Norwegian aluminum producer Norsk Hydro hit with large ransomware attack

The IT systems of Norsk Hydro, a top global aluminum producer, were hit with ransomware late Monday, forcing the company to temporarily suspend production at some plants, the company and Norwegian authorities said. The ransomware that struck the company is known as LockerGoga, a nascent strain that first surfaced in January, according to Norway’s federal cybersecurity agency (NSM in Norwegian). In a statement, the company, which had a market cap of over $12 billion last year, said it is “working to neutralize the attack, but so far does not know the full extent of the situation.” In a press conference, Norsk CFO Eivind Kallevik said the attack started in its U.S.-based plants, but did not specify any further details on how the malware spread. The company has aluminum remelting facilities in Henderson, Ky., and Commerce, Texas. It also has offices in Baltimore. Kallevik said the company has taken measures to […]

The post Norwegian aluminum producer Norsk Hydro hit with large ransomware attack appeared first on CyberScoop.

Continue reading Norwegian aluminum producer Norsk Hydro hit with large ransomware attack

Forbes Says The Raspberry Pi Is Big Business

Not that it’s something the average Hackaday reader is unaware of, but the Raspberry Pi is a rather popular device. While we don’t have hard numbers to back it up (extra credit for anyone who wishes to crunch the numbers), it certainly seems a day doesn’t go by that there …read more

Continue reading Forbes Says The Raspberry Pi Is Big Business

Five Convergence Solutions to Help Manufacturing Cross the IT-OT Security Schism

Industrial, and in particular discrete manufacturing, is said to be lagging behind other industries when it comes to converging its OT and IT technology, according to Industry Week. For example, financial institutions and healthcare facilities have con… Continue reading Five Convergence Solutions to Help Manufacturing Cross the IT-OT Security Schism

Shape Shifting Structures Work With Magnets

In The Dark Knight, Lucius Fox shows Bruce Wayne a neat bit of memory weave fabric. In its resting state, it is a light, flexible material, but when an electrical current is applied, it pops into a pre-programmed shape. That shape could be a tent or a bat-themed paraglider. Science has not caught up to Hollywood in this regard, but the concept has been demonstrated in a material which increases its rigidity up to 318% within one second when placed in a magnetic field. Those numbers do not mean a lot by themselves, but increasing rigidity in a reversible, …read more

Continue reading Shape Shifting Structures Work With Magnets

Tripwire Visibility for ICS: Getting From Data Mountains to Event Nuggets

If you operate an industrial network, you know that it is important to recognize operational errors and malicious changes as fast as possible to prevent unsafe and costly conditions from emerging. But achieving this goal requires you to be able to inge… Continue reading Tripwire Visibility for ICS: Getting From Data Mountains to Event Nuggets

The DIN Rail and How It Got That Way

Unless you’ve spent some time in the industrial electrical field, you might be surprised at the degree of integration involved in the various control panels needed to run factories and the like. Look inside any cabinet almost anywhere in the world, and you’ll be greeted by rows of neat plastic terminal blocks, circuit breakers, signal conditioners, and all manner of computing hardware from programmable logic controllers right on to Raspberry Pis and Arduinos.

A well-crafted industrial control panel can truly be a thing of beauty. But behind all the electrical bits in the cabinet, underneath all the neatly routed and …read more

Continue reading The DIN Rail and How It Got That Way

Disruption: The True Cost of an Industrial Cyber Security Incident

Industrial control systems are essential to the smooth operation of various national critical infrastructure. While once segmented from the web, these systems are now becoming increasingly more networked and remotely accessible as organizations transfo… Continue reading Disruption: The True Cost of an Industrial Cyber Security Incident

Tables are Turned as Robots Assemble IKEA Furniture

Hackaday pages are rife with examples of robots being built with furniture parts. In this example, the tables are turned and robots are the masters of IKEA pieces. We are not silly enough to assume that these robots unfolded the instructions, looked at one another, scratched their CPUs, and began assembling. Of course, the procedure was preordained by the programmers, but the way they mate the pegs into the ends of the cross-members is a very human thing to do. It reminds us of finding a phone charging socket in the dark. This kind of behavior is due to force …read more

Continue reading Tables are Turned as Robots Assemble IKEA Furniture

Modernized Industrial Systems Still at Pre-Internet Vulnerability Levels

Industrial Control Systems (ICS) were developed decades ago when any thoughts of security centered on locking down the physical plant. That’s because they were designed, developed and deployed before the internet took root, much less blossomed into th… Continue reading Modernized Industrial Systems Still at Pre-Internet Vulnerability Levels