Wiper malware targets Poland's energy grid but causes no blackout

Researchers have attributed a failed cyberattack on Poland's electric grid to Russian state hackers, coinciding with the 10th anniversary of a similar assault on Ukraine. The wiper malware aimed to disrupt power distribution but did not succeed in knocking out electricity. Security firm ESET linked the incident to the notorious Sandworm group.

In late December, Poland's energy infrastructure faced a cyber threat when wiper malware was deployed against its electric grid. The attack, which occurred during the last week of the month, sought to sever communications between renewable energy installations and power distribution operators. However, it failed to cause any disruptions to electricity supply, for reasons that remain unclear.

ESET, a cybersecurity firm, analyzed the malware and identified it as DynoWiper, a destructive tool designed to permanently erase code and data on servers. The researchers attributed the operation to the Russia-aligned Sandworm advanced persistent threat (APT) group with medium confidence, citing overlaps in tactics, techniques, and procedures with prior Sandworm activities. "Based on our analysis of the malware and associated TTPs, we attribute the attack to the Russia-aligned Sandworm APT with medium confidence due to a strong overlap with numerous previous Sandworm wiper activity we analyzed," the firm stated. ESET emphasized that no successful disruptions resulted from this incident.

Sandworm has a track record of deploying wipers in geopolitical conflicts. Notably, on December 23, 2015—exactly 10 years before this attack—the group used BlackEnergy malware to black out power for about 230,000 Ukrainians for six hours during winter. More recently, in 2022, Sandworm's AcidRain wiper targeted 270,000 satellite modems in Ukraine, marking the seventh such tool used since Russia's invasion. The group also hit Ukrainian universities and critical infrastructure with multiple wipers last year. The 2017 NotPetya worm, another Sandworm creation, spread globally despite targeting Ukraine, causing an estimated $10 billion in damages.

Speculation surrounds DynoWiper's failure: it might have been a deliberate show of force to avoid escalating tensions with Poland's NATO allies, or robust cyber defenses could have neutralized it. This event underscores ongoing hybrid threats to European energy systems amid regional tensions.

Mga Kaugnay na Artikulo

Illustration of Russian drones and missiles attacking Ukrainian power substations, causing fiery explosions, blackouts, and rail disruptions near a nuclear plant.
Larawang ginawa ng AI

Russian drones and missiles hit Ukraine's power grid and transport hubs, officials say

Iniulat ng AI Larawang ginawa ng AI Fact checked

A large-scale Russian drone and missile attack damaged power facilities in eight Ukrainian regions on Saturday, causing blackouts, forcing nuclear plants to cut output and disrupting rail services, according to Ukrainian authorities and the International Atomic Energy Agency.

Pro-Russian hackers known as Curly COMrades are exploiting Microsoft's Hyper-V technology to embed lightweight Alpine Linux virtual machines within compromised Windows systems. This tactic allows them to run custom malware like CurlyShell and CurlCat undetected by traditional endpoint detection tools. The campaign, uncovered by Bitdefender in collaboration with the Georgian CERT, targets organizations in Europe and beyond.

Iniulat ng AI

Russian state-sponsored hackers quickly weaponized a newly patched Microsoft Office flaw to target organizations in nine countries. The group, known as APT28, used spear-phishing emails to install stealthy backdoors in diplomatic, defense, and transport entities. Security researchers at Trellix attributed the attacks with high confidence to this notorious cyber espionage unit.

A notorious group of Russian cybercriminals has resurfaced with a new ransomware variant. However, security experts note that files encrypted by this malware can be easily decrypted.

Iniulat ng AI

Cisco Talos has detailed how a Chinese-linked group is exploiting an unpatched zero-day in email security appliances since late November 2025, deploying backdoors and log-wiping tools for persistent access.

Severe storms and hail have cut off electricity to several areas in Tzaneen, Limpopo, after damaging two Eskom substations. Affected communities include Nkowankowa, Lenyenye, Dan village, and Muhlava. Restoration efforts are underway, though the extent of damage remains unclear.

Iniulat ng AI

North Korean hackers have begun exploiting a critical vulnerability known as React2Shell in malware attacks. This follows similar actions by Chinese hackers, indicating a growing interest in this security flaw. The issue poses significant risks to affected systems.

 

 

 

Gumagamit ng cookies ang website na ito

Gumagamit kami ng cookies para sa analytics upang mapabuti ang aming site. Basahin ang aming patakaran sa privacy para sa higit pang impormasyon.
Tanggihan