Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Major U.S. Chemical Firms Hit by Cyberattack

Operations at two major US-based chemical companies, Hexion and Momentive, were disrupted recently by a cyberattack reportedly involving LockerGoga, the ransomware that recently hit Norwegian aluminum giant Norsk Hydro.

Operations at two major US-based chemical companies, Hexion and Momentive, were disrupted recently by a cyberattack reportedly involving LockerGoga, the ransomware that recently hit Norwegian aluminum giant Norsk Hydro.

In press releases published on Friday, Hexion and Momentive said they had been working on restoring networks and resuming normal operations after suffering “network security incidents” that prevented access to certain IT systems and data.

They both claimed that their manufacturing systems are on different networks and continued to operate normally with limited interruptions — the attack appears to have mainly impacted “corporate functions.”

Vice’s Motherboard reported that both companies were hit on March 12 by LockerGoga, the ransomware that recently also infected systems at Norsk Hydro. The theory that LockerGoga was involved in the attacks on Hexion and Momentive is based on a screenshot of a ransom screen obtained by the publication from an employee.

Both Hexion and Momentive are owned by the same investor group so it’s possible that their systems are connected and that is how the malware made it from one organization to the other.

SecurityWeek has reached out to Hexion and Momentive, but they both pointed to the press releases and refused to provide additional details.

According to Motherboard, which obtained an internal memo sent out to employees by Momentive’s CEO, the incident caused a global IT outage that forced the company to order hundreds of new computers and give some employees new email accounts as their old ones had become inaccessible.

LockerGoga is designed to encrypt files, but it does not have any built-in mechanism for spreading on a network. In the case of the Norsk Hydro attack, experts believe it may have leveraged the organization’s Active Directory deployment to spread.

Advertisement. Scroll to continue reading.

LockerGoga ransom note

The Norwegian aluminum giant has been much more transparent about the attack and its impact — the company has provided daily updates about its efforts to restore affected systems.

The full extent of the impact is unclear in the case of Hexion and Momentive. Did the ransomware encrypt important data? Do the companies have good backups from which they can restore compromised files without paying any ransom?

Norsk Hydro said it did not plan on paying any money to the attackers. The company has been restoring systems using backups.

One of the first known victims of LockerGoga was French engineering consultancy Altran Technologies, which got hit in January. Researchers say there have been dozens of victims, and Hexion and Momentive were apparently targeted before Hydro.

Security expert Kevin Beaumont, who has been monitoring LockerGoga attacks, said — based on the number of unique malware samples uploaded to VirusTotal — that at least 8 organizations were hit. However, only four of them are currently known.

Researchers at MalwareHunterTeam have identified one LockerGoga sample on VirusTotal that was uploaded on March 12, which suggests that it may have been the one used in the attack against Hexion and Momentive.

Related: Industry Reactions to Norsk Hydro Breach

Related: Norsk Hydro Restoring Systems, But Not Paying Ransom

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.