In today's digital age, robust cybersecurity measures are essential. The cyberattack on Norsk Hydro highlights the vulnerabilities in our interconnected world and the need for strong Identity and Access Management (IAM) protocols. This incident, involving the LockerGoga ransomware, serves as a cautionary tale for industries worldwide, emphasizing vigilance and preparedness against sophisticated cyber threats. By examining this attack and its aftermath, we gain valuable insights into strategies to fortify our defenses. 

Protecting against cyberattacks accessing IT and operational technology (OT) is a growing priority among energy industry leaders. Over the last three years alone, DNV research has shown rising concern among such professionals about all cyber threat actors. Criminal gangs and state actors are a particular worry but so are current and former insiders who unintentionally or maliciously compromise security – for example, through revealing passwords or responding to phishing emails.1

Concern has increased among energy industry leaders about all cyber threat actors including current or former insidersConcern has increased among energy industry leaders about all cyber threat actors including current or former insiders. (DNV 2025) Source: DNV Cyber -  Energy Cyber Priority 2025

These justified concerns have coincided with high-profile examples of attackers exploiting weaknesses in Identity and Access Management (IAM) to spread further throughout IT systems to access critical systems once they have penetrated the initial defences.2,3

IAM ensuring that only authorized people can access critical resources is a key pillar of robust cybersecurity strategy that integrates good endpoint security, good network security, proper monitoring, threat detection and response, and security awareness. “That said, many organizations still struggle with even fairly immature IAM and see it simply as a technical function within IT,” says Veera Relander, Head of Delivery & Business Management, DNV Cyber.

Who or what has access to what?
Download the whitepaper

 

Learnings from the frontline

‘War stories’ from the cybersecurity frontline illustrate the risks of failures in IAM for those holding roles such as CIO, CISO, Head of IAM, Director IT and Cybersecurity, and so.

The growing casebook includes the incident in which global aluminium and renewable energy company Norsk Hydro ASA was hit by a LockerGoga ransomware attack in 2019. The malware infected the IT systems and severely disrupted global operations.4

This attack and the solutions remain instructive reading for those planning to govern access and to prepare for and prevent, detect and respond to attacks that exploit systemic or isolated/incidental weaknesses in IAM.

 

The attack and its impact

On gaining deep access, the attackers deployed the advanced ransomware LockerGoga to encrypt critical files and systems. Unlike other ransomware, LockerGoga also locked out user accounts, preventing IT teams from accessing infected systems, crippling Norsk Hydro’s ability to respond quickly.

LockerGoga’s encryption of critical files and systems made computers and servers unusable. The attack affected 22,000 computers in 170 locations across 40 countries. By preventing Norsk Hydro IT teams from accessing infected systems, the effects were amplified. Automated production lines were shut down, forcing factories to shift to manual operations using pen and paper. The company had to halt key business processes, leading to massive financial losses. The hackers demanded a ransom payment in exchange for decrypting the files.

 

Responding to the attack

Thanks to its foresight, Norsk Hydro was able to restore its systems from backups. The company collaborated 24/7 internally, and externally with cybersecurity experts, law enforcement, and Microsoft, to investigate and mitigate the attack. Norsk Hydro divulged that all PCs and servers across the company were reviewed, cleaned of any malware and safely restored, according to strict guidelines to ensure security and safety. It added that encrypted PCs and servers were rebuilt based on backups, and the company’s security team was reorganized to better detect and respond to cyber incidents.

It emerged that one Norsk Hydro business area had suffered the most significant operational challenges and financial losses. The company revealed that with the help of work-intensive workarounds and manual procedures, its other business areas maintained almost normal production.

Norsk Hydro openly shared information about the attack, which helped improve cybersecurity awareness across industries. The cost of the incident was USD 70 million, but the company emerged as a model for effective ransomware response, and did not pay the ransom.

 

Key takeaways from the Norsk Hydro cyberattack

  • Phishing and credential theft are major risks, so employee training and strong authentication are essential.
  • Ransomware can spread rapidly, but proper network segmentation can prevent it.
  • Endpoint activity should be closely monitored, as endpoint management can enable not only malware detection but also the identification of abnormal behaviour in legitimate tools like PowerShell and PsExec.
  • Backups are critical, and Norsk Hydro had good backup strategies that allowed it to avoid paying ransom.
  • Transparency matters, as shown in Norsk Hydro’s open communications helping to restore trust.
IAM assessment tool
Free online assessment

Broader lessons

“This incident highlights how gaps in identity and access management (IAM) — including potential weak authentication, insufficient privilege controls, and limited behavioural monitoring — can enable attackers to escalate privileges and cause widespread damage,” says Pascal van Vugt, Delivery Lead IAM, DNV Cyber. “The attackers exploited stolen credentials, escalated privileges, and used trusted admin tools to move laterally. Weak identity segmentation and over-permissioned accounts amplified the damage. It’s a clear reminder that strong IAM controls are essential for both prevention and response.”

Challenge Key questions

Challenge

Visibility

Key questions

  • Do we have sufficient visibility over who or what can access multiple assets and information in our organization?
  • Is our process for governing access to assets and information good enough?

Challenge

Compliance

Key questions

  • Do our digital identity processes and systems meet the growing number of national, regional, and industry regulatory requirements that we face?
  • Because of issues with our digital identity processes and systems, are we sure we will pass our next audit?

Challenge

Efficiency

Key questions

  • Are our digital identity processes and systems efficient enough?

References 

1 DNV Cyber (2025). ENERGY CYBER PRIORITY 2025: Addressing evolving risks, enabling transformation 

2 Security update. Uber Technologies, 19 September 2022 [online]. https://www.dnv.com/cyber/insights/articles/frontline-insights-lessons-from-the-uber-2022-data-breach/

3 Updated Okta Statement on LAPSUS$. Okta, 22 March 2022 [online] www.okta.com 

4 2019: Cyber-attack on Hydro. Norsk Hydro, 11 June 2021 [online] www.hydro.com 

You might be interested

IAM Maturity Assessment

IAM Maturity Assessment

Free assessment that provides actionable insights and practical recommendations on your IAM posture

Customer stories

Customer stories

Real world examples how DNV Cyber has helped organizations overcome their IAM challenges