Russian Threat Actors Target Ukrainian and Polish Organizations with Data-Wiping Malware and LotL Tactics
Summary
Hide ▲
Show ▼
Russian threat actors, specifically the Sandworm group, have targeted Ukrainian organizations and Poland's power sector using living-off-the-land (LotL) tactics and deploying data-wiping malware. The attacks, which began in June 2025, involved minimal malware to reduce detection and included the use of web shells and legitimate tools for reconnaissance and data theft. The threat actors exploited unpatched vulnerabilities to deploy web shells on public-facing servers, gaining initial access. They then used various tactics, including PowerShell commands, scheduled tasks, and legitimate software, to evade detection and perform reconnaissance. The attacks were characterized by the use of legitimate tools and minimal malware, demonstrating the actors' deep knowledge of Windows native tools. In addition to LotL tactics, Sandworm deployed multiple data-wiping malware families in June and September 2025, targeting Ukraine's education, government, and grain sectors. The grain sector, a vital economic sector, was targeted to disrupt Ukraine's war economy. The data-wiping malware used included ZeroLot and Sting, with initial access achieved by UAC-0099, who then transferred access to APT44 for wiper deployment. The activity is confirmed to be of Russian origin, with specific attribution to the Sandworm group. In December 2025, Sandworm targeted Poland's power sector with a new wiper malware called DynoWiper, aiming to disrupt the energy infrastructure. The attack, which occurred on December 29 and 30, 2025, targeted two combined heat and power (CHP) plants and a system managing renewable energy sources. The attack was unsuccessful in causing disruption, and Polish authorities attributed it to Russian services. The attack coincided with the tenth anniversary of Sandworm's 2015 attack on Ukraine's power grid. A new Russia-aligned threat activity cluster, InedibleOchotense, impersonated ESET in phishing attacks targeting Ukrainian entities starting in May 2025. This campaign involved sending spear-phishing emails and Signal text messages containing links to trojanized ESET installers, which delivered the Kalambur backdoor. InedibleOchotense is linked to the Sandworm (APT44) hacking group and has been observed conducting destructive campaigns in Ukraine, including the deployment of wiper malware ZEROLOT and Sting. Another Russia-aligned threat actor, RomCom, launched spear-phishing campaigns in mid-July 2025 exploiting a WinRAR vulnerability (CVE-2025-8088) targeting various sectors in Europe and Canada. RomCom also targeted a U.S.-based civil engineering company via a JavaScript loader dubbed SocGholish to deliver the Mythic Agent. The activity has been attributed with medium-to-high confidence to Unit 29155 of Russia's Main Directorate of the General Staff of the Armed Forces of the Russian Federation, also known as GRU. The targeted entity had worked for a city with close ties to Ukraine in the past. The ESET report noted that other Russian-aligned APT groups also maintained their focus on Ukraine and countries with strategic ties to Ukraine, while also expanding their operations to European entities. Gamaredon remained the most active APT group targeting Ukraine, with a noticeable increase in intensity and frequency of its operations during the reported period. Gamaredon selectively deployed one of Turla’s backdoors, indicating a rare instance of cooperation between Russia-aligned APT groups. Gamaredon’s toolset continued to evolve, incorporating new file stealers or tunneling services. The cyber attack on the Polish power grid in December 2025 was attributed with medium confidence to a Russian state-sponsored hacking group known as ELECTRUM. The attack targeted distributed energy resources (DERs) and affected communication and control systems at combined heat and power (CHP) facilities and systems managing renewable energy systems. ELECTRUM and KAMACITE share overlaps with the Sandworm cluster, with KAMACITE focusing on initial access and ELECTRUM conducting operations that bridge IT and OT environments. The attackers gained access to operational technology systems critical to grid operations and disabled key equipment beyond repair at the site. The attack was opportunistic and rushed, with the hackers attempting to inflict as much damage as possible by wiping Windows-based devices and resetting configurations. The majority of the equipment targeted was related to grid safety and stability monitoring. The coordinated attack on Poland's power grid in late December targeted multiple distributed energy resource (DER) sites across the country, including combined heat and power (CHP) facilities and wind and solar dispatch systems. Although the attacker compromised operational technology (OT) systems damaging "key equipment beyond repair," they failed to disrupt power, totaling 1.2 GW or 5% of Poland’s energy supply. Based on public reports, there are at least 12 confirmed affected sites. However, researchers at Dragos, a critical industrial infrastructure (OT) and control systems (ICS) security company say that the number is approximately 30. Dragos attributes the attack with moderate confidence to a Russian threat actor it tracks as Electrum, which, although it overlaps with Sandworm (APT44), the researchers underline that it is a distinct activity cluster. Electrum targeted exposed and vulnerable systems involved in dispatch and grid-facing communication, remote terminal units (RTUs), network edge devices, monitoring and control systems, and Windows-based machines at DER sites. Electrum successfully disabled communications equipment at multiple sites, resulting in a loss of remote monitoring and control, but power generation on the units continued without interruption. Certain OT/ICS devices were disabled, and their configurations were corrupted beyond recovery, while Windows systems at the sites were wiped. Even if the attacks had been successful in cutting the power, the relatively narrow targeting scope wouldn’t have been enough to cause a nationwide blackout in Poland. However, they could have caused significant destabilization of the system frequency. "Such frequency deviations have caused cascading failures in other electrical systems, including the 2025 Iberian grid collapse," the researchers say. CERT Polska revealed that coordinated cyber attacks targeted more than 30 wind and photovoltaic farms, a private company from the manufacturing sector, and a large combined heat and power plant (CHP) in Poland on December 29, 2025. The attacks were attributed to a threat cluster dubbed Static Tundra, which is linked to Russia's Federal Security Service's (FSB) Center 16 unit. The attacks had a purely destructive objective but did not affect the ongoing production of electricity or the heat supply to end users. The attackers gained access to the internal network of power substations associated with a renewable energy facility to carry out reconnaissance and disruptive activities, including damaging the firmware of controllers, deleting system files, or launching custom-built wiper malware codenamed DynoWiper. In the intrusion aimed at the CHP, the adversary engaged in long-term data theft dating back to March 2025, enabling them to escalate privileges and move laterally across the network. The attackers' attempts to detonate the wiper malware were unsuccessful. The targeting of the manufacturing sector company is believed to be opportunistic, with the threat actor gaining initial access via a vulnerable Fortinet perimeter device. At least four different versions of DynoWiper have been discovered to date. The wiper's functionality involves initializing a pseudorandom number generator (PRNG) called Mersenne Twister, enumerating files and corrupting them using the PRNG, and deleting files. The malware does not have a persistence mechanism, a way to communicate with a command-and-control (C2) server, or execute shell commands, and it does not attempt to hide the activity from security programs. The attack targeting the manufacturing sector company involved the use of a PowerShell-based wiper dubbed LazyWiper that scripts overwrites files on the system with pseudorandom 32-byte sequences to render them unrecoverable. The malware used in the incident involving renewable energy farms was executed directly on the HMI machine. In the CHP plant and the manufacturing sector company, the malware was distributed within the Active Directory domain via a PowerShell script executed on a domain controller. The attacker used credentials obtained from the on-premises environment in attempts to gain access to cloud services, downloading selected data from services such as Exchange, Teams, and SharePoint. The attacker was particularly interested in files and email messages related to OT network modernization, SCADA systems, and technical work carried out within the organizations. The attack on Poland's energy sector in December 2025 was the first large-scale attack against decentralized energy resources (DERs) like wind turbines and solar farms. The attack occurred during a period when Poland was struggling with low temperatures and snowstorms just before the New Year. Dragos assessed with moderate confidence that the activity reflects tradecraft and objectives in line with the Electrum threat group, which overlaps with Sandworm. Electrum has worked alongside another threat actor, tracked as Kamicite, to conduct destructive attacks against Ukrainian ISPs and persistent scanning of industrial devices in the US. Kamicite gained initial access and persistence against organizations, and Electrum executed follow-on activity. Dragos has tracked Kamicite activities against the European ICS/OT supply chain since late 2024. The attack on Poland's energy sector was significant because it was the first major attack against decentralized energy resources (DERs). There was no evidence that the adversary had full control of the DERs, and there was no attempt to mis-operate these resources. Poland was fortunate because DERs make up a smaller portion of its energy portfolio than some other countries. If this same style of attack happened in the US, Australia, or certain parts of Europe where DERs are more prevalent, it could have been potentially catastrophic for the system. The attack highlighted the ongoing threat faced by the energy sector, with threat actors gaining initial access through vulnerable Internet-facing edge devices before deploying wipers that damaged remote terminal units (RTUs). CISA advised OT operators to prioritize updates that allow firmware verification and to immediately change default passwords on things like edge devices. Dragos recommended that organizations ensure architecture is defensible through methods like strict authorization practices, OT/IT segmentation, strict vendor access governance, secure remote access, and ICS network visibility and monitoring.
Timeline
-
31.01.2026 09:05 2 articles · 18d ago
Static Tundra Conducts Destructive Attacks on Polish Energy and Manufacturing Sectors
CERT Polska revealed that coordinated cyber attacks targeted more than 30 wind and photovoltaic farms, a private company from the manufacturing sector, and a large combined heat and power plant (CHP) in Poland on December 29, 2025. The attacks were attributed to a threat cluster dubbed Static Tundra, which is linked to Russia's Federal Security Service's (FSB) Center 16 unit. The attacks had a purely destructive objective but did not affect the ongoing production of electricity or the heat supply to end users. The attackers gained access to the internal network of power substations associated with a renewable energy facility to carry out reconnaissance and disruptive activities, including damaging the firmware of controllers, deleting system files, or launching custom-built wiper malware codenamed DynoWiper. In the intrusion aimed at the CHP, the adversary engaged in long-term data theft dating back to March 2025, enabling them to escalate privileges and move laterally across the network. The attackers' attempts to detonate the wiper malware were unsuccessful. The targeting of the manufacturing sector company is believed to be opportunistic, with the threat actor gaining initial access via a vulnerable Fortinet perimeter device. At least four different versions of DynoWiper have been discovered to date. The wiper's functionality involves initializing a pseudorandom number generator (PRNG) called Mersenne Twister, enumerating files and corrupting them using the PRNG, and deleting files. The malware does not have a persistence mechanism, a way to communicate with a command-and-control (C2) server, or execute shell commands, and it does not attempt to hide the activity from security programs. The attack targeting the manufacturing sector company involved the use of a PowerShell-based wiper dubbed LazyWiper that scripts overwrites files on the system with pseudorandom 32-byte sequences to render them unrecoverable. The malware used in the incident involving renewable energy farms was executed directly on the HMI machine. In the CHP plant and the manufacturing sector company, the malware was distributed within the Active Directory domain via a PowerShell script executed on a domain controller. The attacker used credentials obtained from the on-premises environment in attempts to gain access to cloud services, downloading selected data from services such as Exchange, Teams, and SharePoint. The attacker was particularly interested in files and email messages related to OT network modernization, SCADA systems, and technical work carried out within the organizations. The attack on Poland's energy sector in December 2025 was the first large-scale attack against decentralized energy resources (DERs) like wind turbines and solar farms. The attack occurred during a period when Poland was struggling with low temperatures and snowstorms just before the New Year. Dragos assessed with moderate confidence that the activity reflects tradecraft and objectives in line with the Electrum threat group, which overlaps with Sandworm. Electrum has worked alongside another threat actor, tracked as Kamicite, to conduct destructive attacks against Ukrainian ISPs and persistent scanning of industrial devices in the US. Kamicite gained initial access and persistence against organizations, and Electrum executed follow-on activity. Dragos has tracked Kamicite activities against the European ICS/OT supply chain since late 2024. The attack on Poland's energy sector was significant because it was the first major attack against decentralized energy resources (DERs). There was no evidence that the adversary had full control of the DERs, and there was no attempt to mis-operate these resources. Poland was fortunate because DERs make up a smaller portion of its energy portfolio than some other countries. If this same style of attack happened in the US, Australia, or certain parts of Europe where DERs are more prevalent, it could have been potentially catastrophic for the system. The attack highlighted the ongoing threat faced by the energy sector, with threat actors gaining initial access through vulnerable Internet-facing edge devices before deploying wipers that damaged remote terminal units (RTUs). CISA advised OT operators to prioritize updates that allow firmware verification and to immediately change default passwords on things like edge devices. Dragos recommended that organizations ensure architecture is defensible through methods like strict authorization practices, OT/IT segmentation, strict vendor access governance, secure remote access, and ICS network visibility and monitoring.
Show sources
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
- Poland Energy Survives Attack on Wind, Solar Infrastructure — www.darkreading.com — 17.02.2026 23:31
-
24.01.2026 10:21 7 articles · 25d ago
Sandworm Attempts to Disrupt Polish Power Sector with DynoWiper
In December 2025, Sandworm targeted Poland's power sector with a new wiper malware called DynoWiper, aiming to disrupt the energy infrastructure. The attack, which occurred on December 29 and 30, 2025, targeted two combined heat and power (CHP) plants and a system managing renewable energy sources. The attack was unsuccessful in causing disruption, and Polish authorities attributed it to Russian services. The attack coincided with the tenth anniversary of Sandworm's 2015 attack on Ukraine's power grid. Sandworm is also tracked as UAC-0113, APT44, and Seashell Blizzard. DynoWiper is detected by ESET as Win32/KillFiles.NMO with SHA-1 hash 4EC3C90846AF6B79EE1A5188EEFA3FD21F6D4CF6. No samples of DynoWiper have been found on malware submission sites as of January 24, 2026. The attackers deployed a wiper malware named DynoWiper during the attack on Poland's power grid in late December 2025. ESET attributed the attack to the Russia-aligned Sandworm APT with medium confidence due to a strong overlap with numerous previous Sandworm wiper activities. The campaign against Polish energy assets is still being investigated, but the timing of the coordinated cyber-attack might be deliberate, coinciding with the 10-year anniversary of the Sandworm-orchestrated attack against the Ukrainian power grid in December 2015. The cyber attack on the Polish power grid in December 2025 was attributed with medium confidence to a Russian state-sponsored hacking group known as ELECTRUM. The attack targeted distributed energy resources (DERs) and affected communication and control systems at combined heat and power (CHP) facilities and systems managing renewable energy systems. ELECTRUM and KAMACITE share overlaps with the Sandworm cluster, with KAMACITE focusing on initial access and ELECTRUM conducting operations that bridge IT and OT environments. The attackers gained access to operational technology systems critical to grid operations and disabled key equipment beyond repair at the site. The attack was opportunistic and rushed, with the hackers attempting to inflict as much damage as possible by wiping Windows-based devices and resetting configurations. The majority of the equipment targeted was related to grid safety and stability monitoring. The coordinated attack on Poland's power grid in late December targeted multiple distributed energy resource (DER) sites across the country, including combined heat and power (CHP) facilities and wind and solar dispatch systems. Although the attacker compromised operational technology (OT) systems damaging "key equipment beyond repair," they failed to disrupt power, totaling 1.2 GW or 5% of Poland’s energy supply. Based on public reports, there are at least 12 confirmed affected sites. However, researchers at Dragos, a critical industrial infrastructure (OT) and control systems (ICS) security company say that the number is approximately 30. Dragos attributes the attack with moderate confidence to a Russian threat actor it tracks as Electrum, which, although it overlaps with Sandworm (APT44), the researchers underline that it is a distinct activity cluster. Electrum targeted exposed and vulnerable systems involved in dispatch and grid-facing communication, remote terminal units (RTUs), network edge devices, monitoring and control systems, and Windows-based machines at DER sites. Electrum successfully disabled communications equipment at multiple sites, resulting in a loss of remote monitoring and control, but power generation on the units continued without interruption. Certain OT/ICS devices were disabled, and their configurations were corrupted beyond recovery, while Windows systems at the sites were wiped. Even if the attacks had been successful in cutting the power, the relatively narrow targeting scope wouldn’t have been enough to cause a nationwide blackout in Poland. However, they could have caused significant destabilization of the system frequency. "Such frequency deviations have caused cascading failures in other electrical systems, including the 2025 Iberian grid collapse," the researchers say. CERT Polska revealed that coordinated cyber attacks targeted more than 30 wind and photovoltaic farms, a private company from the manufacturing sector, and a large combined heat and power plant (CHP) in Poland on December 29, 2025. The attacks were attributed to a threat cluster dubbed Static Tundra, which is linked to Russia's Federal Security Service's (FSB) Center 16 unit. The attacks had a purely destructive objective but did not affect the ongoing production of electricity or the heat supply to end users. The attackers gained access to the internal network of power substations associated with a renewable energy facility to carry out reconnaissance and disruptive activities, including damaging the firmware of controllers, deleting system files, or launching custom-built wiper malware codenamed DynoWiper. In the intrusion aimed at the CHP, the adversary engaged in long-term data theft dating back to March 2025, enabling them to escalate privileges and move laterally across the network. The attackers' attempts to detonate the wiper malware were unsuccessful. The targeting of the manufacturing sector company is believed to be opportunistic, with the threat actor gaining initial access via a vulnerable Fortinet perimeter device. At least four different versions of DynoWiper have been discovered to date. The wiper's functionality involves initializing a pseudorandom number generator (PRNG) called Mersenne Twister, enumerating files and corrupting them using the PRNG, and deleting files. The malware does not have a persistence mechanism, a way to communicate with a command-and-control (C2) server, or execute shell commands, and it does not attempt to hide the activity from security programs. The attack targeting the manufacturing sector company involved the use of a PowerShell-based wiper dubbed LazyWiper that scripts overwrites files on the system with pseudorandom 32-byte sequences to render them unrecoverable. The malware used in the incident involving renewable energy farms was executed directly on the HMI machine. In the CHP plant and the manufacturing sector company, the malware was distributed within the Active Directory domain via a PowerShell script executed on a domain controller. The attacker used credentials obtained from the on-premises environment in attempts to gain access to cloud services, downloading selected data from services such as Exchange, Teams, and SharePoint. The attacker was particularly interested in files and email messages related to OT network modernization, SCADA systems, and technical work carried out within the organizations. The attack on Poland's energy sector in December 2025 was the first large-scale attack against decentralized energy resources (DERs) like wind turbines and solar farms. The attack occurred during a period when Poland was struggling with low temperatures and snowstorms just before the New Year. Dragos assessed with moderate confidence that the activity reflects tradecraft and objectives in line with the Electrum threat group, which overlaps with Sandworm. Electrum has worked alongside another threat actor, tracked as Kamicite, to conduct destructive attacks against Ukrainian ISPs and persistent scanning of industrial devices in the US. Kamicite gained initial access and persistence against organizations, and Electrum executed follow-on activity. Dragos has tracked Kamicite activities against the European ICS/OT supply chain since late 2024. The attack on Poland's energy sector was significant because it was the first major attack against decentralized energy resources (DERs). There was no evidence that the adversary had full control of the DERs, and there was no attempt to mis-operate these resources. Poland was fortunate because DERs make up a smaller portion of its energy portfolio than some other countries. If this same style of attack happened in the US, Australia, or certain parts of Europe where DERs are more prevalent, it could have been potentially catastrophic for the system. The attack highlighted the ongoing threat faced by the energy sector, with threat actors gaining initial access through vulnerable Internet-facing edge devices before deploying wipers that damaged remote terminal units (RTUs). CISA advised OT operators to prioritize updates that allow firmware verification and to immediately change default passwords on things like edge devices. Dragos recommended that organizations ensure architecture is defensible through methods like strict authorization practices, OT/IT segmentation, strict vendor access governance, secure remote access, and ICS network visibility and monitoring.
Show sources
- New DynoWiper Malware Used in Attempted Sandworm Attack on Polish Power Sector — thehackernews.com — 24.01.2026 10:21
- Sandworm hackers linked to failed wiper attack on Poland’s energy systems — www.bleepingcomputer.com — 24.01.2026 23:58
- Wiper Attack on Polish Power Grid Linked to Russia’s Sandworm — www.infosecurity-magazine.com — 26.01.2026 12:55
- Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid — thehackernews.com — 28.01.2026 18:06
- Cyberattack on Polish energy grid impacted around 30 facilities — www.bleepingcomputer.com — 29.01.2026 00:14
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
- Poland Energy Survives Attack on Wind, Solar Infrastructure — www.darkreading.com — 17.02.2026 23:31
-
06.11.2025 17:31 3 articles · 3mo ago
RomCom Exploits WinRAR 0-Day in Attacks on European and Canadian Sectors
RomCom targeted a U.S.-based civil engineering company via a JavaScript loader dubbed SocGholish to deliver the Mythic Agent. The activity has been attributed with medium-to-high confidence to Unit 29155 of Russia's Main Directorate of the General Staff of the Armed Forces of the Russian Federation, also known as GRU. The targeted entity had worked for a city with close ties to Ukraine in the past. The attack chains typically involve serving fake browser update alerts for Google Chrome or Mozilla Firefox on legitimate-but-compromised websites to trick unsuspecting users into downloading malicious JavaScript that's responsible for installing a loader, which then fetches additional malware. The fake update payload allows the threat actors to run commands on the compromised machine by means of a reverse shell established to a command-and-control (C2) server. This includes conducting reconnaissance and dropping a custom Python backdoor codenamed VIPERTUNNEL. Also delivered is a RomCom-linked DLL loader that launches the Mythic Agent, a crucial component of the cross-platform, post-exploit, red teaming framework.
Show sources
- Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine — thehackernews.com — 06.11.2025 17:31
- Russian Hacking Group Sandworm Deploys New Wiper Malware in Ukraine — www.infosecurity-magazine.com — 07.11.2025 14:20
- RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware — thehackernews.com — 26.11.2025 10:28
-
06.11.2025 12:01 4 articles · 3mo ago
Sandworm Deploys Data-Wiping Malware Against Ukrainian Sectors
Sandworm continued destructive campaigns in Ukraine, launching wiper malware ZEROLOT and Sting aimed at an unnamed university in April 2025. The UAC-0099 group conducted initial access operations and transferred validated targets to Sandworm for follow-up activity. These destructive attacks by Sandworm are a reminder that wipers very much remain a frequent tool of Russia-aligned threat actors in Ukraine. Sandworm, also known as APT44, Telebots, Voodoo Bear, Iridium, Seashell Blizzard, and Iron Viking, has been associated with Russia's military intelligence service’s (GRU) unit MUN 74455 by several cybersecurity companies and government agencies. ESET assessed that Sandworm’s likely objective for deploying new wipers was to weaken the Ukrainian economy. In December 2025, Sandworm targeted Poland's power sector with a new wiper malware called DynoWiper, aiming to disrupt the energy infrastructure. The attack, which occurred on December 29 and 30, 2025, targeted two combined heat and power (CHP) plants and a system managing renewable energy sources. The attack was unsuccessful in causing disruption, and Polish authorities attributed it to Russian services. The attack coincided with the tenth anniversary of Sandworm's 2015 attack on Ukraine's power grid.
Show sources
- Sandworm hackers use data wipers to disrupt Ukraine's grain sector — www.bleepingcomputer.com — 06.11.2025 12:01
- Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine — thehackernews.com — 06.11.2025 17:31
- Russian Hacking Group Sandworm Deploys New Wiper Malware in Ukraine — www.infosecurity-magazine.com — 07.11.2025 14:20
- New DynoWiper Malware Used in Attempted Sandworm Attack on Polish Power Sector — thehackernews.com — 24.01.2026 10:21
-
29.10.2025 13:51 4 articles · 3mo ago
Russian Actors Target Ukrainian Organizations Using Living-Off-the-Land Tactics
InedibleOchotense, a Russia-aligned threat activity cluster, impersonated ESET in phishing attacks targeting Ukrainian entities starting in May 2025. This campaign involved sending spear-phishing emails and Signal text messages containing links to trojanized ESET installers, which delivered the Kalambur backdoor. The Kalambur backdoor uses the Tor network for command-and-control and enables remote access via RDP. InedibleOchotense is assessed to share tactical overlaps with a campaign involving the BACKORDER backdoor and is linked to the Sandworm (APT44) hacking group. The ESET report noted that other Russian-aligned APT groups also maintained their focus on Ukraine and countries with strategic ties to Ukraine, while also expanding their operations to European entities. Gamaredon remained the most active APT group targeting Ukraine, with a noticeable increase in intensity and frequency of its operations during the reported period. Gamaredon selectively deployed one of Turla’s backdoors, indicating a rare instance of cooperation between Russia-aligned APT groups. Gamaredon’s toolset continued to evolve, incorporating new file stealers or tunneling services.
Show sources
- Russian Hackers Target Ukrainian Organizations Using Stealthy Living-Off-the-Land Tactics — thehackernews.com — 29.10.2025 13:51
- Sandworm hackers use data wipers to disrupt Ukraine's grain sector — www.bleepingcomputer.com — 06.11.2025 12:01
- Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine — thehackernews.com — 06.11.2025 17:31
- Russian Hacking Group Sandworm Deploys New Wiper Malware in Ukraine — www.infosecurity-magazine.com — 07.11.2025 14:20
Information Snippets
-
The attacks targeted a business services organization for two months and a local government entity for one week.
First reported: 29.10.2025 13:511 source, 1 articleShow sources
- Russian Hackers Target Ukrainian Organizations Using Stealthy Living-Off-the-Land Tactics — thehackernews.com — 29.10.2025 13:51
-
The threat actors used living-off-the-land (LotL) tactics and dual-use tools to minimize detection.
First reported: 29.10.2025 13:512 sources, 3 articlesShow sources
- Russian Hackers Target Ukrainian Organizations Using Stealthy Living-Off-the-Land Tactics — thehackernews.com — 29.10.2025 13:51
- Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine — thehackernews.com — 06.11.2025 17:31
- Russian Hacking Group Sandworm Deploys New Wiper Malware in Ukraine — www.infosecurity-magazine.com — 07.11.2025 14:20
-
Initial access was gained by deploying web shells on public-facing servers, exploiting unpatched vulnerabilities.
First reported: 29.10.2025 13:512 sources, 2 articlesShow sources
- Russian Hackers Target Ukrainian Organizations Using Stealthy Living-Off-the-Land Tactics — thehackernews.com — 29.10.2025 13:51
- Russian Hacking Group Sandworm Deploys New Wiper Malware in Ukraine — www.infosecurity-magazine.com — 07.11.2025 14:20
-
The web shell LocalOlive, previously linked to the Sandworm group, was used to deliver next-stage payloads.
First reported: 29.10.2025 13:511 source, 1 articleShow sources
- Russian Hackers Target Ukrainian Organizations Using Stealthy Living-Off-the-Land Tactics — thehackernews.com — 29.10.2025 13:51
-
The attackers conducted extensive reconnaissance, including registry hive copying, process enumeration, and memory dumps.
First reported: 29.10.2025 13:511 source, 1 articleShow sources
- Russian Hackers Target Ukrainian Organizations Using Stealthy Living-Off-the-Land Tactics — thehackernews.com — 29.10.2025 13:51
-
The activity involved the use of legitimate tools like PowerShell, RDP, and OpenSSH for persistence and data exfiltration.
First reported: 29.10.2025 13:511 source, 2 articlesShow sources
- Russian Hackers Target Ukrainian Organizations Using Stealthy Living-Off-the-Land Tactics — thehackernews.com — 29.10.2025 13:51
- Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine — thehackernews.com — 06.11.2025 17:31
-
The attacks began on June 27, 2025, and involved the use of scheduled tasks and PowerShell backdoors.
First reported: 29.10.2025 13:511 source, 1 articleShow sources
- Russian Hackers Target Ukrainian Organizations Using Stealthy Living-Off-the-Land Tactics — thehackernews.com — 29.10.2025 13:51
-
The attackers demonstrated a deep knowledge of Windows native tools and minimal malware usage.
First reported: 29.10.2025 13:511 source, 1 articleShow sources
- Russian Hackers Target Ukrainian Organizations Using Stealthy Living-Off-the-Land Tactics — thehackernews.com — 29.10.2025 13:51
-
The Sandworm group deployed multiple data-wiping malware families in attacks targeting Ukraine's education, government, and grain sectors in June and September 2025.
First reported: 06.11.2025 12:013 sources, 4 articlesShow sources
- Sandworm hackers use data wipers to disrupt Ukraine's grain sector — www.bleepingcomputer.com — 06.11.2025 12:01
- Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine — thehackernews.com — 06.11.2025 17:31
- Russian Hacking Group Sandworm Deploys New Wiper Malware in Ukraine — www.infosecurity-magazine.com — 07.11.2025 14:20
- New DynoWiper Malware Used in Attempted Sandworm Attack on Polish Power Sector — thehackernews.com — 24.01.2026 10:21
-
The data-wiping malware used in these attacks includes ZeroLot and Sting.
First reported: 06.11.2025 12:013 sources, 4 articlesShow sources
- Sandworm hackers use data wipers to disrupt Ukraine's grain sector — www.bleepingcomputer.com — 06.11.2025 12:01
- Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine — thehackernews.com — 06.11.2025 17:31
- Russian Hacking Group Sandworm Deploys New Wiper Malware in Ukraine — www.infosecurity-magazine.com — 07.11.2025 14:20
- New DynoWiper Malware Used in Attempted Sandworm Attack on Polish Power Sector — thehackernews.com — 24.01.2026 10:21
-
The attacks targeted the grain sector, which is Ukraine's main revenue source, aiming to disrupt the country's war economy.
First reported: 06.11.2025 12:012 sources, 2 articlesShow sources
- Sandworm hackers use data wipers to disrupt Ukraine's grain sector — www.bleepingcomputer.com — 06.11.2025 12:01
- Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine — thehackernews.com — 06.11.2025 17:31
-
Initial access for some of these incidents was achieved by UAC-0099, who then transferred the access to APT44 for wiper deployment.
First reported: 06.11.2025 12:013 sources, 3 articlesShow sources
- Sandworm hackers use data wipers to disrupt Ukraine's grain sector — www.bleepingcomputer.com — 06.11.2025 12:01
- Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine — thehackernews.com — 06.11.2025 17:31
- Russian Hacking Group Sandworm Deploys New Wiper Malware in Ukraine — www.infosecurity-magazine.com — 07.11.2025 14:20
-
The Sandworm group has shown a focus on espionage operations but continues to conduct data wiper attacks against Ukrainian entities.
First reported: 06.11.2025 12:012 sources, 2 articlesShow sources
- Sandworm hackers use data wipers to disrupt Ukraine's grain sector — www.bleepingcomputer.com — 06.11.2025 12:01
- Russian Hacking Group Sandworm Deploys New Wiper Malware in Ukraine — www.infosecurity-magazine.com — 07.11.2025 14:20
-
Iran-aligned activity was identified, deploying Go-based tools based on publicly available open-source wipers, targeting Israel's energy and engineering sectors in June 2025.
First reported: 06.11.2025 12:011 source, 1 articleShow sources
- Sandworm hackers use data wipers to disrupt Ukraine's grain sector — www.bleepingcomputer.com — 06.11.2025 12:01
-
A Russia-aligned threat activity cluster, InedibleOchotense, impersonated ESET in phishing attacks targeting Ukrainian entities starting in May 2025.
First reported: 06.11.2025 17:312 sources, 2 articlesShow sources
- Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine — thehackernews.com — 06.11.2025 17:31
- Russian Hacking Group Sandworm Deploys New Wiper Malware in Ukraine — www.infosecurity-magazine.com — 07.11.2025 14:20
-
InedibleOchotense sent spear-phishing emails and Signal text messages containing links to trojanized ESET installers.
First reported: 06.11.2025 17:312 sources, 2 articlesShow sources
- Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine — thehackernews.com — 06.11.2025 17:31
- Russian Hacking Group Sandworm Deploys New Wiper Malware in Ukraine — www.infosecurity-magazine.com — 07.11.2025 14:20
-
The trojanized ESET installers delivered the Kalambur backdoor, which uses the Tor network for command-and-control and enables remote access via RDP.
First reported: 06.11.2025 17:312 sources, 2 articlesShow sources
- Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine — thehackernews.com — 06.11.2025 17:31
- Russian Hacking Group Sandworm Deploys New Wiper Malware in Ukraine — www.infosecurity-magazine.com — 07.11.2025 14:20
-
InedibleOchotense is assessed to share tactical overlaps with a campaign involving the BACKORDER backdoor and is linked to the Sandworm (APT44) hacking group.
First reported: 06.11.2025 17:312 sources, 2 articlesShow sources
- Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine — thehackernews.com — 06.11.2025 17:31
- Russian Hacking Group Sandworm Deploys New Wiper Malware in Ukraine — www.infosecurity-magazine.com — 07.11.2025 14:20
-
The Kalambur backdoor is capable of dropping OpenSSH and enabling remote access via the Remote Desktop Protocol (RDP) on port 3389.
First reported: 06.11.2025 17:312 sources, 2 articlesShow sources
- Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine — thehackernews.com — 06.11.2025 17:31
- Russian Hacking Group Sandworm Deploys New Wiper Malware in Ukraine — www.infosecurity-magazine.com — 07.11.2025 14:20
-
CERT-UA attributed a nearly identical campaign to UAC-0125, another sub-cluster within Sandworm.
First reported: 06.11.2025 17:312 sources, 2 articlesShow sources
- Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine — thehackernews.com — 06.11.2025 17:31
- Russian Hacking Group Sandworm Deploys New Wiper Malware in Ukraine — www.infosecurity-magazine.com — 07.11.2025 14:20
-
Sandworm continued destructive campaigns in Ukraine, launching wiper malware ZEROLOT and Sting aimed at an unnamed university in April 2025.
First reported: 06.11.2025 17:312 sources, 3 articlesShow sources
- Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine — thehackernews.com — 06.11.2025 17:31
- Russian Hacking Group Sandworm Deploys New Wiper Malware in Ukraine — www.infosecurity-magazine.com — 07.11.2025 14:20
- New DynoWiper Malware Used in Attempted Sandworm Attack on Polish Power Sector — thehackernews.com — 24.01.2026 10:21
-
The UAC-0099 group conducted initial access operations and transferred validated targets to Sandworm for follow-up activity.
First reported: 06.11.2025 17:312 sources, 2 articlesShow sources
- Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine — thehackernews.com — 06.11.2025 17:31
- Russian Hacking Group Sandworm Deploys New Wiper Malware in Ukraine — www.infosecurity-magazine.com — 07.11.2025 14:20
-
RomCom, another Russia-aligned threat actor, launched spear-phishing campaigns in mid-July 2025 exploiting a WinRAR vulnerability (CVE-2025-8088) targeting various sectors in Europe and Canada.
First reported: 06.11.2025 17:312 sources, 2 articlesShow sources
- Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine — thehackernews.com — 06.11.2025 17:31
- Russian Hacking Group Sandworm Deploys New Wiper Malware in Ukraine — www.infosecurity-magazine.com — 07.11.2025 14:20
-
Sandworm, also known as APT44, Telebots, Voodoo Bear, Iridium, Seashell Blizzard, and Iron Viking, has been associated with Russia's military intelligence service’s (GRU) unit MUN 74455 by several cybersecurity companies and government agencies.
First reported: 07.11.2025 14:203 sources, 3 articlesShow sources
- Russian Hacking Group Sandworm Deploys New Wiper Malware in Ukraine — www.infosecurity-magazine.com — 07.11.2025 14:20
- New DynoWiper Malware Used in Attempted Sandworm Attack on Polish Power Sector — thehackernews.com — 24.01.2026 10:21
- Sandworm hackers linked to failed wiper attack on Poland’s energy systems — www.bleepingcomputer.com — 24.01.2026 23:58
-
ESET assessed that Sandworm’s likely objective for deploying new wipers was to weaken the Ukrainian economy.
First reported: 07.11.2025 14:202 sources, 2 articlesShow sources
- Russian Hacking Group Sandworm Deploys New Wiper Malware in Ukraine — www.infosecurity-magazine.com — 07.11.2025 14:20
- New DynoWiper Malware Used in Attempted Sandworm Attack on Polish Power Sector — thehackernews.com — 24.01.2026 10:21
-
Gamaredon remained the most active APT group targeting Ukraine, with a noticeable increase in intensity and frequency of its operations during the reported period.
First reported: 07.11.2025 14:202 sources, 2 articlesShow sources
- Russian Hacking Group Sandworm Deploys New Wiper Malware in Ukraine — www.infosecurity-magazine.com — 07.11.2025 14:20
- RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware — thehackernews.com — 26.11.2025 10:28
-
Gamaredon selectively deployed one of Turla’s backdoors, indicating a rare instance of cooperation between Russia-aligned APT groups.
First reported: 07.11.2025 14:202 sources, 2 articlesShow sources
- Russian Hacking Group Sandworm Deploys New Wiper Malware in Ukraine — www.infosecurity-magazine.com — 07.11.2025 14:20
- RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware — thehackernews.com — 26.11.2025 10:28
-
Gamaredon’s toolset continued to evolve, incorporating new file stealers or tunneling services.
First reported: 07.11.2025 14:202 sources, 2 articlesShow sources
- Russian Hacking Group Sandworm Deploys New Wiper Malware in Ukraine — www.infosecurity-magazine.com — 07.11.2025 14:20
- RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware — thehackernews.com — 26.11.2025 10:28
-
RomCom exploited a zero-day vulnerability in WinRAR to deploy malicious DLLs and deliver a variety of backdoors, focusing on the financial, manufacturing, defense, and logistics sectors in the EU and Canada.
First reported: 07.11.2025 14:202 sources, 2 articlesShow sources
- Russian Hacking Group Sandworm Deploys New Wiper Malware in Ukraine — www.infosecurity-magazine.com — 07.11.2025 14:20
- RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware — thehackernews.com — 26.11.2025 10:28
-
RomCom targeted a U.S.-based civil engineering company via a JavaScript loader dubbed SocGholish to deliver the Mythic Agent.
First reported: 26.11.2025 10:281 source, 1 articleShow sources
- RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware — thehackernews.com — 26.11.2025 10:28
-
The activity has been attributed with medium-to-high confidence to Unit 29155 of Russia's Main Directorate of the General Staff of the Armed Forces of the Russian Federation, also known as GRU.
First reported: 26.11.2025 10:281 source, 1 articleShow sources
- RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware — thehackernews.com — 26.11.2025 10:28
-
The targeted entity had worked for a city with close ties to Ukraine in the past.
First reported: 26.11.2025 10:281 source, 1 articleShow sources
- RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware — thehackernews.com — 26.11.2025 10:28
-
SocGholish (aka FakeUpdates), linked to a financially motivated operator tracked as TA569, serves as an initial access broker, allowing other threat actors to drop a wide range of payloads.
First reported: 26.11.2025 10:282 sources, 2 articlesShow sources
- RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware — thehackernews.com — 26.11.2025 10:28
- Poland Energy Survives Attack on Wind, Solar Infrastructure — www.darkreading.com — 17.02.2026 23:31
-
The attack chains typically involve serving fake browser update alerts for Google Chrome or Mozilla Firefox on legitimate-but-compromised websites to trick unsuspecting users into downloading malicious JavaScript that's responsible for installing a loader, which then fetches additional malware.
First reported: 26.11.2025 10:281 source, 1 articleShow sources
- RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware — thehackernews.com — 26.11.2025 10:28
-
RomCom leverages several methods, including spear-phishing and zero-day exploits, to breach target networks and drop the eponymous remote access trojan (RAT) on victim machines.
First reported: 26.11.2025 10:281 source, 1 articleShow sources
- RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware — thehackernews.com — 26.11.2025 10:28
-
The fake update payload allows the threat actors to run commands on the compromised machine by means of a reverse shell established to a command-and-control (C2) server.
First reported: 26.11.2025 10:281 source, 1 articleShow sources
- RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware — thehackernews.com — 26.11.2025 10:28
-
The attack includes conducting reconnaissance and dropping a custom Python backdoor codenamed VIPERTUNNEL.
First reported: 26.11.2025 10:281 source, 1 articleShow sources
- RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware — thehackernews.com — 26.11.2025 10:28
-
Also delivered is a RomCom-linked DLL loader that launches the Mythic Agent, a crucial component of the cross-platform, post-exploit, red teaming framework.
First reported: 26.11.2025 10:281 source, 1 articleShow sources
- RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware — thehackernews.com — 26.11.2025 10:28
-
The timeline from infection via the fake update to the delivery of RomCom's loader was less than 30 minutes.
First reported: 26.11.2025 10:281 source, 1 articleShow sources
- RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware — thehackernews.com — 26.11.2025 10:28
-
Delivery is not made until the target's Active Directory domain has been verified to match a known value provided by the threat actor.
First reported: 26.11.2025 10:281 source, 1 articleShow sources
- RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware — thehackernews.com — 26.11.2025 10:28
-
Sandworm targeted Poland's power sector with a new wiper malware called DynoWiper in December 2025.
First reported: 24.01.2026 10:214 sources, 6 articlesShow sources
- New DynoWiper Malware Used in Attempted Sandworm Attack on Polish Power Sector — thehackernews.com — 24.01.2026 10:21
- Sandworm hackers linked to failed wiper attack on Poland’s energy systems — www.bleepingcomputer.com — 24.01.2026 23:58
- Wiper Attack on Polish Power Grid Linked to Russia’s Sandworm — www.infosecurity-magazine.com — 26.01.2026 12:55
- Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid — thehackernews.com — 28.01.2026 18:06
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
- Poland Energy Survives Attack on Wind, Solar Infrastructure — www.darkreading.com — 17.02.2026 23:31
-
The attack targeted two combined heat and power (CHP) plants and a system managing renewable energy sources.
First reported: 24.01.2026 10:214 sources, 6 articlesShow sources
- New DynoWiper Malware Used in Attempted Sandworm Attack on Polish Power Sector — thehackernews.com — 24.01.2026 10:21
- Sandworm hackers linked to failed wiper attack on Poland’s energy systems — www.bleepingcomputer.com — 24.01.2026 23:58
- Wiper Attack on Polish Power Grid Linked to Russia’s Sandworm — www.infosecurity-magazine.com — 26.01.2026 12:55
- Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid — thehackernews.com — 28.01.2026 18:06
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
- Poland Energy Survives Attack on Wind, Solar Infrastructure — www.darkreading.com — 17.02.2026 23:31
-
The attack occurred on December 29 and 30, 2025, and was unsuccessful in causing disruption.
First reported: 24.01.2026 10:214 sources, 6 articlesShow sources
- New DynoWiper Malware Used in Attempted Sandworm Attack on Polish Power Sector — thehackernews.com — 24.01.2026 10:21
- Sandworm hackers linked to failed wiper attack on Poland’s energy systems — www.bleepingcomputer.com — 24.01.2026 23:58
- Wiper Attack on Polish Power Grid Linked to Russia’s Sandworm — www.infosecurity-magazine.com — 26.01.2026 12:55
- Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid — thehackernews.com — 28.01.2026 18:06
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
- Poland Energy Survives Attack on Wind, Solar Infrastructure — www.darkreading.com — 17.02.2026 23:31
-
Polish Prime Minister Donald Tusk stated that the attacks were linked to Russian services.
First reported: 24.01.2026 10:214 sources, 6 articlesShow sources
- New DynoWiper Malware Used in Attempted Sandworm Attack on Polish Power Sector — thehackernews.com — 24.01.2026 10:21
- Sandworm hackers linked to failed wiper attack on Poland’s energy systems — www.bleepingcomputer.com — 24.01.2026 23:58
- Wiper Attack on Polish Power Grid Linked to Russia’s Sandworm — www.infosecurity-magazine.com — 26.01.2026 12:55
- Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid — thehackernews.com — 28.01.2026 18:06
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
- Poland Energy Survives Attack on Wind, Solar Infrastructure — www.darkreading.com — 17.02.2026 23:31
-
The attack coincided with the tenth anniversary of Sandworm's 2015 attack on Ukraine's power grid.
First reported: 24.01.2026 10:214 sources, 5 articlesShow sources
- New DynoWiper Malware Used in Attempted Sandworm Attack on Polish Power Sector — thehackernews.com — 24.01.2026 10:21
- Sandworm hackers linked to failed wiper attack on Poland’s energy systems — www.bleepingcomputer.com — 24.01.2026 23:58
- Wiper Attack on Polish Power Grid Linked to Russia’s Sandworm — www.infosecurity-magazine.com — 26.01.2026 12:55
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
- Poland Energy Survives Attack on Wind, Solar Infrastructure — www.darkreading.com — 17.02.2026 23:31
-
Sandworm is also tracked as UAC-0113, APT44, and Seashell Blizzard.
First reported: 24.01.2026 23:584 sources, 6 articlesShow sources
- Sandworm hackers linked to failed wiper attack on Poland’s energy systems — www.bleepingcomputer.com — 24.01.2026 23:58
- Wiper Attack on Polish Power Grid Linked to Russia’s Sandworm — www.infosecurity-magazine.com — 26.01.2026 12:55
- Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid — thehackernews.com — 28.01.2026 18:06
- Cyberattack on Polish energy grid impacted around 30 facilities — www.bleepingcomputer.com — 29.01.2026 00:14
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
- Poland Energy Survives Attack on Wind, Solar Infrastructure — www.darkreading.com — 17.02.2026 23:31
-
DynoWiper is detected by ESET as Win32/KillFiles.NMO with SHA-1 hash 4EC3C90846AF6B79EE1A5188EEFA3FD21F6D4CF6.
First reported: 24.01.2026 23:582 sources, 3 articlesShow sources
- Sandworm hackers linked to failed wiper attack on Poland’s energy systems — www.bleepingcomputer.com — 24.01.2026 23:58
- Cyberattack on Polish energy grid impacted around 30 facilities — www.bleepingcomputer.com — 29.01.2026 00:14
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
-
No samples of DynoWiper have been found on malware submission sites as of January 24, 2026.
First reported: 24.01.2026 23:582 sources, 3 articlesShow sources
- Sandworm hackers linked to failed wiper attack on Poland’s energy systems — www.bleepingcomputer.com — 24.01.2026 23:58
- Cyberattack on Polish energy grid impacted around 30 facilities — www.bleepingcomputer.com — 29.01.2026 00:14
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
-
The attackers deployed a wiper malware named DynoWiper during the attack on Poland's power grid in late December 2025.
First reported: 26.01.2026 12:553 sources, 4 articlesShow sources
- Wiper Attack on Polish Power Grid Linked to Russia’s Sandworm — www.infosecurity-magazine.com — 26.01.2026 12:55
- Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid — thehackernews.com — 28.01.2026 18:06
- Cyberattack on Polish energy grid impacted around 30 facilities — www.bleepingcomputer.com — 29.01.2026 00:14
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
-
ESET attributed the attack to the Russia-aligned Sandworm APT with medium confidence due to a strong overlap with numerous previous Sandworm wiper activities.
First reported: 26.01.2026 12:553 sources, 4 articlesShow sources
- Wiper Attack on Polish Power Grid Linked to Russia’s Sandworm — www.infosecurity-magazine.com — 26.01.2026 12:55
- Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid — thehackernews.com — 28.01.2026 18:06
- Cyberattack on Polish energy grid impacted around 30 facilities — www.bleepingcomputer.com — 29.01.2026 00:14
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
-
The campaign against Polish energy assets is still being investigated, but the timing of the coordinated cyber-attack might be deliberate, coinciding with the 10-year anniversary of the Sandworm-orchestrated attack against the Ukrainian power grid in December 2015.
First reported: 26.01.2026 12:553 sources, 4 articlesShow sources
- Wiper Attack on Polish Power Grid Linked to Russia’s Sandworm — www.infosecurity-magazine.com — 26.01.2026 12:55
- Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid — thehackernews.com — 28.01.2026 18:06
- Cyberattack on Polish energy grid impacted around 30 facilities — www.bleepingcomputer.com — 29.01.2026 00:14
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
-
Sandworm has been highly active since Russia's invasion of Ukraine in 2022, targeting energy infrastructure inside Ukraine on multiple occasions.
First reported: 26.01.2026 12:552 sources, 3 articlesShow sources
- Wiper Attack on Polish Power Grid Linked to Russia’s Sandworm — www.infosecurity-magazine.com — 26.01.2026 12:55
- Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid — thehackernews.com — 28.01.2026 18:06
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
-
In March 2024, Sandworm hit energy, heating, and water facilities in 10 regions of Ukraine in a bid to amplify the impact of missile strikes.
First reported: 26.01.2026 12:552 sources, 3 articlesShow sources
- Wiper Attack on Polish Power Grid Linked to Russia’s Sandworm — www.infosecurity-magazine.com — 26.01.2026 12:55
- Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid — thehackernews.com — 28.01.2026 18:06
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
-
In both Q2 and Q3 2025, Sandworm deployed data wipers such as Zerolot and Sting against government, energy, and logistics entities in Ukraine.
First reported: 26.01.2026 12:552 sources, 3 articlesShow sources
- Wiper Attack on Polish Power Grid Linked to Russia’s Sandworm — www.infosecurity-magazine.com — 26.01.2026 12:55
- Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid — thehackernews.com — 28.01.2026 18:06
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
-
The long-term goal of such attacks is to weaken the economy and demoralize the population, forcing the government to give in to the demands of the Putin administration.
First reported: 26.01.2026 12:552 sources, 3 articlesShow sources
- Wiper Attack on Polish Power Grid Linked to Russia’s Sandworm — www.infosecurity-magazine.com — 26.01.2026 12:55
- Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid — thehackernews.com — 28.01.2026 18:06
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
-
Polish Prime Minister Donald Tusk revealed that the country had successfully repelled the destructive attack on its own energy infrastructure a few weeks earlier.
First reported: 26.01.2026 12:552 sources, 3 articlesShow sources
- Wiper Attack on Polish Power Grid Linked to Russia’s Sandworm — www.infosecurity-magazine.com — 26.01.2026 12:55
- Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid — thehackernews.com — 28.01.2026 18:06
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
-
The systems in Poland proved effective, and at no point was critical infrastructure threatened, meaning the transmission networks and everything that determines the safety of the entire system.
First reported: 26.01.2026 12:552 sources, 3 articlesShow sources
- Wiper Attack on Polish Power Grid Linked to Russia’s Sandworm — www.infosecurity-magazine.com — 26.01.2026 12:55
- Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid — thehackernews.com — 28.01.2026 18:06
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
-
The Polish government is rushing to finalize a National Cybersecurity System Act to mandate stricter requirements for risk management, IT and OT security, and incident response.
First reported: 26.01.2026 12:552 sources, 3 articlesShow sources
- Wiper Attack on Polish Power Grid Linked to Russia’s Sandworm — www.infosecurity-magazine.com — 26.01.2026 12:55
- Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid — thehackernews.com — 28.01.2026 18:06
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
-
The attack took place on December 29 and 30, 2025, and targeted two combined heat and power (CHP) plants and a renewable energy system.
First reported: 26.01.2026 12:552 sources, 3 articlesShow sources
- Wiper Attack on Polish Power Grid Linked to Russia’s Sandworm — www.infosecurity-magazine.com — 26.01.2026 12:55
- Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid — thehackernews.com — 28.01.2026 18:06
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
-
The cyber attack on the Polish power grid in December 2025 was attributed with medium confidence to a Russian state-sponsored hacking group known as ELECTRUM.
First reported: 28.01.2026 18:063 sources, 4 articlesShow sources
- Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid — thehackernews.com — 28.01.2026 18:06
- Cyberattack on Polish energy grid impacted around 30 facilities — www.bleepingcomputer.com — 29.01.2026 00:14
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
- Poland Energy Survives Attack on Wind, Solar Infrastructure — www.darkreading.com — 17.02.2026 23:31
-
The attack targeted distributed energy resources (DERs) and affected communication and control systems at combined heat and power (CHP) facilities and systems managing renewable energy systems.
First reported: 28.01.2026 18:063 sources, 4 articlesShow sources
- Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid — thehackernews.com — 28.01.2026 18:06
- Cyberattack on Polish energy grid impacted around 30 facilities — www.bleepingcomputer.com — 29.01.2026 00:14
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
- Poland Energy Survives Attack on Wind, Solar Infrastructure — www.darkreading.com — 17.02.2026 23:31
-
ELECTRUM and KAMACITE share overlaps with the Sandworm cluster, with KAMACITE focusing on initial access and ELECTRUM conducting operations that bridge IT and OT environments.
First reported: 28.01.2026 18:063 sources, 4 articlesShow sources
- Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid — thehackernews.com — 28.01.2026 18:06
- Cyberattack on Polish energy grid impacted around 30 facilities — www.bleepingcomputer.com — 29.01.2026 00:14
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
- Poland Energy Survives Attack on Wind, Solar Infrastructure — www.darkreading.com — 17.02.2026 23:31
-
The attackers gained access to operational technology systems critical to grid operations and disabled key equipment beyond repair at the site.
First reported: 28.01.2026 18:063 sources, 4 articlesShow sources
- Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid — thehackernews.com — 28.01.2026 18:06
- Cyberattack on Polish energy grid impacted around 30 facilities — www.bleepingcomputer.com — 29.01.2026 00:14
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
- Poland Energy Survives Attack on Wind, Solar Infrastructure — www.darkreading.com — 17.02.2026 23:31
-
The attack was opportunistic and rushed, with the hackers attempting to inflict as much damage as possible by wiping Windows-based devices and resetting configurations.
First reported: 28.01.2026 18:063 sources, 4 articlesShow sources
- Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid — thehackernews.com — 28.01.2026 18:06
- Cyberattack on Polish energy grid impacted around 30 facilities — www.bleepingcomputer.com — 29.01.2026 00:14
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
- Poland Energy Survives Attack on Wind, Solar Infrastructure — www.darkreading.com — 17.02.2026 23:31
-
The majority of the equipment targeted was related to grid safety and stability monitoring.
First reported: 28.01.2026 18:063 sources, 4 articlesShow sources
- Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid — thehackernews.com — 28.01.2026 18:06
- Cyberattack on Polish energy grid impacted around 30 facilities — www.bleepingcomputer.com — 29.01.2026 00:14
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
- Poland Energy Survives Attack on Wind, Solar Infrastructure — www.darkreading.com — 17.02.2026 23:31
-
The coordinated attack on Poland's power grid in late December targeted multiple distributed energy resource (DER) sites across the country, including combined heat and power (CHP) facilities and wind and solar dispatch systems.
First reported: 29.01.2026 00:143 sources, 3 articlesShow sources
- Cyberattack on Polish energy grid impacted around 30 facilities — www.bleepingcomputer.com — 29.01.2026 00:14
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
- Poland Energy Survives Attack on Wind, Solar Infrastructure — www.darkreading.com — 17.02.2026 23:31
-
Although the attacker compromised operational technology (OT) systems damaging "key equipment beyond repair," they failed to disrupt power, totalling 1.2 GW or 5% of Poland’s energy supply.
First reported: 29.01.2026 00:143 sources, 3 articlesShow sources
- Cyberattack on Polish energy grid impacted around 30 facilities — www.bleepingcomputer.com — 29.01.2026 00:14
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
- Poland Energy Survives Attack on Wind, Solar Infrastructure — www.darkreading.com — 17.02.2026 23:31
-
Based on public reports, there are at least 12 confirmed affected sites. However, researchers at Dragos, a critical industrial infrastructure (OT) and control systems (ICS) security company say that the number is approximately 30.
First reported: 29.01.2026 00:143 sources, 3 articlesShow sources
- Cyberattack on Polish energy grid impacted around 30 facilities — www.bleepingcomputer.com — 29.01.2026 00:14
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
- Poland Energy Survives Attack on Wind, Solar Infrastructure — www.darkreading.com — 17.02.2026 23:31
-
Dragos attributes the attack with moderate confidence to a Russian threat actor it tracks as Electrum, which, although it overlaps with Sandworm (APT44), the researchers underline that it is a distinct activity cluster.
First reported: 29.01.2026 00:143 sources, 3 articlesShow sources
- Cyberattack on Polish energy grid impacted around 30 facilities — www.bleepingcomputer.com — 29.01.2026 00:14
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
- Poland Energy Survives Attack on Wind, Solar Infrastructure — www.darkreading.com — 17.02.2026 23:31
-
Electrum targeted exposed and vulnerable systems involved in dispatch and grid-facing communication, remote terminal units (RTUs), network edge devices, monitoring and control systems, and Windows-based machines at DER sites.
First reported: 29.01.2026 00:143 sources, 3 articlesShow sources
- Cyberattack on Polish energy grid impacted around 30 facilities — www.bleepingcomputer.com — 29.01.2026 00:14
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
- Poland Energy Survives Attack on Wind, Solar Infrastructure — www.darkreading.com — 17.02.2026 23:31
-
Electrum successfully disabled communications equipment at multiple sites, resulting in a loss of remote monitoring and control, but power generation on the units continued without interruption.
First reported: 29.01.2026 00:143 sources, 3 articlesShow sources
- Cyberattack on Polish energy grid impacted around 30 facilities — www.bleepingcomputer.com — 29.01.2026 00:14
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
- Poland Energy Survives Attack on Wind, Solar Infrastructure — www.darkreading.com — 17.02.2026 23:31
-
Certain OT/ICS devices were disabled, and their configurations were corrupted beyond recovery, while Windows systems at the sites were wiped.
First reported: 29.01.2026 00:143 sources, 3 articlesShow sources
- Cyberattack on Polish energy grid impacted around 30 facilities — www.bleepingcomputer.com — 29.01.2026 00:14
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
- Poland Energy Survives Attack on Wind, Solar Infrastructure — www.darkreading.com — 17.02.2026 23:31
-
Even if the attacks had been successful in cutting the power, the relatively narrow targeting scope wouldn’t have been enough to cause a nationwide blackout in Poland.
First reported: 29.01.2026 00:143 sources, 3 articlesShow sources
- Cyberattack on Polish energy grid impacted around 30 facilities — www.bleepingcomputer.com — 29.01.2026 00:14
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
- Poland Energy Survives Attack on Wind, Solar Infrastructure — www.darkreading.com — 17.02.2026 23:31
-
However, they could have caused significant destabilization of the system frequency. "Such frequency deviations have caused cascading failures in other electrical systems, including the 2025 Iberian grid collapse," the researchers say.
First reported: 29.01.2026 00:143 sources, 3 articlesShow sources
- Cyberattack on Polish energy grid impacted around 30 facilities — www.bleepingcomputer.com — 29.01.2026 00:14
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
- Poland Energy Survives Attack on Wind, Solar Infrastructure — www.darkreading.com — 17.02.2026 23:31
-
CERT Polska revealed that coordinated cyber attacks targeted more than 30 wind and photovoltaic farms, a private company from the manufacturing sector, and a large combined heat and power plant (CHP) in Poland on December 29, 2025.
First reported: 31.01.2026 09:052 sources, 2 articlesShow sources
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
- Poland Energy Survives Attack on Wind, Solar Infrastructure — www.darkreading.com — 17.02.2026 23:31
-
The attacks were attributed to a threat cluster dubbed Static Tundra, which is linked to Russia's Federal Security Service's (FSB) Center 16 unit.
First reported: 31.01.2026 09:052 sources, 2 articlesShow sources
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
- Poland Energy Survives Attack on Wind, Solar Infrastructure — www.darkreading.com — 17.02.2026 23:31
-
The attacks had a purely destructive objective but did not affect the ongoing production of electricity or the heat supply to end users.
First reported: 31.01.2026 09:052 sources, 2 articlesShow sources
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
- Poland Energy Survives Attack on Wind, Solar Infrastructure — www.darkreading.com — 17.02.2026 23:31
-
The attackers gained access to the internal network of power substations associated with a renewable energy facility to carry out reconnaissance and disruptive activities, including damaging the firmware of controllers, deleting system files, or launching custom-built wiper malware codenamed DynoWiper.
First reported: 31.01.2026 09:052 sources, 2 articlesShow sources
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
- Poland Energy Survives Attack on Wind, Solar Infrastructure — www.darkreading.com — 17.02.2026 23:31
-
In the intrusion aimed at the CHP, the adversary engaged in long-term data theft dating back to March 2025, enabling them to escalate privileges and move laterally across the network.
First reported: 31.01.2026 09:052 sources, 2 articlesShow sources
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
- Poland Energy Survives Attack on Wind, Solar Infrastructure — www.darkreading.com — 17.02.2026 23:31
-
The attackers' attempts to detonate the wiper malware were unsuccessful.
First reported: 31.01.2026 09:052 sources, 2 articlesShow sources
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
- Poland Energy Survives Attack on Wind, Solar Infrastructure — www.darkreading.com — 17.02.2026 23:31
-
The targeting of the manufacturing sector company is believed to be opportunistic, with the threat actor gaining initial access via a vulnerable Fortinet perimeter device.
First reported: 31.01.2026 09:052 sources, 2 articlesShow sources
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
- Poland Energy Survives Attack on Wind, Solar Infrastructure — www.darkreading.com — 17.02.2026 23:31
-
At least four different versions of DynoWiper have been discovered to date.
First reported: 31.01.2026 09:052 sources, 2 articlesShow sources
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
- Poland Energy Survives Attack on Wind, Solar Infrastructure — www.darkreading.com — 17.02.2026 23:31
-
The wiper's functionality involves initializing a pseudorandom number generator (PRNG) called Mersenne Twister, enumerating files and corrupting them using the PRNG, and deleting files.
First reported: 31.01.2026 09:052 sources, 2 articlesShow sources
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
- Poland Energy Survives Attack on Wind, Solar Infrastructure — www.darkreading.com — 17.02.2026 23:31
-
The malware does not have a persistence mechanism, a way to communicate with a command-and-control (C2) server, or execute shell commands, and it does not attempt to hide the activity from security programs.
First reported: 31.01.2026 09:052 sources, 2 articlesShow sources
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
- Poland Energy Survives Attack on Wind, Solar Infrastructure — www.darkreading.com — 17.02.2026 23:31
-
The attack targeting the manufacturing sector company involved the use of a PowerShell-based wiper dubbed LazyWiper that scripts overwrites files on the system with pseudorandom 32-byte sequences to render them unrecoverable.
First reported: 31.01.2026 09:052 sources, 2 articlesShow sources
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
- Poland Energy Survives Attack on Wind, Solar Infrastructure — www.darkreading.com — 17.02.2026 23:31
-
The malware used in the incident involving renewable energy farms was executed directly on the HMI machine.
First reported: 31.01.2026 09:052 sources, 2 articlesShow sources
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
- Poland Energy Survives Attack on Wind, Solar Infrastructure — www.darkreading.com — 17.02.2026 23:31
-
In the CHP plant and the manufacturing sector company, the malware was distributed within the Active Directory domain via a PowerShell script executed on a domain controller.
First reported: 31.01.2026 09:052 sources, 2 articlesShow sources
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
- Poland Energy Survives Attack on Wind, Solar Infrastructure — www.darkreading.com — 17.02.2026 23:31
-
The attacker used credentials obtained from the on-premises environment in attempts to gain access to cloud services, downloading selected data from services such as Exchange, Teams, and SharePoint.
First reported: 31.01.2026 09:052 sources, 2 articlesShow sources
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
- Poland Energy Survives Attack on Wind, Solar Infrastructure — www.darkreading.com — 17.02.2026 23:31
-
The attacker was particularly interested in files and email messages related to OT network modernization, SCADA systems, and technical work carried out within the organizations.
First reported: 31.01.2026 09:052 sources, 2 articlesShow sources
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
- Poland Energy Survives Attack on Wind, Solar Infrastructure — www.darkreading.com — 17.02.2026 23:31
-
The attack on Poland's energy sector in December 2025 was the first large-scale attack against decentralized energy resources (DERs) like wind turbines and solar farms.
First reported: 17.02.2026 23:311 source, 1 articleShow sources
- Poland Energy Survives Attack on Wind, Solar Infrastructure — www.darkreading.com — 17.02.2026 23:31
-
The attack occurred during a period when Poland was struggling with low temperatures and snowstorms just before the New Year.
First reported: 17.02.2026 23:311 source, 1 articleShow sources
- Poland Energy Survives Attack on Wind, Solar Infrastructure — www.darkreading.com — 17.02.2026 23:31
-
Dragos assessed with moderate confidence that the activity reflects tradecraft and objectives in line with the Electrum threat group, which overlaps with Sandworm.
First reported: 17.02.2026 23:311 source, 1 articleShow sources
- Poland Energy Survives Attack on Wind, Solar Infrastructure — www.darkreading.com — 17.02.2026 23:31
-
Electrum has worked alongside another threat actor, tracked as Kamicite, to conduct destructive attacks against Ukrainian ISPs and persistent scanning of industrial devices in the US.
First reported: 17.02.2026 23:311 source, 1 articleShow sources
- Poland Energy Survives Attack on Wind, Solar Infrastructure — www.darkreading.com — 17.02.2026 23:31
-
Kamicite gained initial access and persistence against organizations, and Electrum executed follow-on activity.
First reported: 17.02.2026 23:311 source, 1 articleShow sources
- Poland Energy Survives Attack on Wind, Solar Infrastructure — www.darkreading.com — 17.02.2026 23:31
-
Dragos has tracked Kamicite activities against the European ICS/OT supply chain since late 2024.
First reported: 17.02.2026 23:311 source, 1 articleShow sources
- Poland Energy Survives Attack on Wind, Solar Infrastructure — www.darkreading.com — 17.02.2026 23:31
-
The attack on Poland's energy sector was significant because it was the first major attack against decentralized energy resources (DERs).
First reported: 17.02.2026 23:311 source, 1 articleShow sources
- Poland Energy Survives Attack on Wind, Solar Infrastructure — www.darkreading.com — 17.02.2026 23:31
-
There was no evidence that the adversary had full control of the DERs, and there was no attempt to mis-operate these resources.
First reported: 17.02.2026 23:311 source, 1 articleShow sources
- Poland Energy Survives Attack on Wind, Solar Infrastructure — www.darkreading.com — 17.02.2026 23:31
-
Poland was fortunate because DERs make up a smaller portion of its energy portfolio than some other countries.
First reported: 17.02.2026 23:311 source, 1 articleShow sources
- Poland Energy Survives Attack on Wind, Solar Infrastructure — www.darkreading.com — 17.02.2026 23:31
-
If this same style of attack happened in the US, Australia, or certain parts of Europe where DERs are more prevalent, it could have been potentially catastrophic for the system.
First reported: 17.02.2026 23:311 source, 1 articleShow sources
- Poland Energy Survives Attack on Wind, Solar Infrastructure — www.darkreading.com — 17.02.2026 23:31
-
The attack highlighted the ongoing threat faced by the energy sector, with threat actors gaining initial access through vulnerable Internet-facing edge devices before deploying wipers that damaged remote terminal units (RTUs).
First reported: 17.02.2026 23:311 source, 1 articleShow sources
- Poland Energy Survives Attack on Wind, Solar Infrastructure — www.darkreading.com — 17.02.2026 23:31
-
CISA advised OT operators to prioritize updates that allow firmware verification and to immediately change default passwords on things like edge devices.
First reported: 17.02.2026 23:311 source, 1 articleShow sources
- Poland Energy Survives Attack on Wind, Solar Infrastructure — www.darkreading.com — 17.02.2026 23:31
-
Dragos recommended that organizations ensure architecture is defensible through methods like strict authorization practices, OT/IT segmentation, strict vendor access governance, secure remote access, and ICS network visibility and monitoring.
First reported: 17.02.2026 23:311 source, 1 articleShow sources
- Poland Energy Survives Attack on Wind, Solar Infrastructure — www.darkreading.com — 17.02.2026 23:31
Similar Happenings
China-Linked APTs Deploy PeckBirdy JScript C2 Framework Since 2023
China-aligned APT actors have been using the PeckBirdy JScript-based command-and-control (C2) framework since 2023 to target Chinese gambling industries, Asian government entities, and private organizations. The framework leverages living-off-the-land binaries (LOLBins) for execution across various environments. Two campaigns, SHADOW-VOID-044 and SHADOW-EARTH-045, have been identified, each employing different tactics, including credential harvesting and malware delivery. The framework's flexibility allows it to operate across web browsers, MSHTA, WScript, Classic ASP, Node JS, and .NET, using multiple communication methods like WebSocket and Adobe Flash ActiveX objects. Additional scripts for exploitation, social engineering, and backdoor delivery have been observed, along with links to known backdoors like HOLODONUT and MKDOOR. HOLODONUT disables security features such as AMSI before executing payloads in memory, while MKDOOR disguises its network traffic as legitimate Microsoft support or activation pages and attempts to evade Microsoft Defender by altering exclusion settings. Infrastructure overlaps and shared tooling suggest SHADOW-VOID-044 is linked with UNC3569, a China-aligned group previously associated with the GRAYRABBIT backdoor. Some samples used stolen code-signing certificates to legitimize malicious Cobalt Strike payloads, and SHADOW-EARTH-045 showed weaker but notable ties to activity previously attributed to Earth Baxia. The Shadow-Void-044 campaign used stolen code-signing certificates, Cobalt Strike payloads, and exploits, including CVE-2020-16040, to maintain persistent access. The Shadow-Earth-045 campaign targeted a Philippine educational institution in July 2024, using the GrayRabbit backdoor and the HoloDonut backdoor. The threat actor behind the Shadow-Earth campaign developed a .NET executable to launch PeckBirdy with ScriptControl.
Black Basta Leader Identified and Added to Interpol's Red Notice List
Law enforcement in Ukraine and Germany have identified Oleg Evgenievich Nefedov, a 35-year-old Russian national, as the leader of the Black Basta ransomware gang. Nefedov, known by multiple aliases, has been added to Europol's 'Most Wanted' and Interpol's 'Red Notice' lists. Ukrainian police, in collaboration with German authorities, identified two additional individuals involved in initial network breaches and privilege escalation for ransomware attacks. These individuals were found to be 'hash crackers', specializing in extracting passwords from account databases. Raids in Ukraine seized digital storage devices and cryptocurrency assets. Black Basta has targeted over 500 companies globally and is estimated to have earned hundreds of millions of dollars in cryptocurrency. Nefedov is believed to have ties to Russian intelligence agencies and was arrested in Armenia but secured his freedom. The group's internal chat logs leaked, revealing its structure and key members, and its data leak site was taken down in February 2025. Former affiliates may have migrated to the CACTUS ransomware operation.
PluggyApe Backdoor Targets Ukraine's Defense Forces in Charity-Themed Campaign
Ukraine's Defense Forces were targeted in a charity-themed malware campaign between October and December 2025. The campaign delivered the PluggyApe backdoor, likely deployed by the Russian threat group Void Blizzard (Laundry Bear). The attacks began with instant messages over Signal or WhatsApp, directing recipients to malicious websites posing as charitable foundations. These sites distributed password-protected archives containing PluggyApe payloads. The malware profiles the host, sends victim information to attackers, and waits for further commands. The campaign highlights the increasing use of mobile devices as prime targets due to their poor protection and monitoring. Additionally, the Computer Emergency Response Team of Ukraine (CERT-UA) has disclosed details of new cyber attacks targeting its defense forces with malware known as PLUGGYAPE between October and December 2025. The threat actor is believed to be active since at least April 2024. The malware is written in Python and establishes communication with a remote server over WebSocket or Message Queuing Telemetry Transport (MQTT). The command-and-control (C2) addresses are retrieved from external paste services such as rentry[.]co and pastebin[.]com, where they are stored in base64-encoded form.
Phantom Stealer Malware Spread via ISO Phishing Emails Targeting Russian Finance Sector
A phishing campaign, codenamed Operation MoneyMount-ISO, is targeting Russian finance and accounting sectors with emails delivering Phantom Stealer malware via malicious ISO files. The campaign uses fake payment confirmation lures to trick recipients into opening a ZIP archive containing an ISO file that launches the malware. Phantom Stealer steals cryptocurrency wallet data, browser credentials, and other sensitive information, exfiltrating data via Telegram bots or Discord webhooks. Additionally, another campaign, DupeHike, targets HR and payroll departments with phishing emails deploying the DUPERUNNER implant, which loads the AdaptixC2 framework. This campaign is attributed to the threat cluster UNG0902. Other campaigns have targeted finance, legal, and aerospace sectors with tools like Cobalt Strike, Formbook, DarkWatchman, and PhantomRemote. The campaign is tracked as Operation MoneyMount-ISO and marks a continued shift toward ISO-based initial access techniques designed to bypass email security controls. The phishing email was written in formal Russian business language and carried the subject line "Подтверждение банковского перевода" or "Confirmation of Bank Transfer." The initial loader decrypted a malicious DLL, which then injected Phantom Stealer into the system while employing extensive anti-analysis checks to evade sandboxes and virtual machines. Targeted sectors included finance, accounting, treasury and payments teams in Russia, procurement, legal and HR or payroll functions, and executive assistants and small or medium-sized enterprises using Russian-language workflows.
Notepad++ Update Mechanism Exploited to Deliver Malicious Payloads
Notepad++ version 8.8.9 was released to address a security flaw in its WinGUp update tool that allowed attackers to push malicious executables instead of legitimate updates. Users reported incidents where the updater spawned a malicious AutoUpdater.exe that collected device information and exfiltrated it to a remote site. The flaw was mitigated by enforcing updates only from GitHub and later by requiring signature verification for all updates. Security researchers noted targeted attacks against organizations with interests in East Asia, where Notepad++ processes were used to gain initial access. The attack involved an infrastructure-level compromise at the hosting provider level, allowing malicious actors to intercept and redirect update traffic. The incident commenced in June 2025 and continued until December 2025, with the Notepad++ website later migrated to a new hosting provider. The attackers were likely Chinese state-sponsored threat actors, selectively redirecting update requests from certain users to malicious servers. The hosting provider for the update feature was compromised, enabling targeted traffic redirections. The attackers regained access using previously obtained internal service credentials. Notepad++ has since migrated all clients to a new hosting provider with stronger security and plans to enforce mandatory certificate signature verification in version 8.9.2. The compromise involved shared hosting infrastructure rather than a flaw in the software's code, with attackers gaining access at the hosting provider level to intercept and manipulate traffic bound for the Notepad++ update endpoint. Direct server access by the attackers ended on September 2, 2025, but credentials associated with internal services remained exposed until December 2, 2025, allowing continued traffic redirection. The hosting provider confirmed no additional customers were affected. Notepad++ version 8.9.2 introduced a 'double-lock' design for its update mechanism, including verifying the signed installer from GitHub and checking the signed XML from the notepad-plus-plus.org domain. The auto-updater now removes libcurl.dll to eliminate DLL side-loading risk, removes unsecured cURL SSL options, and restricts plugin management execution to programs signed with the same certificate as WinGUp. Users can exclude the auto-updater during UI installation or deploy the MSI package with the NOUPDATER=1 flag. The threat group Lotus Blossom, linked to China, was involved in the compromise, using a custom backdoor called 'Chrysalis' as part of the attack chain. Notepad++ version 8.9.2 also addresses a high-severity vulnerability (CVE-2026-25926, CVSS score: 7.3) that could result in arbitrary code execution in the context of the running application. An Unsafe Search Path vulnerability (CWE-426) exists when launching Windows Explorer without an absolute executable path, which may allow execution of a malicious explorer.exe if an attacker can control the process working directory.