Wiper malware targets Poland's energy grid but causes no blackout

Researchers have attributed a failed cyberattack on Poland's electric grid to Russian state hackers, coinciding with the 10th anniversary of a similar assault on Ukraine. The wiper malware aimed to disrupt power distribution but did not succeed in knocking out electricity. Security firm ESET linked the incident to the notorious Sandworm group.

In late December, Poland's energy infrastructure faced a cyber threat when wiper malware was deployed against its electric grid. The attack, which occurred during the last week of the month, sought to sever communications between renewable energy installations and power distribution operators. However, it failed to cause any disruptions to electricity supply, for reasons that remain unclear.

ESET, a cybersecurity firm, analyzed the malware and identified it as DynoWiper, a destructive tool designed to permanently erase code and data on servers. The researchers attributed the operation to the Russia-aligned Sandworm advanced persistent threat (APT) group with medium confidence, citing overlaps in tactics, techniques, and procedures with prior Sandworm activities. "Based on our analysis of the malware and associated TTPs, we attribute the attack to the Russia-aligned Sandworm APT with medium confidence due to a strong overlap with numerous previous Sandworm wiper activity we analyzed," the firm stated. ESET emphasized that no successful disruptions resulted from this incident.

Sandworm has a track record of deploying wipers in geopolitical conflicts. Notably, on December 23, 2015—exactly 10 years before this attack—the group used BlackEnergy malware to black out power for about 230,000 Ukrainians for six hours during winter. More recently, in 2022, Sandworm's AcidRain wiper targeted 270,000 satellite modems in Ukraine, marking the seventh such tool used since Russia's invasion. The group also hit Ukrainian universities and critical infrastructure with multiple wipers last year. The 2017 NotPetya worm, another Sandworm creation, spread globally despite targeting Ukraine, causing an estimated $10 billion in damages.

Speculation surrounds DynoWiper's failure: it might have been a deliberate show of force to avoid escalating tensions with Poland's NATO allies, or robust cyber defenses could have neutralized it. This event underscores ongoing hybrid threats to European energy systems amid regional tensions.

관련 기사

Illustration of Russian drones and missiles attacking Ukrainian power substations, causing fiery explosions, blackouts, and rail disruptions near a nuclear plant.
AI에 의해 생성된 이미지

Russian drones and missiles hit Ukraine's power grid and transport hubs, officials say

AI에 의해 보고됨 AI에 의해 생성된 이미지 사실 확인됨

A large-scale Russian drone and missile attack damaged power facilities in eight Ukrainian regions on Saturday, causing blackouts, forcing nuclear plants to cut output and disrupting rail services, according to Ukrainian authorities and the International Atomic Energy Agency.

Russia carried out a large overnight air attack into Saturday, launching more than 400 drones and about 40 missiles aimed at Ukraine’s energy sector, Ukrainian officials said. The strikes hit power generation and electricity distribution infrastructure and prompted emergency power cuts and a request for electricity assistance from Poland as temperatures were forecast to fall in coming days.

AI에 의해 보고됨

Pro-Russian hackers known as Curly COMrades are exploiting Microsoft's Hyper-V technology to embed lightweight Alpine Linux virtual machines within compromised Windows systems. This tactic allows them to run custom malware like CurlyShell and CurlCat undetected by traditional endpoint detection tools. The campaign, uncovered by Bitdefender in collaboration with the Georgian CERT, targets organizations in Europe and beyond.

In an update to the arson attack on a Berlin cable bridge claimed by the Volcano Group—which triggered the city's longest post-war power outage—the Federal Prosecutor's Office has assumed control of the probe. Suspected terrorist sabotage motives are under scrutiny as outages persist for over 25,000 households into day four.

AI에 의해 보고됨 사실 확인됨

A report promoted by the conservative-leaning nonprofit Power the Future said natural gas, coal and nuclear plants generated the bulk of U.S. electricity during Winter Storm Fern, while wind and solar output fell during the storm’s coldest, darkest hours. The findings circulated amid the Trump administration’s renewed pushback on wind power, including a December 2025 move to suspend five offshore wind projects on the East Coast.

Law enforcement agencies from the United States and Europe, supported by private partners, have taken down the SocksEscort cybercrime proxy network. This service, powered by the AVRecon malware infecting Linux-based devices, provided cybercriminals with access to compromised IP addresses. The operation resulted in the seizure of domains, servers, and cryptocurrency assets.

AI에 의해 보고됨

Cisco Talos has detailed how a Chinese-linked group is exploiting an unpatched zero-day in email security appliances since late November 2025, deploying backdoors and log-wiping tools for persistent access.

 

 

 

이 웹사이트는 쿠키를 사용합니다

사이트를 개선하기 위해 분석을 위한 쿠키를 사용합니다. 자세한 내용은 개인정보 보호 정책을 읽으세요.
거부