Norsk Hydro — LockerGoga ransomware
LockerGoga ransomware was pushed via Active Directory to every Norsk Hydro Windows workstation simultaneously, halting aluminium production globally and costing the company over $70M to recover.
- Target
- Norsk Hydro — LockerGoga ransomware
- Date public
- 19 March 2019
- Sector
- Manufacturing
- Attack type
- Ransomware
- Threat actor
- Unattributed (LockerGoga operators)
- Severity
- High
- Region
- Norway / global
In March 2019 hackers broke into the computer systems of Norsk Hydro — a Norwegian company that makes aluminium for cars, packaging, and construction projects worldwide — and locked every computer in the building. They used a type of malicious software called LockerGoga, but the clever part wasn't the malware itself: the attackers used Hydro's own IT management tools to push the software to thousands of machines at once, the same way a legitimate software update would be delivered. Workers arrived at the morning shift to find nothing worked. The problem was especially acute because aluminium smelters cannot simply be switched off — the giant vats of molten metal would solidify and destroy the equipment. Workers had to keep the smelters running using manual controls and paper records, the way factories operated decades ago. The factories that shape aluminium into usable products had to stop entirely. Norsk Hydro's executives made an unusual choice: instead of staying quiet, they held daily press conferences and published regular updates, including confirming publicly that they would not pay the ransom. The total cost was around $75 million — spent on recovery, not on the criminals.
What happened
Norsk Hydro is one of the world’s largest aluminium producers, with smelters, rolling mills, and extruded-product plants across Norway, continental Europe, and North America. In the early hours of 19 March 2019, LockerGoga ransomware began encrypting Windows systems across Hydro’s global estate. IT staff arriving for the morning shift discovered that workstations across the network were unresponsive. The company disconnected from the internet within hours of detection, but by then the damage was done: essentially every office and operational IT system across the business was affected.
The physical consequences were immediate. Aluminium reduction cells — the large vats of molten metal at the core of a smelter — cannot be powered down safely. Cooling the cells without properly shutting them down permanently destroys the equipment inside. Hydro’s smelting operations therefore had to continue, with plant workers reverting to manual controls and paper-based records to keep the cells running. The extruded-products division, which uses computer-controlled machinery to shape aluminium into structural profiles for the automotive and construction industries, was not so fortunate: those plants halted entirely, taking roughly 20,000 tonnes of annual extrusion capacity offline for days.
Norsk Hydro’s CEO Svein Richard Brandtzæg appeared publicly within hours of the attack becoming known. He and the company’s CFO Eivind Kallevik held the first of a series of daily press conferences, acknowledging the attack, describing its scope honestly, and confirming that Hydro would not pay the ransom and would recover from backups. This level of transparency from a major listed industrial company was entirely without precedent in European ransomware incidents at the time, and it set the terms for how the incident was covered and remembered.
Full system recovery took several months. Hydro reported total costs of between NOK 550 million and NOK 800 million across 2019, broadly equivalent to $60–75 million, partially covered by its cyber insurance programme. No ransom was paid. The company subsequently emerged with a stronger security programme and a reputation for incident management that made the Hydro response a reference point cited by regulators, insurers, and security professionals worldwide.
How it worked
LockerGoga was an unusual ransomware strain in one important respect: it did not spread autonomously. Unlike NotPetya or WannaCry, it carried no network worm or self-propagation mechanism. The attackers moved through Norsk Hydro’s environment manually over a dwell period of weeks before the ransomware executed, harvesting credentials, escalating privileges, and mapping the Active Directory infrastructure. When they were ready, they used Hydro’s own IT management tooling — the same Group Policy objects and software-deployment mechanisms that Hydro’s legitimate IT staff used to push updates — to distribute LockerGoga simultaneously to thousands of Windows machines across the global estate. This gave the attackers near-total coverage at the moment of detonation.
The initial access vector was never publicly confirmed by Hydro or by any law-enforcement statement. Security researchers following the LockerGoga campaigns of 2019 noted a consistent pattern of initial access via phishing emails or credential compromise, followed by extended dwell periods during which attackers methodically escalated to domain-administrator rights. Domain admin access is what made the mass-deployment possible: with those rights, the attackers could abuse legitimate management infrastructure to push the ransomware as if it were an authorised software package.
LockerGoga had one further characteristic that made the incident particularly disruptive: beyond encrypting files, it changed local Windows passwords and forcibly logged users out of their machines. Even workstations that had not yet been fully encrypted were inaccessible to their operators. This delayed the ability of even technically capable staff to begin assessing or containing the damage from within the organisation in the immediate aftermath of the attack.
The identity of the specific attackers behind the Norsk Hydro deployment has never been established publicly. LockerGoga was used in a series of attacks against industrial and manufacturing firms during 2019, but no group has been formally attributed by a law-enforcement agency or government body.
Timeline
- Weeks before 19 March 2019 — Attackers obtain initial access, likely via phishing or credential compromise. Extended lateral movement and privilege escalation underway inside Hydro’s Active Directory environment.
- 19 March 2019, early hours — LockerGoga deployed via Group Policy across Hydro’s global Windows estate. Encryption begins simultaneously across sites in Norway, Europe, and North America.
- 19 March 2019, morning — IT staff detect widespread failures. Hydro disconnects from the internet and activates incident response. Smelters switch to manual operation; extruded-products plants halt.
- 19 March 2019 — CEO and CFO hold first public press conference. Hydro confirms it will not pay the ransom and will recover from backups.
- March–April 2019 — Recovery from backups underway. Extruded-products plants return to operation progressively. Smelting operations continue on manual controls throughout.
- May 2019 — CISA and MS-ISAC publish joint advisory on LockerGoga and MegaCortex, citing the Hydro attack as the primary case study.
- Q2–Q3 2019 — Hydro reports total costs of NOK 550–800 million across its quarterly earnings. Full IT rebuild declared complete.
What defenders should learn
The Norsk Hydro incident is the definitive case study for Active Directory-delivered ransomware, and the central lesson sits at the privilege layer. The attackers used no novel software vulnerability at the point of mass-deployment: they used Group Policy Objects — the standard mechanism that every Windows IT administrator uses daily. The control that would have interrupted this is the protection of privileged accounts, particularly domain administrator and enterprise administrator credentials. Privileged accounts should require hardware-backed MFA, be restricted to dedicated privileged access workstations that are not used for email or browsing, and be subject to just-in-time access controls that remove persistent privileges when they are not in use. An attacker who cannot obtain domain admin cannot abuse Group Policy at scale.
The weeks-long dwell period is the second failure to address. If anomalous behaviour had been detected during the preparation phase — unusual authentication patterns, lateral movement between hosts, reconnaissance of Group Policy infrastructure — the ransomware deployment would never have happened. Endpoint detection and response tools with alerting on anomalous GPO modifications, pass-the-hash and pass-the-ticket activity, and unexpected privilege escalations would have created an intervention window. The first sign of the attack should not be thousands of simultaneous workstation failures.
Finally, Hydro’s crisis communications approach deserves equal attention. The daily press conferences, honest acknowledgement of uncertainty, and public commitment not to pay turned a catastrophic operational event into a reputation-strengthening episode. Peer organisations in the same sector received an unusually detailed account of what the attack looked like from the inside, which raised collective defences at a time when the same attackers were targeting other industrial firms. The cost of that transparency was negligible. The practical and reputational dividend was substantial, and the model has been cited in every significant industrial ransomware response guidance document published since.
Controls that would have helped
Defender controls catalogued in the Controls Desk that would have changed the outcome of this incident, or limited its blast radius. Sourced from regulator and framework guidance — never vendors.
- Workload-based segmentation so a single intrusion can't spread laterally A flat workload network is one bad day from a NotPetya. Workload-level policy enforcement — identity-aware, application-aware — is the single biggest blast-radius limit in the catalogue.
- Application allowlisting on high-value endpoints On a server, on a privileged-access workstation, on a SCADA controller, the answer to 'what should run here' is finite, knowable and short. Allowlist it. Block everything else.
- Block Office macros from any document originating outside the organisation VBA macros in inbound Office documents have been the preferred ransomware delivery vehicle for a decade. Microsoft now blocks them by default. Reverse the default at your peril.
- Quarterly tested backup restores, with the recovery clock measured Backups exist at most large organisations. Tested restores do not. The single difference between a six-day outage and a six-hour outage is whether the runbook has actually been run.
Sources
- Norsk Hydro — Cyber attack on Norsk Hydro (official update page) // primary
- Norsk Hydro cyberattack — Wikipedia // reporting
- Wired — The Untold Story of the 2018 Olympics Cyberattack (background on LockerGoga operators) // reporting
- CISA / MS-ISAC — Alert AA19-122A: LockerGoga and MegaCortex ransomware // primary