantageous and a priority. You will work across multiple teams proactively working to secure the business. Must be able to commute to Central London 3 days a week. Visa sponsorship not available Apply today to find out more.
-
- Security Cleared Penetration Tester: United Kindom
- N/A
- N/A
-
Security Cleared Penetration Tester Deliver technical Penetration tests to the NCSC CHECK standard. Active CHECK Member or Leader status desirable either in Web Application or Infrastructure. Reach out to find out more. Whatsapp directly here https://wa.me/message/6USF5RAQBOZIP1 Or apply today