BusinessCybersecurityNewswireTechnology

Poland Thwarts Wiper Malware Attack on Energy Grid

Originally published on: January 25, 2026
▼ Summary

– Poland’s electric grid was targeted by wiper malware in late December, likely by Russian state hackers, in an attempt to disrupt operations.
– The attack aimed to sever communications between renewable energy installations and power distributors but ultimately failed.
– Security firm ESET identified the malware as a wiper, designed to permanently erase data and destroy operations.
– ESET attributes the attack with medium confidence to the Russian hacker group Sandworm, based on overlapping tactics with previous activities.
– Sandworm has a history of destructive attacks, including causing a 2015 blackout in Ukraine that left 230,000 people without power.

Poland’s national energy infrastructure recently faced a significant cyber threat, with security researchers identifying a sophisticated wiper malware attack designed to cripple the electricity grid. The incident, which took place in late December, targeted the critical communications links between renewable energy installations and the primary power distribution operators. Fortunately, the attack was ultimately unsuccessful, preventing any disruption to the electricity supply for Polish citizens. This event underscores the persistent and evolving digital threats facing essential national infrastructure across the globe.

The malware deployed in this campaign was a wiper, a particularly destructive form of malicious software. Unlike ransomware, which encrypts data for extortion, a wiper’s sole purpose is to permanently erase code and data from infected systems, aiming to cause irreversible operational damage. Security analysts from the firm ESET conducted a thorough investigation, examining the specific tactics, techniques, and procedures used by the attackers. Their findings point to a familiar and dangerous actor.

ESET researchers attributed the attack with medium confidence to the Russian state-aligned hacking group tracked as Sandworm. This assessment is based on a strong overlap with numerous previous wiper campaigns analyzed by the security community. The group, which operates on behalf of the Kremlin, has a long and notorious history of executing destructive cyber operations against perceived adversaries. Their most infamous operation occurred in Ukraine in December 2015, marking a dangerous precedent in cyber warfare.

That earlier attack resulted in a widespread blackout, leaving approximately 230,000 people without power for several hours during a severe winter month. In that incident, hackers used malware known as BlackEnergy to infiltrate power companies’ industrial control systems. Once inside, they manipulated legitimate system functions to deliberately halt electricity distribution. It was the first publicly confirmed case of a blackout directly caused by a cyberattack, demonstrating the tangible physical consequences of digital intrusions into critical infrastructure.

While the recent attempt on Poland’s grid failed, its occurrence highlights a continuous strategic threat. Nation-state actors are actively probing and attacking the operational technology that manages essential services like energy, water, and transportation. The focus on communication systems for renewable energy sources also suggests attackers are adapting their strategies to target modern, distributed elements of the power grid. Defending against these threats requires constant vigilance, robust network segmentation, and advanced threat detection capabilities to identify and neutralize such attacks before they can achieve their destructive aims.

(Source: Ars Technica)

Topics

wiper malware 95% cyberattack poland 90% sandworm apt 88% electric grid 85% russia state hackers 82% ttps analysis 78% eset research 75% ukraine blackout 72% blackenergy malware 70% scada systems 68%