{"id":105654,"date":"2019-12-16T17:05:12","date_gmt":"2019-12-16T17:05:12","guid":{"rendered":"https:\/\/news.microsoft.com\/?p=435645"},"modified":"2019-12-16T17:05:12","modified_gmt":"2019-12-16T17:05:12","slug":"facing-ransomware-demands-one-company-had-an-unusual-response","status":"publish","type":"post","link":"https:\/\/sickgaming.net\/blog\/2019\/12\/16\/facing-ransomware-demands-one-company-had-an-unusual-response\/","title":{"rendered":"Facing ransomware demands, one company had an unusual response"},"content":{"rendered":"<p>\u201cWhat would you get from paying a ransom in such an attack?\u201d Gimnes Are asks. \u201cYou will potentially get back your encrypted data \u2013 if the attacker gives you the key. Paying the ransom would not help you to rebuild the company infrastructure, all the servers, all the PCs, all the networks.<\/p>\n<p>\u201cPaying the ransom will not help you out of the situation. You will need to rebuild your infrastructure to be safe and be sure that the attacker is not still part of it,\u201d he adds.<\/p>\n<p>At Microsoft, Eric Doerr serves as general manager of the <a href=\"https:\/\/www.microsoft.com\/en-us\/msrc\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Security Response Center<\/a>, which protects customers from being harmed by security vulnerabilities in Microsoft\u2019s products and services. The center also rapidly repulses attacks against the Microsoft Cloud.&nbsp;Doerr strongly promotes transparency among organizations that suffer cyberattacks.<\/p>\n<p>\u201cNorsk Hydro set the example for the industry in this incident,\u201d Doerr says.<\/p>\n<p>\u201cChoosing not to pay the ransom and digging in with DART to evict the attacker is great. Sharing those learnings with the world is priceless. When companies do this, it makes us all better and makes the attackers work harder,\u201d he adds.<\/p>\n<p>Of course, some companies facing a ransomware attack may be highly tempted to pay bad actors to regain their hijacked data. But paying hackers doesn\u2019t guarantee that a company will ever recover the goods, says Ann Johnson, Microsoft\u2019s corporate vice president of cybersecurity solutions.<\/p>\n<p>There\u2019s a smarter way \u2013 following the plan executed by Norsk Hydro, says Johnson, whose team oversees DART.<\/p>\n<p>\u201cYour data is a strategic asset for you, and for cybercriminals. That\u2019s why they want it. It is also why your data must be protected, and it should be backed up,\u201d Johnson says.<\/p>\n<p>At the same time, companies must invest in cybersecurity, she adds.<\/p>\n<p>At Norsk Hydro, for example, the IT department works to increase security awareness among its employees, says Molland, the media relations SVP. That includes sending workers test emails to help train them to look for <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/intelligence\/phishing\" target=\"_blank\" rel=\"noopener noreferrer\">common phishing tactics<\/a> like fake login pages and malicious attachments.<\/p>\n<p>If companies fail to commit to cybersecurity, Johnson warns, bad actors will become repeat customers.<\/p>\n<p>\u201cYou\u2019ve likely seen signs that read, \u2018Don\u2019t feed the birds,\u2019 when dining at an outdoor caf\u00e9. That\u2019s because the birds will keep returning to the same places where they know it\u2019s easy to be fed. It\u2019s the same concept for cybercriminals,\u201d Johnson says. \u201cThey know if you have weak cyber-defenses, and they will want to exploit those weaknesses over-and-over.<\/p>\n<p>\u201cThe best defense is to ensure you have the right combination of people, processes and technology. We recommend you implement multifactor authentication, have a mature update process, and back up your data,\u201d she adds.<\/p>\n<p><figure id=\"attachment_29990\" aria-describedby=\"caption-attachment-29990\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-29990 size-large\" src=\"https:\/\/www.sickgaming.net\/blog\/wp-content\/uploads\/2019\/12\/facing-ransomware-demands-one-company-had-an-unusual-response.jpg\" alt=\"Two Norsk Hydro workers work their way through the cyberattack using paper data. \" width=\"1024\" height=\"683\"><figcaption id=\"caption-attachment-29990\" class=\"wp-caption-text\">At a Norsk Hydro extrusion plant in Norway, sales project manager Rune Johansen and extrusion anodizing fabrication manager Sten Stolpe dig through paper documentation to manually complete customer orders during the cyberattack.<\/figcaption><\/figure>\n<\/p>\n<p>In Hungary and Norway last March, DART members helped Norsk Hydro develop safe processes to restore their servers with an improved security posture. They also educated the company about the current threat landscape and known attacker behaviors to help reduce the risk of future attacks, Moeller says.<\/p>\n<p>Inside Norsk Hydro, the internal response focused on multiple fronts. They launched old-school methods to resume full production and repair business operations. And they worked to protect the safety of employees and the environment.<\/p>\n<p>\u201cWe operate heavy machinery. If the power is lost in an uncontrolled manner, it could risk severe safety incidents for people,\u201d says Molland, the media relations SVP.<\/p>\n<p>\u201cSafety is always first priority with us. Secondly, it\u2019s the concern for the environment and ensuring we don\u2019t have any uncontrolled emissions (due to sudden machine stoppages) out to the air, land or water.\u201d<\/p>\n<p>Executives handwrote signs warning of the cyberattack, photographed them with their smart phones and texted the images to managers at Norsk Hydro plants and offices around the world. At those facilities, the staff used local printing shops to create paper signs, posting them on entryways, stairwells and elevators for employees to read as they arrived for the workday.<\/p>\n<p>\u201cPlease do not connect any devices to the Hydro network. Do not turn on any devices connected to the Hydro network. Please disconnect devices from the Hydro network,\u201d read some written alerts that also carried a simple signature: \u201cSecurity.\u201d<\/p>\n<p><figure id=\"attachment_29989\" aria-describedby=\"caption-attachment-29989\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-29989 size-large\" src=\"https:\/\/www.sickgaming.net\/blog\/wp-content\/uploads\/2019\/12\/facing-ransomware-demands-one-company-had-an-unusual-response-1.jpg\" alt=\"Two Norsk Hydro workers use pen and paper to restore production amid the cyberattack. \" width=\"1024\" height=\"768\"><figcaption id=\"caption-attachment-29989\" class=\"wp-caption-text\">Two workers at a Norsk Hydro plant in Portland, Oregon manually operate machines to produce specific customer orders during the initial phase of the cyberattack.<\/figcaption><\/figure>\n<\/p>\n<p>The entire workforce did their jobs with pen and paper during the attack\u2019s first days. Some plants switched to manual procedures to meet manufacturing orders. Retired employees \u2013 familiar with the old paper system \u2013 volunteered to return to their plants to keep production rolling.<\/p>\n<p>\u201cThe way we pulled together to make the company come through the situation in one piece and get back into production has been an extreme team-building session,\u201d Molland says.<\/p>\n<p>\u201cWe have an organized emergency preparedness methodology within the company \u2013 in the corporate level, in the business area and at the plant level,\u201d he adds. \u201cThat worked to our benefit. When this hit us, we were able to handle the situation in a constructive, organized manner.\u201d<\/p>\n<p>In other words, prevention is important but locking out all cyberattackers should not be a company\u2019s sole security focus, says Jo De Vliegher, Norsk Hydro\u2019s chief information officer.<\/p>\n<p>\u201cIf hackers want to get in, they will get in,\u201d De Vliegher says. \u201cWe now have an improved incident response to make sure that \u2013 should something similar happen \u2013 we are much better equipped to limit the damage in time and geography.\u201d<\/p>\n<p>Norsk Hydro reported the incident to Norway\u2019s National Criminal Investigation Service (Kripos). The case remains under investigation, Molland says.<\/p>\n<p><em>Video and photos courtesy of Norsk Hydro.&nbsp;<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u201cWhat would you get from paying a ransom in such an attack?\u201d Gimnes Are asks. \u201cYou will potentially get back your encrypted data \u2013 if the attacker gives you the key. Paying the ransom would not help you to rebuild the company infrastructure, all the servers, all the PCs, all the networks. \u201cPaying the ransom [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":105655,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[49],"tags":[52,298],"class_list":["post-105654","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-news","tag-security","tag-transform"],"_links":{"self":[{"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/posts\/105654","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/comments?post=105654"}],"version-history":[{"count":0,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/posts\/105654\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/media\/105655"}],"wp:attachment":[{"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/media?parent=105654"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/categories?post=105654"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/tags?post=105654"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}