Russian Actors Target Water Systems in Norway, Poland, Denmark, and Romania
Summary
Hide ▲
Show ▼
Russian and allied state-sponsored actors continue to target water systems across Europe as part of a broader hybrid campaign. In Poland, the Internal Security Agency (ABW) has documented cyberattacks against industrial control systems (ICS) at five water treatment plants in 2025, including Jabłonna Lacka, Szczytno, Małdyty, Tolkmicko, and Sierakowo. Attackers gained access to operational systems, modifying parameters with the potential to disrupt public water supplies. The campaign leverages weak password policies and internet-exposed systems, with attribution pointing to Russian APT groups APT28 and APT29, Belarusian-linked UNC1151, and other hacktivist personas acting as state proxies. Earlier incidents in Norway, Poland, and Denmark involved destructive or disruptive actions against water utilities, while Romania experienced a ransomware attack on its national water authority. These attacks form part of a sustained influence operation aimed at undermining Western support for Ukraine and demonstrating asymmetric cyber capabilities against critical infrastructure.
Timeline
-
22.12.2025 17:25 2 articles · 4mo ago
Romanian Waters Hit by Ransomware Attack
Romanian Waters, the country's water management authority, was hit by a ransomware attack where attackers used Windows BitLocker to encrypt approximately 1,000 systems across the national authority and 10 of 11 regional offices, leaving a 7-day ransom demand. The investigation remains ongoing and no attribution has been made.
Show sources
- Romanian water authority hit by ransomware attack over weekend — www.bleepingcomputer.com — 22.12.2025 17:25
- Polish Security Agency Reports ICS Breaches at Five Water Treatment Plants — www.securityweek.com — 08.05.2026 14:46
-
19.12.2025 14:28 4 articles · 4mo ago
Denmark Blames Russia for Cyberattacks on Water Utility
Polish authorities report that in August 2025, a cyberattack could have caused a city to lose its water supply but was thwarted; the Internal Security Agency (ABW) later documented ICS breaches at five water treatment plants in 2025 (Jabłonna Lacka, Szczytno, Małdyty, Tolkmicko, and Sierakowo), where attackers gained access to operational systems and obtained the ability to modify equipment parameters, creating a direct risk to operational continuity and public water supply. ABW attributed primary responsibility to hacktivist groups often acting as state proxies, including Russian APT28, APT29, and Belarusian-linked UNC1151, and identified weak password policies and internet-exposed systems as primary attack vectors.
Show sources
- Denmark blames Russia for destructive cyberattack on water utility — www.bleepingcomputer.com — 19.12.2025 14:28
- Denmark Blames Russia for "Destructive" Cyber-Attacks — www.infosecurity-magazine.com — 19.12.2025 14:30
- Romanian water authority hit by ransomware attack over weekend — www.bleepingcomputer.com — 22.12.2025 17:25
- Polish Security Agency Reports ICS Breaches at Five Water Treatment Plants — www.securityweek.com — 08.05.2026 14:46
-
15.08.2025 16:00 3 articles · 8mo ago
Russian Actors Target Water Systems in Norway and Poland
On August 13, 2025, Norway's counter-intelligence agency attributed an April attack on a dam to Russian hackers, who opened a flood gate, releasing 500 liters of water per second for about four hours. The attack demonstrated the potential for water systems to be used as geopolitical pawns. Poland also reported a similar attack on a large city's water supply, which could have been shut down. In December 2025, Danish intelligence officials blamed Russia for orchestrating cyberattacks against Denmark's critical infrastructure, including a destructive attack on a water utility. Two Russian groups, Z-Pentest and NoName057(16), were identified as operating on behalf of the Russian state. The attacks are part of a broader influence campaign intended to undermine Western support for Ukraine.
Show sources
- Water Systems Under Attack: Norway, Poland Blame Russia Actors — www.darkreading.com — 15.08.2025 16:00
- Denmark blames Russia for destructive cyberattack on water utility — www.bleepingcomputer.com — 19.12.2025 14:28
- Denmark Blames Russia for "Destructive" Cyber-Attacks — www.infosecurity-magazine.com — 19.12.2025 14:30
Information Snippets
-
On April 2025, Russian hackers opened a flood gate at a Norwegian dam, releasing 500 liters of water per second for about four hours.
First reported: 15.08.2025 16:002 sources, 2 articlesShow sources
- Water Systems Under Attack: Norway, Poland Blame Russia Actors — www.darkreading.com — 15.08.2025 16:00
- Denmark blames Russia for destructive cyberattack on water utility — www.bleepingcomputer.com — 19.12.2025 14:28
-
The attack on the Norwegian dam was attributed to Russian state-sponsored actors by Norway's Police Security Service (PST).
First reported: 15.08.2025 16:002 sources, 2 articlesShow sources
- Water Systems Under Attack: Norway, Poland Blame Russia Actors — www.darkreading.com — 15.08.2025 16:00
- Denmark blames Russia for destructive cyberattack on water utility — www.bleepingcomputer.com — 19.12.2025 14:28
-
Poland reported a similar attack on a large city's water supply, which could have been shut down.
First reported: 15.08.2025 16:001 source, 1 articleShow sources
- Water Systems Under Attack: Norway, Poland Blame Russia Actors — www.darkreading.com — 15.08.2025 16:00
-
Water and wastewater systems have attracted significant attention from cyberthreat actors, with one in five utilities in the US reporting a cybersecurity incident in Q1 2025.
First reported: 15.08.2025 16:001 source, 1 articleShow sources
- Water Systems Under Attack: Norway, Poland Blame Russia Actors — www.darkreading.com — 15.08.2025 16:00
-
Chinese threat groups have also targeted water and power utilities in the US, maintaining persistence on systems for over 300 days.
First reported: 15.08.2025 16:001 source, 1 articleShow sources
- Water Systems Under Attack: Norway, Poland Blame Russia Actors — www.darkreading.com — 15.08.2025 16:00
-
Water systems often run outdated firmware, use default passwords, and expose remote network services, making them vulnerable to attacks.
First reported: 15.08.2025 16:001 source, 1 articleShow sources
- Water Systems Under Attack: Norway, Poland Blame Russia Actors — www.darkreading.com — 15.08.2025 16:00
-
The DEF CON Franklin initiative aims to pair cybersecurity experts with small water utilities to address cyber vulnerabilities.
First reported: 15.08.2025 16:002 sources, 2 articlesShow sources
- Water Systems Under Attack: Norway, Poland Blame Russia Actors — www.darkreading.com — 15.08.2025 16:00
- Denmark Blames Russia for "Destructive" Cyber-Attacks — www.infosecurity-magazine.com — 19.12.2025 14:30
-
States like Hawaii and New York are developing strategies to secure and monitor water and wastewater systems using federal funding and consistent regulations.
First reported: 15.08.2025 16:002 sources, 2 articlesShow sources
- Water Systems Under Attack: Norway, Poland Blame Russia Actors — www.darkreading.com — 15.08.2025 16:00
- Denmark Blames Russia for "Destructive" Cyber-Attacks — www.infosecurity-magazine.com — 19.12.2025 14:30
-
Adopting foundational controls like the SANS 5 Critical Controls for ICS Cybersecurity can help utilities build a resilient defense posture.
First reported: 15.08.2025 16:001 source, 1 articleShow sources
- Water Systems Under Attack: Norway, Poland Blame Russia Actors — www.darkreading.com — 15.08.2025 16:00
-
Danish intelligence officials blamed Russia for orchestrating cyberattacks against Denmark's critical infrastructure, including a destructive attack on a water utility.
First reported: 19.12.2025 14:281 source, 2 articlesShow sources
- Denmark blames Russia for destructive cyberattack on water utility — www.bleepingcomputer.com — 19.12.2025 14:28
- Romanian water authority hit by ransomware attack over weekend — www.bleepingcomputer.com — 22.12.2025 17:25
-
Two Russian groups, Z-Pentest and NoName057(16), were identified as operating on behalf of the Russian state.
First reported: 19.12.2025 14:282 sources, 3 articlesShow sources
- Denmark blames Russia for destructive cyberattack on water utility — www.bleepingcomputer.com — 19.12.2025 14:28
- Denmark Blames Russia for "Destructive" Cyber-Attacks — www.infosecurity-magazine.com — 19.12.2025 14:30
- Romanian water authority hit by ransomware attack over weekend — www.bleepingcomputer.com — 22.12.2025 17:25
-
The attacks are part of a broader influence campaign intended to undermine Western support for Ukraine.
First reported: 19.12.2025 14:282 sources, 3 articlesShow sources
- Denmark blames Russia for destructive cyberattack on water utility — www.bleepingcomputer.com — 19.12.2025 14:28
- Denmark Blames Russia for "Destructive" Cyber-Attacks — www.infosecurity-magazine.com — 19.12.2025 14:30
- Romanian water authority hit by ransomware attack over weekend — www.bleepingcomputer.com — 22.12.2025 17:25
-
Denmark has participated in international sanctions against Moscow and supported Ukraine throughout the war.
First reported: 19.12.2025 14:281 source, 2 articlesShow sources
- Denmark blames Russia for destructive cyberattack on water utility — www.bleepingcomputer.com — 19.12.2025 14:28
- Romanian water authority hit by ransomware attack over weekend — www.bleepingcomputer.com — 22.12.2025 17:25
-
The Danish Defence Intelligence Service (DDIS) assessed that Russian hacktivists were behind a destructive cyber-attack on a Danish water utility in 2024.
First reported: 19.12.2025 14:301 source, 1 articleShow sources
- Denmark Blames Russia for "Destructive" Cyber-Attacks — www.infosecurity-magazine.com — 19.12.2025 14:30
-
Russian threat actors were also blamed for a series of distributed denial-of-service (DDoS) attacks on Danish websites in the run-up to the 2025 municipal and regional council elections.
First reported: 19.12.2025 14:301 source, 1 articleShow sources
- Denmark Blames Russia for "Destructive" Cyber-Attacks — www.infosecurity-magazine.com — 19.12.2025 14:30
-
The DDIS named the pro-Russian hacktivist groups Z-Pentest as the authors of the destructive attack on the water utility in 2024 and said NoName057(16) was behind the series of DDoS attacks in 2025.
First reported: 19.12.2025 14:301 source, 1 articleShow sources
- Denmark Blames Russia for "Destructive" Cyber-Attacks — www.infosecurity-magazine.com — 19.12.2025 14:30
-
The Russian state uses both groups as instruments of its hybrid war against the West. The aim is to create insecurity in the targeted countries and to punish those that support Ukraine.
First reported: 19.12.2025 14:302 sources, 2 articlesShow sources
- Denmark Blames Russia for "Destructive" Cyber-Attacks — www.infosecurity-magazine.com — 19.12.2025 14:30
- Romanian water authority hit by ransomware attack over weekend — www.bleepingcomputer.com — 22.12.2025 17:25
-
A global cybersecurity advisory warned that pro-Russian hacktivist groups conduct opportunistic attacks against US and global critical infrastructure.
First reported: 19.12.2025 14:301 source, 1 articleShow sources
- Denmark Blames Russia for "Destructive" Cyber-Attacks — www.infosecurity-magazine.com — 19.12.2025 14:30
-
The advisory was co-signed by 23 law enforcement and intelligence agencies across the Five Eyes, EU member states, Europol, and Eurojust.
First reported: 19.12.2025 14:302 sources, 2 articlesShow sources
- Denmark Blames Russia for "Destructive" Cyber-Attacks — www.infosecurity-magazine.com — 19.12.2025 14:30
- Romanian water authority hit by ransomware attack over weekend — www.bleepingcomputer.com — 22.12.2025 17:25
-
Romanian Waters, the country's water management authority, was hit by a ransomware attack over the weekend.
First reported: 22.12.2025 17:251 source, 1 articleShow sources
- Romanian water authority hit by ransomware attack over weekend — www.bleepingcomputer.com — 22.12.2025 17:25
-
The incident impacted approximately 1,000 computer systems at the national water authority and 10 of its 11 regional offices.
First reported: 22.12.2025 17:251 source, 1 articleShow sources
- Romanian water authority hit by ransomware attack over weekend — www.bleepingcomputer.com — 22.12.2025 17:25
-
The attackers used the built-in Windows BitLocker security feature to lock files on compromised systems, then left a ransom note demanding that they be contacted within 7 days.
First reported: 22.12.2025 17:251 source, 1 articleShow sources
- Romanian water authority hit by ransomware attack over weekend — www.bleepingcomputer.com — 22.12.2025 17:25
-
The Romanian cybersecurity agency stated that while the country's national cybersecurity system for critical IT infrastructure did not protect the water management authority's infrastructure before the attack, authorities are now working to integrate it into protective systems operated by the National Cyberint Center.
First reported: 22.12.2025 17:251 source, 1 articleShow sources
- Romanian water authority hit by ransomware attack over weekend — www.bleepingcomputer.com — 22.12.2025 17:25
-
The investigation is ongoing, and no attribution has been made yet.
First reported: 22.12.2025 17:251 source, 1 articleShow sources
- Romanian water authority hit by ransomware attack over weekend — www.bleepingcomputer.com — 22.12.2025 17:25
-
Poland’s Internal Security Agency (ABW) documented cyberattacks targeting ICS and OT infrastructure in 2024 and 2025 with state-sponsored actors increasingly shifting focus toward physical disruption of critical services.
First reported: 08.05.2026 14:461 source, 1 articleShow sources
- Polish Security Agency Reports ICS Breaches at Five Water Treatment Plants — www.securityweek.com — 08.05.2026 14:46
-
In August 2025, a Polish official revealed that a cyberattack could have caused a city to lose its water supply but was thwarted; no technical details were shared at the time.
First reported: 08.05.2026 14:461 source, 1 articleShow sources
- Polish Security Agency Reports ICS Breaches at Five Water Treatment Plants — www.securityweek.com — 08.05.2026 14:46
-
ABW reported security breaches at five water treatment plants in 2025: Jabłonna Lacka, Szczytno, Małdyty, Tolkmicko, and Sierakowo.
First reported: 08.05.2026 14:461 source, 1 articleShow sources
- Polish Security Agency Reports ICS Breaches at Five Water Treatment Plants — www.securityweek.com — 08.05.2026 14:46
-
Attackers gained access to ICS at Polish water treatment facilities, obtaining the ability to modify operational parameters, creating a direct risk to operational continuity and public water supply.
First reported: 08.05.2026 14:461 source, 1 articleShow sources
- Polish Security Agency Reports ICS Breaches at Five Water Treatment Plants — www.securityweek.com — 08.05.2026 14:46
-
ABW identified weak password policies and internet-exposed systems as primary attack vectors for ICS intrusions in Polish water infrastructure.
First reported: 08.05.2026 14:461 source, 1 articleShow sources
- Polish Security Agency Reports ICS Breaches at Five Water Treatment Plants — www.securityweek.com — 08.05.2026 14:46
-
ABW attributed primary responsibility for attacks on Polish critical infrastructure to hacktivist groups, often used as personas by foreign governments, including Russian intelligence services APT28 and APT29, and Belarusian-linked UNC1151.
First reported: 08.05.2026 14:461 source, 1 articleShow sources
- Polish Security Agency Reports ICS Breaches at Five Water Treatment Plants — www.securityweek.com — 08.05.2026 14:46
-
ABW documented an increase in attacks targeting supply chains, including contract data, project documentation, and authentication credentials to enable downstream access to systems.
First reported: 08.05.2026 14:461 source, 1 articleShow sources
- Polish Security Agency Reports ICS Breaches at Five Water Treatment Plants — www.securityweek.com — 08.05.2026 14:46
Similar Happenings
Iranian Hacktivist Group Claims Wiper Attack on Stryker
The Iranian hacktivist group Handala—linked to Iran’s Ministry of Intelligence and Security (MOIS)—conducted a destructive wiper attack against Stryker, a U.S. Fortune 500 medical technology company, on March 11, 2026. The attack affected over 200,000 systems across 79 countries, disrupted operations in Ireland, and sent over 5,000 workers home. Handala claimed responsibility, citing retaliation for a U.S. missile strike. The attack leveraged Microsoft Intune to issue remote wipe commands and defaced Stryker’s Entra login page. Stryker confirmed the incident in an SEC filing and reported no evidence of data exfiltration. Recovery efforts prioritized restoring supply-chain systems. In a separate but related development, Handala breached the personal email account of FBI Director Kash Patel on March 28, 2026, and leaked historical emails from 2010 and 2019. The FBI acknowledged the targeting and stated the leaked data was not government-related. Handala operates under multiple monikers, including Banished Kitten and Void Manticore, and has integrated criminal tools such as Rhadamanthys stealer to enhance its operations. The group’s activities align with broader Iranian cyber operations targeting Western entities amid heightened geopolitical tensions, including destructive attacks, hack-and-leak campaigns, and psychological influence operations. U.S. authorities have seized multiple domains linked to Handala and offered a $10 million reward for information on group members.
Increased ICS Vulnerability Exploits and Hacktivist Activity in 2025
In 2025, cyber threat actors, including both cybercriminals and hacktivists, significantly increased their attacks on industrial control systems (ICS) and operational technology (OT) environments. The number of ICS vulnerability disclosures nearly doubled compared to 2024, with Siemens and Schneider Electric being the most affected vendors. Ransomware attacks also surged, particularly targeting manufacturing and healthcare sectors, while hacktivist groups focused on energy, utilities, and transportation sectors. The report predicts continued targeting of exposed HMI and SCADA systems in 2026.
Pro-Russia Hacktivists Target Critical Infrastructure with Low-Sophistication Attacks
Pro-Russia hacktivist groups are conducting opportunistic, low-sophistication cyberattacks against U.S., UK, and global critical infrastructure. These attacks target a wide range of sectors, including water treatment facilities, food production, energy systems, and local government bodies, using easily repeatable methods. The groups exploit minimally secured, internet-facing virtual network computing (VNC) connections to gain unauthorized access to operational technology (OT) control devices. The joint advisory from CISA, FBI, NSA, and global partners, along with a recent warning from the UK National Cyber Security Centre (NCSC), urges immediate action to mitigate these threats. The advisory highlights the use of basic methods to target supervisory control and data acquisition (SCADA) networks, sometimes combined with DDoS attacks. The cumulative impact of these activities poses a persistent and disruptive threat to essential services. According to a new report, groups such as Cyber Army of Russia Reborn (CARR), Z-Pentest, NoName057(16), and Sector16 are using simple reconnaissance tools and common password-guessing techniques to reach internet-facing human-machine interfaces. These groups have led to physical impacts in some cases, including temporary loss of view and costly manual recovery efforts. The NCSC warns of continued malicious activity from Russian-aligned hacktivist groups targeting critical infrastructure and local government organizations in the UK with disruptive denial-of-service (DDoS) attacks. The NCSC notes that NoName057(16) operates the DDoSia project, a platform that allows volunteers to contribute computing resources to carry out crowdsourced DDoS attacks and receive monetary rewards or recognition from the community. Operation Eastwood disrupted NoName057(16)'s activity in mid-July 2025 by arresting two members of the group, issuing eight arrest warrants, and taking down 100 servers. Despite these efforts, the group has returned to action, highlighting the evolving threat they pose. Recent developments indicate that attackers are growing more interested in and accustomed to dealing with industrial machines, potentially leading to more sophisticated OT attacks. Ric Derbyshire, principal security engineer at Orange Cyberdefense, will demonstrate 'living-off-the-plant' attacks at the RSA Conference 2026, which require a holistic understanding of the physical process, OT systems, network architecture, security controls, and human interactions.
INC Ransom Gang Disrupts OnSolve CodeRED Emergency Alert Platform
The INC Ransom gang has disrupted the OnSolve CodeRED emergency alert platform, stealing sensitive user data and forcing Crisis24 to decommission the legacy environment. The attack affected emergency notification systems used by state and local governments, police departments, and fire agencies across the United States. Data stolen includes names, addresses, email addresses, phone numbers, and passwords. The gang claims to have breached the system on November 1, 2025, and encrypted files on November 10, 2025. Crisis24 is rebuilding the service using backups from March 31, 2025, which may result in missing accounts. The incident highlights the critical impact of cyberattacks on emergency services and the importance of robust cybersecurity measures. The INC Ransom group has published screenshots of stolen data and is selling samples of the stolen data, escalating concerns among affected agencies. An operational security failure by the INC ransomware gang allowed researchers to recover data stolen from a dozen U.S. organizations. The investigation, conducted by Cyber Centaurs, revealed artifacts from the legitimate backup tool Restic, which exposed attacker infrastructure. The researchers developed a controlled enumeration process that confirmed the presence of encrypted data stolen from 12 unrelated organizations.
Hacktivist Intrusions Target Canadian Water and Energy Facilities
Hacktivists have breached critical infrastructure systems in Canada, tampering with industrial controls at a water treatment facility, an oil & gas firm, and an agricultural facility. These incidents highlight the risks of poorly secured Industrial Control Systems (ICS) and the need for stronger security measures. The breaches resulted in degraded service, false alarms, and potentially unsafe conditions. The attacks were opportunistic and aimed at causing media attention and undermining trust in Canadian authorities. No catastrophic consequences were reported, but the incidents underscore the vulnerabilities in ICS components such as PLCs, SCADA systems, HMIs, and industrial IoTs.