Wiper malware targets Poland's energy grid but causes no blackout

Researchers have attributed a failed cyberattack on Poland's electric grid to Russian state hackers, coinciding with the 10th anniversary of a similar assault on Ukraine. The wiper malware aimed to disrupt power distribution but did not succeed in knocking out electricity. Security firm ESET linked the incident to the notorious Sandworm group.

In late December, Poland's energy infrastructure faced a cyber threat when wiper malware was deployed against its electric grid. The attack, which occurred during the last week of the month, sought to sever communications between renewable energy installations and power distribution operators. However, it failed to cause any disruptions to electricity supply, for reasons that remain unclear.

ESET, a cybersecurity firm, analyzed the malware and identified it as DynoWiper, a destructive tool designed to permanently erase code and data on servers. The researchers attributed the operation to the Russia-aligned Sandworm advanced persistent threat (APT) group with medium confidence, citing overlaps in tactics, techniques, and procedures with prior Sandworm activities. "Based on our analysis of the malware and associated TTPs, we attribute the attack to the Russia-aligned Sandworm APT with medium confidence due to a strong overlap with numerous previous Sandworm wiper activity we analyzed," the firm stated. ESET emphasized that no successful disruptions resulted from this incident.

Sandworm has a track record of deploying wipers in geopolitical conflicts. Notably, on December 23, 2015—exactly 10 years before this attack—the group used BlackEnergy malware to black out power for about 230,000 Ukrainians for six hours during winter. More recently, in 2022, Sandworm's AcidRain wiper targeted 270,000 satellite modems in Ukraine, marking the seventh such tool used since Russia's invasion. The group also hit Ukrainian universities and critical infrastructure with multiple wipers last year. The 2017 NotPetya worm, another Sandworm creation, spread globally despite targeting Ukraine, causing an estimated $10 billion in damages.

Speculation surrounds DynoWiper's failure: it might have been a deliberate show of force to avoid escalating tensions with Poland's NATO allies, or robust cyber defenses could have neutralized it. This event underscores ongoing hybrid threats to European energy systems amid regional tensions.

Verwandte Artikel

Illustration of Russian drones and missiles attacking Ukrainian power substations, causing fiery explosions, blackouts, and rail disruptions near a nuclear plant.
Bild generiert von KI

Russian drones and missiles hit Ukraine's power grid and transport hubs, officials say

Von KI berichtet Bild generiert von KI Fakten geprüft

A large-scale Russian drone and missile attack damaged power facilities in eight Ukrainian regions on Saturday, causing blackouts, forcing nuclear plants to cut output and disrupting rail services, according to Ukrainian authorities and the International Atomic Energy Agency.

Pro-Russian hackers known as Curly COMrades are exploiting Microsoft's Hyper-V technology to embed lightweight Alpine Linux virtual machines within compromised Windows systems. This tactic allows them to run custom malware like CurlyShell and CurlCat undetected by traditional endpoint detection tools. The campaign, uncovered by Bitdefender in collaboration with the Georgian CERT, targets organizations in Europe and beyond.

Von KI berichtet

Russian state-sponsored hackers quickly weaponized a newly patched Microsoft Office flaw to target organizations in nine countries. The group, known as APT28, used spear-phishing emails to install stealthy backdoors in diplomatic, defense, and transport entities. Security researchers at Trellix attributed the attacks with high confidence to this notorious cyber espionage unit.

A notorious group of Russian cybercriminals has resurfaced with a new ransomware variant. However, security experts note that files encrypted by this malware can be easily decrypted.

Von KI berichtet

Cisco Talos has detailed how a Chinese-linked group is exploiting an unpatched zero-day in email security appliances since late November 2025, deploying backdoors and log-wiping tools for persistent access.

Schwere Stürme und Hagel haben den Strom in mehreren Gebieten von Tzaneen, Limpopo, abgeschaltet, nachdem zwei Eskom-Umspannwerke beschädigt wurden. Betroffene Gemeinden umfassen Nkowankowa, Lenyenye, Dan-Dorf und Muhlava. Wiederherstellungsmaßnahmen laufen, die Schadensausmaße sind jedoch noch unklar.

Von KI berichtet

North Korean hackers have begun exploiting a critical vulnerability known as React2Shell in malware attacks. This follows similar actions by Chinese hackers, indicating a growing interest in this security flaw. The issue poses significant risks to affected systems.

 

 

 

Diese Website verwendet Cookies

Wir verwenden Cookies für Analysen, um unsere Website zu verbessern. Lesen Sie unsere Datenschutzrichtlinie für weitere Informationen.
Ablehnen