Industrial Cybersecurity Pulse
  • SUBSCRIBE
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
SUBSCRIBE
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
Industrial Cybersecurity Pulse
Subscribe
Industrial Cybersecurity Pulse
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Threats & Vulnerabilities

Throwback Attack: The NotPetya malware causes serious damage to snack giant Mondelez

  • Gary Cohen
  • April 15, 2021
Courtesy: CFE Media and Technology
Total
1
Shares
0
1
0
0

In 2017, the NotPetya malware was wreaking havoc around the world. Though it likely began as a state-sponsored Russian cyberattack targeting Ukraine, its ramifications quickly spread far and wide, including to multinational corporations like Chicago-based confectionary, food, holding, beverage and snack company Mondelez International.

The food and beverage giant, known around the world for brands like Cadbury, Chips Ahoy, Honey Maid, Oreo, Ritz and Philadelphia Cream Cheese, was hit hard by the encrypting malware. Company laptops froze, employees lost access to email and files, and logistics software used to orchestrate deliveries crashed. Even with the company working around the clock to rectify the damage, it took weeks for Mondelez to fully recover, and the financial hit was more than $100 million. The attack permanently damaged 1,700 servers and 24,000 laptops, impacting production facilities around the globe.

“On June 27, 2017, a global malware incident impacted the company’s business,” said Mondelez in its second-quarter earnings announcement. “The malware affected a significant portion of the company’s global Windows-based applications and its sales, distribution and financial networks across the company. During the last four days of the second quarter and early third quarter, the company executed business continuity and contingency plans to contain the impact and minimize the damages from the malware and restore its systems. This allowed the company to service customer needs and continue sales and production at a reduced capacity while progressing recovery activities. Based on the nature of the malware and its impact to the company’s technology, the company did not expect nor to date has it found any instances of company or personal data released externally.”

The NotPetya malware took its name from an earlier ransomware called Petya, with which it shared many similarities. Both impacted Windows-based systems and aimed to encrypt the hard drives of infected computers. But while Petya was ransomware that demanded a Bitcoin payment from its victims, NotPetya is widely viewed as a weapon of Russian cyberwarfare. It spread much easier and was more damaging, with the ability to destroy computers and machines around the globe.

While NotPetya certainly hurt its intended target, Ukraine, it spread quickly to multinational companies like shipping giant Maersk, pharmaceutical company Merck, delivery company FedEx and Russian oil company Rosneft, according to a deep dive published by WIRED. In the piece, former Homeland Security Adviser Tom Bossert confirmed the attack caused more than $10 billion in total damages.

According to Mondelez, the attack included the theft of thousands of user credentials and impacted the company’s ability to complete customer orders. As of Aug. 2, 2017, company officials said operations were still not “back to normal.”

“Over the past four weeks, we’ve worked tirelessly to restore our systems and recover from the disruption,” said Brian T. Gladden, chief financial officer and executive vice-president. “Although we’ve now restored the majority of our affected systems, in a few cases, parts of our supply chain have still not fully recovered, and we anticipate some impacts in our third quarter. We’ll also incur some additional one-time costs related to the incident during the second half.

“In terms of our results, the malware incident had a negative impact of approximately 240 basis points to organic net revenue or about $140 million.”

The NotPetya malware incident at Mondelez also had a significant impact on the insurance industry. Mondelez provider Zurich Insurance denied the company’s claim for damages caused by the cyberattack, citing a rarely used war exemption. According to Zurich, Mondelez was collateral damage in the cyberwar between Russia and Ukraine, setting a precedent other insurers have been using ever since.

RELATED ARTICLES

Throwback Attack: Hackers steal 1 TB of data from beverage giant Brown-Forman
https://www.industrialcybersecuritypulse.com/throwback-attack-hackers-steal-1-tb-of-data-from-beverage-giant-brown-forman/

Throwback Attack: A Florida teen hacks the Department of Defense and NASA
https://www.industrialcybersecuritypulse.com/throwback-attack-a-florida-teen-hacks-the-department-of-defense-and-nasa/

Do you have experience and expertise with the topics mentioned in this article? You should consider contributing content to our CFE Media editorial team and getting the recognition you and your company deserve. Click here to start this process.

Gary Cohen

Gary Cohen is senior editor/product manager at CFE Media.

Related Topics
  • CFE Content
  • Featured
  • news
Previous Article
  • Threats & Vulnerabilities

High-level risk assessment for cybersecurity

  • H-ON Consulting
  • April 15, 2021
Read More
Next Article
Proactive management of plant cybersecurity
  • Strategies

Proactive management of plant cybersecurity

  • Camilo Gomez
  • April 16, 2021
Read More
You May Also Like
Courtesy: A3/Siemens
Read More

Industrial robot utilization requires cybersecurity strategy

Courtesy: Brett Sayles
Read More

Throwback attack: Russia launches its first cyberattack on the U.S. with Moonlight Maze

Read More

Throwback attack: Russia breaches Wolf Creek Nuclear Power facility

Courtesy: CFE Media and Technology
Read More

Lack of qualified cybersecurity personnel for critical infrastructure

Figure 1: PLCs, HMIs, and other Ethernet-capable automation devices used for modern automation systems can no longer rely on “cybersecurity by obscurity” and “air gaps.” They must progressively adopt advanced IT type security features. Courtesy: AutomationDirect
Read More

Cybersecurity-centered systems and fundamentals

Read More

Port and maritime cybersecurity vulnerabilities are getting more focus

Figure 1: For smaller organizations with limited network resources, it can be tempting to plug your machine directly into the business network. Courtesy: DMC
Read More

Securing your facility

Courtesy: Trekkor
Read More

Bridging the IT and OT gap for a power service company

SUBSCRIBE

GET ON THE BEAT

Keep your finger on the pulse of top industry news

SUBSCRIBE TODAY!
VULNERABILITY PULSE
  • Berkeley Internet Name Domain (BIND) - May 19, 2022
  • Mitsubishi Electric - May 19, 2022
  • Apache - May 16, 2022
  • CISA - May 16, 2022
  • Joint Cybersecurity Advisory - May 17, 2022

RECENT NEWS

  • Will CISA recommend securing industrial control systems?
  • How to implement layered industrial cybersecurity in volatile times
  • Throwback Attack: DDoS attacks are born in the Big Ten
  • Improve two-factor authentication system security
  • A rise in ransomware leaves businesses looking for answers

EDUCATION BEAT

Introduction to Cybersecurity within Cyber-Physical Systems

Cyber-physical systems serve as the foundation and the invention base of the modern society making them critical to both government and business.

REGISTER NOW!
HACKS & ATTACKS
  • Ron Brash Interview: Expert advice on finding the root of the ransomware problem
  • Throwback Attack: How the modest Bowman Avenue Dam became the target of Iranian hackers
  • Minimizing the REvil impact delivered via Kaseya servers
  • Key takeaways from 2020 ICS-CERT vulnerabilities
Industrial Cybersecurity Pulse

Copyright 2022 CFE Media and Technology.
All rights reserved.


BETA

Version 1.0

  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions

Input your search keywords and press Enter.

By using this website, you agree to our use of cookies. This may include personalization of content and ads, and traffic analytics. Review our Privacy Policy for more information. ACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT