Russian Threat Actors Target Ukrainian and Polish Organizations with Data-Wiping Malware and LotL Tactics
Summary
Hide ▲
Show ▼
Russian threat actors, specifically the Sandworm group, have targeted Ukrainian organizations and Poland's power sector using living-off-the-land (LotL) tactics and deploying data-wiping malware. The attacks, which began in June 2025, involved minimal malware to reduce detection and included the use of web shells and legitimate tools for reconnaissance and data theft. The threat actors exploited unpatched vulnerabilities to deploy web shells on public-facing servers, gaining initial access. They then used various tactics, including PowerShell commands, scheduled tasks, and legitimate software, to evade detection and perform reconnaissance. The attacks were characterized by the use of legitimate tools and minimal malware, demonstrating the actors' deep knowledge of Windows native tools. In addition to LotL tactics, Sandworm deployed multiple data-wiping malware families in June and September 2025, targeting Ukraine's education, government, and grain sectors. The grain sector, a vital economic sector, was targeted to disrupt Ukraine's war economy. The data-wiping malware used included ZeroLot and Sting, with initial access achieved by UAC-0099, who then transferred access to APT44 for wiper deployment. The activity is confirmed to be of Russian origin, with specific attribution to the Sandworm group. In December 2025, Sandworm targeted Poland's power sector with a new wiper malware called DynoWiper, aiming to disrupt the energy infrastructure. The attack, which occurred on December 29 and 30, 2025, targeted two combined heat and power (CHP) plants and a system managing renewable energy sources. The attack was unsuccessful in causing disruption, and Polish authorities attributed it to Russian services. The attack coincided with the tenth anniversary of Sandworm's 2015 attack on Ukraine's power grid. A new Russia-aligned threat activity cluster, InedibleOchotense, impersonated ESET in phishing attacks targeting Ukrainian entities starting in May 2025. This campaign involved sending spear-phishing emails and Signal text messages containing links to trojanized ESET installers, which delivered the Kalambur backdoor. InedibleOchotense is linked to the Sandworm (APT44) hacking group and has been observed conducting destructive campaigns in Ukraine, including the deployment of wiper malware ZEROLOT and Sting. Another Russia-aligned threat actor, RomCom, launched spear-phishing campaigns in mid-July 2025 exploiting a WinRAR vulnerability (CVE-2025-8088) targeting various sectors in Europe and Canada. RomCom also targeted a U.S.-based civil engineering company via a JavaScript loader dubbed SocGholish to deliver the Mythic Agent. The activity has been attributed with medium-to-high confidence to Unit 29155 of Russia's Main Directorate of the General Staff of the Armed Forces of the Russian Federation, also known as GRU. The targeted entity had worked for a city with close ties to Ukraine in the past. The ESET report noted that other Russian-aligned APT groups also maintained their focus on Ukraine and countries with strategic ties to Ukraine, while also expanding their operations to European entities. Gamaredon remained the most active APT group targeting Ukraine, with a noticeable increase in intensity and frequency of its operations during the reported period. Gamaredon selectively deployed one of Turla’s backdoors, indicating a rare instance of cooperation between Russia-aligned APT groups. Gamaredon’s toolset continued to evolve, incorporating new file stealers or tunneling services. The cyber attack on the Polish power grid in December 2025 was attributed with medium confidence to a Russian state-sponsored hacking group known as ELECTRUM. The attack targeted distributed energy resources (DERs) and affected communication and control systems at combined heat and power (CHP) facilities and systems managing renewable energy systems. ELECTRUM and KAMACITE share overlaps with the Sandworm cluster, with KAMACITE focusing on initial access and ELECTRUM conducting operations that bridge IT and OT environments. The attackers gained access to operational technology systems critical to grid operations and disabled key equipment beyond repair at the site. The attack was opportunistic and rushed, with the hackers attempting to inflict as much damage as possible by wiping Windows-based devices and resetting configurations. The majority of the equipment targeted was related to grid safety and stability monitoring. The coordinated attack on Poland's power grid in late December targeted multiple distributed energy resource (DER) sites across the country, including combined heat and power (CHP) facilities and wind and solar dispatch systems. Although the attacker compromised operational technology (OT) systems damaging "key equipment beyond repair," they failed to disrupt power, totaling 1.2 GW or 5% of Poland’s energy supply. Based on public reports, there are at least 12 confirmed affected sites. However, researchers at Dragos, a critical industrial infrastructure (OT) and control systems (ICS) security company say that the number is approximately 30. Dragos attributes the attack with moderate confidence to a Russian threat actor it tracks as Electrum, which, although it overlaps with Sandworm (APT44), the researchers underline that it is a distinct activity cluster. Electrum targeted exposed and vulnerable systems involved in dispatch and grid-facing communication, remote terminal units (RTUs), network edge devices, monitoring and control systems, and Windows-based machines at DER sites. Electrum successfully disabled communications equipment at multiple sites, resulting in a loss of remote monitoring and control, but power generation on the units continued without interruption. Certain OT/ICS devices were disabled, and their configurations were corrupted beyond recovery, while Windows systems at the sites were wiped. Even if the attacks had been successful in cutting the power, the relatively narrow targeting scope wouldn’t have been enough to cause a nationwide blackout in Poland. However, they could have caused significant destabilization of the system frequency. "Such frequency deviations have caused cascading failures in other electrical systems, including the 2025 Iberian grid collapse," the researchers say. CERT Polska revealed that coordinated cyber attacks targeted more than 30 wind and photovoltaic farms, a private company from the manufacturing sector, and a large combined heat and power plant (CHP) in Poland on December 29, 2025. The attacks were attributed to a threat cluster dubbed Static Tundra, which is linked to Russia's Federal Security Service's (FSB) Center 16 unit. The attacks had a purely destructive objective but did not affect the ongoing production of electricity or the heat supply to end users. The attackers gained access to the internal network of power substations associated with a renewable energy facility to carry out reconnaissance and disruptive activities, including damaging the firmware of controllers, deleting system files, or launching custom-built wiper malware codenamed DynoWiper. In the intrusion aimed at the CHP, the adversary engaged in long-term data theft dating back to March 2025, enabling them to escalate privileges and move laterally across the network. The attackers' attempts to detonate the wiper malware were unsuccessful. The targeting of the manufacturing sector company is believed to be opportunistic, with the threat actor gaining initial access via a vulnerable Fortinet perimeter device. At least four different versions of DynoWiper have been discovered to date. The wiper's functionality involves initializing a pseudorandom number generator (PRNG) called Mersenne Twister, enumerating files and corrupting them using the PRNG, and deleting files. The malware does not have a persistence mechanism, a way to communicate with a command-and-control (C2) server, or execute shell commands, and it does not attempt to hide the activity from security programs. The attack targeting the manufacturing sector company involved the use of a PowerShell-based wiper dubbed LazyWiper that scripts overwrites files on the system with pseudorandom 32-byte sequences to render them unrecoverable. The malware used in the incident involving renewable energy farms was executed directly on the HMI machine. In the CHP plant and the manufacturing sector company, the malware was distributed within the Active Directory domain via a PowerShell script executed on a domain controller. The attacker used credentials obtained from the on-premises environment in attempts to gain access to cloud services, downloading selected data from services such as Exchange, Teams, and SharePoint. The attacker was particularly interested in files and email messages related to OT network modernization, SCADA systems, and technical work carried out within the organizations.
Timeline
-
31.01.2026 09:05 1 articles · 23h ago
Static Tundra Conducts Destructive Attacks on Polish Energy and Manufacturing Sectors
CERT Polska revealed that coordinated cyber attacks targeted more than 30 wind and photovoltaic farms, a private company from the manufacturing sector, and a large combined heat and power plant (CHP) in Poland on December 29, 2025. The attacks were attributed to a threat cluster dubbed Static Tundra, which is linked to Russia's Federal Security Service's (FSB) Center 16 unit. The attacks had a purely destructive objective but did not affect the ongoing production of electricity or the heat supply to end users. The attackers gained access to the internal network of power substations associated with a renewable energy facility to carry out reconnaissance and disruptive activities, including damaging the firmware of controllers, deleting system files, or launching custom-built wiper malware codenamed DynoWiper. In the intrusion aimed at the CHP, the adversary engaged in long-term data theft dating back to March 2025, enabling them to escalate privileges and move laterally across the network. The attackers' attempts to detonate the wiper malware were unsuccessful. The targeting of the manufacturing sector company is believed to be opportunistic, with the threat actor gaining initial access via a vulnerable Fortinet perimeter device. At least four different versions of DynoWiper have been discovered to date. The wiper's functionality involves initializing a pseudorandom number generator (PRNG) called Mersenne Twister, enumerating files and corrupting them using the PRNG, and deleting files. The malware does not have a persistence mechanism, a way to communicate with a command-and-control (C2) server, or execute shell commands, and it does not attempt to hide the activity from security programs. The attack targeting the manufacturing sector company involved the use of a PowerShell-based wiper dubbed LazyWiper that scripts overwrites files on the system with pseudorandom 32-byte sequences to render them unrecoverable. The malware used in the incident involving renewable energy farms was executed directly on the HMI machine. In the CHP plant and the manufacturing sector company, the malware was distributed within the Active Directory domain via a PowerShell script executed on a domain controller. The attacker used credentials obtained from the on-premises environment in attempts to gain access to cloud services, downloading selected data from services such as Exchange, Teams, and SharePoint. The attacker was particularly interested in files and email messages related to OT network modernization, SCADA systems, and technical work carried out within the organizations.
Show sources
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
-
24.01.2026 10:21 6 articles · 7d ago
Sandworm Attempts to Disrupt Polish Power Sector with DynoWiper
In December 2025, Sandworm targeted Poland's power sector with a new wiper malware called DynoWiper, aiming to disrupt the energy infrastructure. The attack, which occurred on December 29 and 30, 2025, targeted two combined heat and power (CHP) plants and a system managing renewable energy sources. The attack was unsuccessful in causing disruption, and Polish authorities attributed it to Russian services. The attack coincided with the tenth anniversary of Sandworm's 2015 attack on Ukraine's power grid. Sandworm is also tracked as UAC-0113, APT44, and Seashell Blizzard. DynoWiper is detected by ESET as Win32/KillFiles.NMO with SHA-1 hash 4EC3C90846AF6B79EE1A5188EEFA3FD21F6D4CF6. No samples of DynoWiper have been found on malware submission sites as of January 24, 2026. The attackers deployed a wiper malware named DynoWiper during the attack on Poland's power grid in late December 2025. ESET attributed the attack to the Russia-aligned Sandworm APT with medium confidence due to a strong overlap with numerous previous Sandworm wiper activities. The campaign against Polish energy assets is still being investigated, but the timing of the coordinated cyber-attack might be deliberate, coinciding with the 10-year anniversary of the Sandworm-orchestrated attack against the Ukrainian power grid in December 2015. The cyber attack on the Polish power grid in December 2025 was attributed with medium confidence to a Russian state-sponsored hacking group known as ELECTRUM. The attack targeted distributed energy resources (DERs) and affected communication and control systems at combined heat and power (CHP) facilities and systems managing renewable energy systems. ELECTRUM and KAMACITE share overlaps with the Sandworm cluster, with KAMACITE focusing on initial access and ELECTRUM conducting operations that bridge IT and OT environments. The attackers gained access to operational technology systems critical to grid operations and disabled key equipment beyond repair at the site. The attack was opportunistic and rushed, with the hackers attempting to inflict as much damage as possible by wiping Windows-based devices and resetting configurations. The majority of the equipment targeted was related to grid safety and stability monitoring. The coordinated attack on Poland's power grid in late December targeted multiple distributed energy resource (DER) sites across the country, including combined heat and power (CHP) facilities and wind and solar dispatch systems. Although the attacker compromised operational technology (OT) systems damaging "key equipment beyond repair," they failed to disrupt power, totaling 1.2 GW or 5% of Poland’s energy supply. Based on public reports, there are at least 12 confirmed affected sites. However, researchers at Dragos, a critical industrial infrastructure (OT) and control systems (ICS) security company say that the number is approximately 30. Dragos attributes the attack with moderate confidence to a Russian threat actor it tracks as Electrum, which, although it overlaps with Sandworm (APT44), the researchers underline that it is a distinct activity cluster. Electrum targeted exposed and vulnerable systems involved in dispatch and grid-facing communication, remote terminal units (RTUs), network edge devices, monitoring and control systems, and Windows-based machines at DER sites. Electrum successfully disabled communications equipment at multiple sites, resulting in a loss of remote monitoring and control, but power generation on the units continued without interruption. Certain OT/ICS devices were disabled, and their configurations were corrupted beyond recovery, while Windows systems at the sites were wiped. Even if the attacks had been successful in cutting the power, the relatively narrow targeting scope wouldn’t have been enough to cause a nationwide blackout in Poland. However, they could have caused significant destabilization of the system frequency. "Such frequency deviations have caused cascading failures in other electrical systems, including the 2025 Iberian grid collapse," the researchers say. CERT Polska revealed that coordinated cyber attacks targeted more than 30 wind and photovoltaic farms, a private company from the manufacturing sector, and a large combined heat and power plant (CHP) in Poland on December 29, 2025. The attacks were attributed to a threat cluster dubbed Static Tundra, which is linked to Russia's Federal Security Service's (FSB) Center 16 unit. The attacks had a purely destructive objective but did not affect the ongoing production of electricity or the heat supply to end users. The attackers gained access to the internal network of power substations associated with a renewable energy facility to carry out reconnaissance and disruptive activities, including damaging the firmware of controllers, deleting system files, or launching custom-built wiper malware codenamed DynoWiper. In the intrusion aimed at the CHP, the adversary engaged in long-term data theft dating back to March 2025, enabling them to escalate privileges and move laterally across the network. The attackers' attempts to detonate the wiper malware were unsuccessful. The targeting of the manufacturing sector company is believed to be opportunistic, with the threat actor gaining initial access via a vulnerable Fortinet perimeter device. At least four different versions of DynoWiper have been discovered to date. The wiper's functionality involves initializing a pseudorandom number generator (PRNG) called Mersenne Twister, enumerating files and corrupting them using the PRNG, and deleting files. The malware does not have a persistence mechanism, a way to communicate with a command-and-control (C2) server, or execute shell commands, and it does not attempt to hide the activity from security programs. The attack targeting the manufacturing sector company involved the use of a PowerShell-based wiper dubbed LazyWiper that scripts overwrites files on the system with pseudorandom 32-byte sequences to render them unrecoverable. The malware used in the incident involving renewable energy farms was executed directly on the HMI machine. In the CHP plant and the manufacturing sector company, the malware was distributed within the Active Directory domain via a PowerShell script executed on a domain controller. The attacker used credentials obtained from the on-premises environment in attempts to gain access to cloud services, downloading selected data from services such as Exchange, Teams, and SharePoint. The attacker was particularly interested in files and email messages related to OT network modernization, SCADA systems, and technical work carried out within the organizations.
Show sources
- New DynoWiper Malware Used in Attempted Sandworm Attack on Polish Power Sector — thehackernews.com — 24.01.2026 10:21
- Sandworm hackers linked to failed wiper attack on Poland’s energy systems — www.bleepingcomputer.com — 24.01.2026 23:58
- Wiper Attack on Polish Power Grid Linked to Russia’s Sandworm — www.infosecurity-magazine.com — 26.01.2026 12:55
- Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid — thehackernews.com — 28.01.2026 18:06
- Cyberattack on Polish energy grid impacted around 30 facilities — www.bleepingcomputer.com — 29.01.2026 00:14
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
-
06.11.2025 17:31 3 articles · 2mo ago
RomCom Exploits WinRAR 0-Day in Attacks on European and Canadian Sectors
RomCom targeted a U.S.-based civil engineering company via a JavaScript loader dubbed SocGholish to deliver the Mythic Agent. The activity has been attributed with medium-to-high confidence to Unit 29155 of Russia's Main Directorate of the General Staff of the Armed Forces of the Russian Federation, also known as GRU. The targeted entity had worked for a city with close ties to Ukraine in the past. The attack chains typically involve serving fake browser update alerts for Google Chrome or Mozilla Firefox on legitimate-but-compromised websites to trick unsuspecting users into downloading malicious JavaScript that's responsible for installing a loader, which then fetches additional malware. The fake update payload allows the threat actors to run commands on the compromised machine by means of a reverse shell established to a command-and-control (C2) server. This includes conducting reconnaissance and dropping a custom Python backdoor codenamed VIPERTUNNEL. Also delivered is a RomCom-linked DLL loader that launches the Mythic Agent, a crucial component of the cross-platform, post-exploit, red teaming framework.
Show sources
- Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine — thehackernews.com — 06.11.2025 17:31
- Russian Hacking Group Sandworm Deploys New Wiper Malware in Ukraine — www.infosecurity-magazine.com — 07.11.2025 14:20
- RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware — thehackernews.com — 26.11.2025 10:28
-
06.11.2025 12:01 4 articles · 2mo ago
Sandworm Deploys Data-Wiping Malware Against Ukrainian Sectors
Sandworm continued destructive campaigns in Ukraine, launching wiper malware ZEROLOT and Sting aimed at an unnamed university in April 2025. The UAC-0099 group conducted initial access operations and transferred validated targets to Sandworm for follow-up activity. These destructive attacks by Sandworm are a reminder that wipers very much remain a frequent tool of Russia-aligned threat actors in Ukraine. Sandworm, also known as APT44, Telebots, Voodoo Bear, Iridium, Seashell Blizzard, and Iron Viking, has been associated with Russia's military intelligence service’s (GRU) unit MUN 74455 by several cybersecurity companies and government agencies. ESET assessed that Sandworm’s likely objective for deploying new wipers was to weaken the Ukrainian economy. In December 2025, Sandworm targeted Poland's power sector with a new wiper malware called DynoWiper, aiming to disrupt the energy infrastructure. The attack, which occurred on December 29 and 30, 2025, targeted two combined heat and power (CHP) plants and a system managing renewable energy sources. The attack was unsuccessful in causing disruption, and Polish authorities attributed it to Russian services. The attack coincided with the tenth anniversary of Sandworm's 2015 attack on Ukraine's power grid.
Show sources
- Sandworm hackers use data wipers to disrupt Ukraine's grain sector — www.bleepingcomputer.com — 06.11.2025 12:01
- Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine — thehackernews.com — 06.11.2025 17:31
- Russian Hacking Group Sandworm Deploys New Wiper Malware in Ukraine — www.infosecurity-magazine.com — 07.11.2025 14:20
- New DynoWiper Malware Used in Attempted Sandworm Attack on Polish Power Sector — thehackernews.com — 24.01.2026 10:21
-
29.10.2025 13:51 4 articles · 3mo ago
Russian Actors Target Ukrainian Organizations Using Living-Off-the-Land Tactics
InedibleOchotense, a Russia-aligned threat activity cluster, impersonated ESET in phishing attacks targeting Ukrainian entities starting in May 2025. This campaign involved sending spear-phishing emails and Signal text messages containing links to trojanized ESET installers, which delivered the Kalambur backdoor. The Kalambur backdoor uses the Tor network for command-and-control and enables remote access via RDP. InedibleOchotense is assessed to share tactical overlaps with a campaign involving the BACKORDER backdoor and is linked to the Sandworm (APT44) hacking group. The ESET report noted that other Russian-aligned APT groups also maintained their focus on Ukraine and countries with strategic ties to Ukraine, while also expanding their operations to European entities. Gamaredon remained the most active APT group targeting Ukraine, with a noticeable increase in intensity and frequency of its operations during the reported period. Gamaredon selectively deployed one of Turla’s backdoors, indicating a rare instance of cooperation between Russia-aligned APT groups. Gamaredon’s toolset continued to evolve, incorporating new file stealers or tunneling services.
Show sources
- Russian Hackers Target Ukrainian Organizations Using Stealthy Living-Off-the-Land Tactics — thehackernews.com — 29.10.2025 13:51
- Sandworm hackers use data wipers to disrupt Ukraine's grain sector — www.bleepingcomputer.com — 06.11.2025 12:01
- Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine — thehackernews.com — 06.11.2025 17:31
- Russian Hacking Group Sandworm Deploys New Wiper Malware in Ukraine — www.infosecurity-magazine.com — 07.11.2025 14:20
Information Snippets
-
The attacks targeted a business services organization for two months and a local government entity for one week.
First reported: 29.10.2025 13:511 source, 1 articleShow sources
- Russian Hackers Target Ukrainian Organizations Using Stealthy Living-Off-the-Land Tactics — thehackernews.com — 29.10.2025 13:51
-
The threat actors used living-off-the-land (LotL) tactics and dual-use tools to minimize detection.
First reported: 29.10.2025 13:512 sources, 3 articlesShow sources
- Russian Hackers Target Ukrainian Organizations Using Stealthy Living-Off-the-Land Tactics — thehackernews.com — 29.10.2025 13:51
- Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine — thehackernews.com — 06.11.2025 17:31
- Russian Hacking Group Sandworm Deploys New Wiper Malware in Ukraine — www.infosecurity-magazine.com — 07.11.2025 14:20
-
Initial access was gained by deploying web shells on public-facing servers, exploiting unpatched vulnerabilities.
First reported: 29.10.2025 13:512 sources, 2 articlesShow sources
- Russian Hackers Target Ukrainian Organizations Using Stealthy Living-Off-the-Land Tactics — thehackernews.com — 29.10.2025 13:51
- Russian Hacking Group Sandworm Deploys New Wiper Malware in Ukraine — www.infosecurity-magazine.com — 07.11.2025 14:20
-
The web shell LocalOlive, previously linked to the Sandworm group, was used to deliver next-stage payloads.
First reported: 29.10.2025 13:511 source, 1 articleShow sources
- Russian Hackers Target Ukrainian Organizations Using Stealthy Living-Off-the-Land Tactics — thehackernews.com — 29.10.2025 13:51
-
The attackers conducted extensive reconnaissance, including registry hive copying, process enumeration, and memory dumps.
First reported: 29.10.2025 13:511 source, 1 articleShow sources
- Russian Hackers Target Ukrainian Organizations Using Stealthy Living-Off-the-Land Tactics — thehackernews.com — 29.10.2025 13:51
-
The activity involved the use of legitimate tools like PowerShell, RDP, and OpenSSH for persistence and data exfiltration.
First reported: 29.10.2025 13:511 source, 2 articlesShow sources
- Russian Hackers Target Ukrainian Organizations Using Stealthy Living-Off-the-Land Tactics — thehackernews.com — 29.10.2025 13:51
- Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine — thehackernews.com — 06.11.2025 17:31
-
The attacks began on June 27, 2025, and involved the use of scheduled tasks and PowerShell backdoors.
First reported: 29.10.2025 13:511 source, 1 articleShow sources
- Russian Hackers Target Ukrainian Organizations Using Stealthy Living-Off-the-Land Tactics — thehackernews.com — 29.10.2025 13:51
-
The attackers demonstrated a deep knowledge of Windows native tools and minimal malware usage.
First reported: 29.10.2025 13:511 source, 1 articleShow sources
- Russian Hackers Target Ukrainian Organizations Using Stealthy Living-Off-the-Land Tactics — thehackernews.com — 29.10.2025 13:51
-
The Sandworm group deployed multiple data-wiping malware families in attacks targeting Ukraine's education, government, and grain sectors in June and September 2025.
First reported: 06.11.2025 12:013 sources, 4 articlesShow sources
- Sandworm hackers use data wipers to disrupt Ukraine's grain sector — www.bleepingcomputer.com — 06.11.2025 12:01
- Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine — thehackernews.com — 06.11.2025 17:31
- Russian Hacking Group Sandworm Deploys New Wiper Malware in Ukraine — www.infosecurity-magazine.com — 07.11.2025 14:20
- New DynoWiper Malware Used in Attempted Sandworm Attack on Polish Power Sector — thehackernews.com — 24.01.2026 10:21
-
The data-wiping malware used in these attacks includes ZeroLot and Sting.
First reported: 06.11.2025 12:013 sources, 4 articlesShow sources
- Sandworm hackers use data wipers to disrupt Ukraine's grain sector — www.bleepingcomputer.com — 06.11.2025 12:01
- Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine — thehackernews.com — 06.11.2025 17:31
- Russian Hacking Group Sandworm Deploys New Wiper Malware in Ukraine — www.infosecurity-magazine.com — 07.11.2025 14:20
- New DynoWiper Malware Used in Attempted Sandworm Attack on Polish Power Sector — thehackernews.com — 24.01.2026 10:21
-
The attacks targeted the grain sector, which is Ukraine's main revenue source, aiming to disrupt the country's war economy.
First reported: 06.11.2025 12:012 sources, 2 articlesShow sources
- Sandworm hackers use data wipers to disrupt Ukraine's grain sector — www.bleepingcomputer.com — 06.11.2025 12:01
- Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine — thehackernews.com — 06.11.2025 17:31
-
Initial access for some of these incidents was achieved by UAC-0099, who then transferred the access to APT44 for wiper deployment.
First reported: 06.11.2025 12:013 sources, 3 articlesShow sources
- Sandworm hackers use data wipers to disrupt Ukraine's grain sector — www.bleepingcomputer.com — 06.11.2025 12:01
- Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine — thehackernews.com — 06.11.2025 17:31
- Russian Hacking Group Sandworm Deploys New Wiper Malware in Ukraine — www.infosecurity-magazine.com — 07.11.2025 14:20
-
The Sandworm group has shown a focus on espionage operations but continues to conduct data wiper attacks against Ukrainian entities.
First reported: 06.11.2025 12:012 sources, 2 articlesShow sources
- Sandworm hackers use data wipers to disrupt Ukraine's grain sector — www.bleepingcomputer.com — 06.11.2025 12:01
- Russian Hacking Group Sandworm Deploys New Wiper Malware in Ukraine — www.infosecurity-magazine.com — 07.11.2025 14:20
-
Iran-aligned activity was identified, deploying Go-based tools based on publicly available open-source wipers, targeting Israel's energy and engineering sectors in June 2025.
First reported: 06.11.2025 12:011 source, 1 articleShow sources
- Sandworm hackers use data wipers to disrupt Ukraine's grain sector — www.bleepingcomputer.com — 06.11.2025 12:01
-
A Russia-aligned threat activity cluster, InedibleOchotense, impersonated ESET in phishing attacks targeting Ukrainian entities starting in May 2025.
First reported: 06.11.2025 17:312 sources, 2 articlesShow sources
- Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine — thehackernews.com — 06.11.2025 17:31
- Russian Hacking Group Sandworm Deploys New Wiper Malware in Ukraine — www.infosecurity-magazine.com — 07.11.2025 14:20
-
InedibleOchotense sent spear-phishing emails and Signal text messages containing links to trojanized ESET installers.
First reported: 06.11.2025 17:312 sources, 2 articlesShow sources
- Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine — thehackernews.com — 06.11.2025 17:31
- Russian Hacking Group Sandworm Deploys New Wiper Malware in Ukraine — www.infosecurity-magazine.com — 07.11.2025 14:20
-
The trojanized ESET installers delivered the Kalambur backdoor, which uses the Tor network for command-and-control and enables remote access via RDP.
First reported: 06.11.2025 17:312 sources, 2 articlesShow sources
- Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine — thehackernews.com — 06.11.2025 17:31
- Russian Hacking Group Sandworm Deploys New Wiper Malware in Ukraine — www.infosecurity-magazine.com — 07.11.2025 14:20
-
InedibleOchotense is assessed to share tactical overlaps with a campaign involving the BACKORDER backdoor and is linked to the Sandworm (APT44) hacking group.
First reported: 06.11.2025 17:312 sources, 2 articlesShow sources
- Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine — thehackernews.com — 06.11.2025 17:31
- Russian Hacking Group Sandworm Deploys New Wiper Malware in Ukraine — www.infosecurity-magazine.com — 07.11.2025 14:20
-
The Kalambur backdoor is capable of dropping OpenSSH and enabling remote access via the Remote Desktop Protocol (RDP) on port 3389.
First reported: 06.11.2025 17:312 sources, 2 articlesShow sources
- Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine — thehackernews.com — 06.11.2025 17:31
- Russian Hacking Group Sandworm Deploys New Wiper Malware in Ukraine — www.infosecurity-magazine.com — 07.11.2025 14:20
-
CERT-UA attributed a nearly identical campaign to UAC-0125, another sub-cluster within Sandworm.
First reported: 06.11.2025 17:312 sources, 2 articlesShow sources
- Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine — thehackernews.com — 06.11.2025 17:31
- Russian Hacking Group Sandworm Deploys New Wiper Malware in Ukraine — www.infosecurity-magazine.com — 07.11.2025 14:20
-
Sandworm continued destructive campaigns in Ukraine, launching wiper malware ZEROLOT and Sting aimed at an unnamed university in April 2025.
First reported: 06.11.2025 17:312 sources, 3 articlesShow sources
- Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine — thehackernews.com — 06.11.2025 17:31
- Russian Hacking Group Sandworm Deploys New Wiper Malware in Ukraine — www.infosecurity-magazine.com — 07.11.2025 14:20
- New DynoWiper Malware Used in Attempted Sandworm Attack on Polish Power Sector — thehackernews.com — 24.01.2026 10:21
-
The UAC-0099 group conducted initial access operations and transferred validated targets to Sandworm for follow-up activity.
First reported: 06.11.2025 17:312 sources, 2 articlesShow sources
- Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine — thehackernews.com — 06.11.2025 17:31
- Russian Hacking Group Sandworm Deploys New Wiper Malware in Ukraine — www.infosecurity-magazine.com — 07.11.2025 14:20
-
RomCom, another Russia-aligned threat actor, launched spear-phishing campaigns in mid-July 2025 exploiting a WinRAR vulnerability (CVE-2025-8088) targeting various sectors in Europe and Canada.
First reported: 06.11.2025 17:312 sources, 2 articlesShow sources
- Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine — thehackernews.com — 06.11.2025 17:31
- Russian Hacking Group Sandworm Deploys New Wiper Malware in Ukraine — www.infosecurity-magazine.com — 07.11.2025 14:20
-
Sandworm, also known as APT44, Telebots, Voodoo Bear, Iridium, Seashell Blizzard, and Iron Viking, has been associated with Russia's military intelligence service’s (GRU) unit MUN 74455 by several cybersecurity companies and government agencies.
First reported: 07.11.2025 14:203 sources, 3 articlesShow sources
- Russian Hacking Group Sandworm Deploys New Wiper Malware in Ukraine — www.infosecurity-magazine.com — 07.11.2025 14:20
- New DynoWiper Malware Used in Attempted Sandworm Attack on Polish Power Sector — thehackernews.com — 24.01.2026 10:21
- Sandworm hackers linked to failed wiper attack on Poland’s energy systems — www.bleepingcomputer.com — 24.01.2026 23:58
-
ESET assessed that Sandworm’s likely objective for deploying new wipers was to weaken the Ukrainian economy.
First reported: 07.11.2025 14:202 sources, 2 articlesShow sources
- Russian Hacking Group Sandworm Deploys New Wiper Malware in Ukraine — www.infosecurity-magazine.com — 07.11.2025 14:20
- New DynoWiper Malware Used in Attempted Sandworm Attack on Polish Power Sector — thehackernews.com — 24.01.2026 10:21
-
Gamaredon remained the most active APT group targeting Ukraine, with a noticeable increase in intensity and frequency of its operations during the reported period.
First reported: 07.11.2025 14:202 sources, 2 articlesShow sources
- Russian Hacking Group Sandworm Deploys New Wiper Malware in Ukraine — www.infosecurity-magazine.com — 07.11.2025 14:20
- RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware — thehackernews.com — 26.11.2025 10:28
-
Gamaredon selectively deployed one of Turla’s backdoors, indicating a rare instance of cooperation between Russia-aligned APT groups.
First reported: 07.11.2025 14:202 sources, 2 articlesShow sources
- Russian Hacking Group Sandworm Deploys New Wiper Malware in Ukraine — www.infosecurity-magazine.com — 07.11.2025 14:20
- RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware — thehackernews.com — 26.11.2025 10:28
-
Gamaredon’s toolset continued to evolve, incorporating new file stealers or tunneling services.
First reported: 07.11.2025 14:202 sources, 2 articlesShow sources
- Russian Hacking Group Sandworm Deploys New Wiper Malware in Ukraine — www.infosecurity-magazine.com — 07.11.2025 14:20
- RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware — thehackernews.com — 26.11.2025 10:28
-
RomCom exploited a zero-day vulnerability in WinRAR to deploy malicious DLLs and deliver a variety of backdoors, focusing on the financial, manufacturing, defense, and logistics sectors in the EU and Canada.
First reported: 07.11.2025 14:202 sources, 2 articlesShow sources
- Russian Hacking Group Sandworm Deploys New Wiper Malware in Ukraine — www.infosecurity-magazine.com — 07.11.2025 14:20
- RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware — thehackernews.com — 26.11.2025 10:28
-
RomCom targeted a U.S.-based civil engineering company via a JavaScript loader dubbed SocGholish to deliver the Mythic Agent.
First reported: 26.11.2025 10:281 source, 1 articleShow sources
- RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware — thehackernews.com — 26.11.2025 10:28
-
The activity has been attributed with medium-to-high confidence to Unit 29155 of Russia's Main Directorate of the General Staff of the Armed Forces of the Russian Federation, also known as GRU.
First reported: 26.11.2025 10:281 source, 1 articleShow sources
- RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware — thehackernews.com — 26.11.2025 10:28
-
The targeted entity had worked for a city with close ties to Ukraine in the past.
First reported: 26.11.2025 10:281 source, 1 articleShow sources
- RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware — thehackernews.com — 26.11.2025 10:28
-
SocGholish (aka FakeUpdates), linked to a financially motivated operator tracked as TA569, serves as an initial access broker, allowing other threat actors to drop a wide range of payloads.
First reported: 26.11.2025 10:281 source, 1 articleShow sources
- RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware — thehackernews.com — 26.11.2025 10:28
-
The attack chains typically involve serving fake browser update alerts for Google Chrome or Mozilla Firefox on legitimate-but-compromised websites to trick unsuspecting users into downloading malicious JavaScript that's responsible for installing a loader, which then fetches additional malware.
First reported: 26.11.2025 10:281 source, 1 articleShow sources
- RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware — thehackernews.com — 26.11.2025 10:28
-
RomCom leverages several methods, including spear-phishing and zero-day exploits, to breach target networks and drop the eponymous remote access trojan (RAT) on victim machines.
First reported: 26.11.2025 10:281 source, 1 articleShow sources
- RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware — thehackernews.com — 26.11.2025 10:28
-
The fake update payload allows the threat actors to run commands on the compromised machine by means of a reverse shell established to a command-and-control (C2) server.
First reported: 26.11.2025 10:281 source, 1 articleShow sources
- RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware — thehackernews.com — 26.11.2025 10:28
-
The attack includes conducting reconnaissance and dropping a custom Python backdoor codenamed VIPERTUNNEL.
First reported: 26.11.2025 10:281 source, 1 articleShow sources
- RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware — thehackernews.com — 26.11.2025 10:28
-
Also delivered is a RomCom-linked DLL loader that launches the Mythic Agent, a crucial component of the cross-platform, post-exploit, red teaming framework.
First reported: 26.11.2025 10:281 source, 1 articleShow sources
- RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware — thehackernews.com — 26.11.2025 10:28
-
The timeline from infection via the fake update to the delivery of RomCom's loader was less than 30 minutes.
First reported: 26.11.2025 10:281 source, 1 articleShow sources
- RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware — thehackernews.com — 26.11.2025 10:28
-
Delivery is not made until the target's Active Directory domain has been verified to match a known value provided by the threat actor.
First reported: 26.11.2025 10:281 source, 1 articleShow sources
- RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware — thehackernews.com — 26.11.2025 10:28
-
Sandworm targeted Poland's power sector with a new wiper malware called DynoWiper in December 2025.
First reported: 24.01.2026 10:213 sources, 5 articlesShow sources
- New DynoWiper Malware Used in Attempted Sandworm Attack on Polish Power Sector — thehackernews.com — 24.01.2026 10:21
- Sandworm hackers linked to failed wiper attack on Poland’s energy systems — www.bleepingcomputer.com — 24.01.2026 23:58
- Wiper Attack on Polish Power Grid Linked to Russia’s Sandworm — www.infosecurity-magazine.com — 26.01.2026 12:55
- Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid — thehackernews.com — 28.01.2026 18:06
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
-
The attack targeted two combined heat and power (CHP) plants and a system managing renewable energy sources.
First reported: 24.01.2026 10:213 sources, 5 articlesShow sources
- New DynoWiper Malware Used in Attempted Sandworm Attack on Polish Power Sector — thehackernews.com — 24.01.2026 10:21
- Sandworm hackers linked to failed wiper attack on Poland’s energy systems — www.bleepingcomputer.com — 24.01.2026 23:58
- Wiper Attack on Polish Power Grid Linked to Russia’s Sandworm — www.infosecurity-magazine.com — 26.01.2026 12:55
- Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid — thehackernews.com — 28.01.2026 18:06
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
-
The attack occurred on December 29 and 30, 2025, and was unsuccessful in causing disruption.
First reported: 24.01.2026 10:213 sources, 5 articlesShow sources
- New DynoWiper Malware Used in Attempted Sandworm Attack on Polish Power Sector — thehackernews.com — 24.01.2026 10:21
- Sandworm hackers linked to failed wiper attack on Poland’s energy systems — www.bleepingcomputer.com — 24.01.2026 23:58
- Wiper Attack on Polish Power Grid Linked to Russia’s Sandworm — www.infosecurity-magazine.com — 26.01.2026 12:55
- Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid — thehackernews.com — 28.01.2026 18:06
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
-
Polish Prime Minister Donald Tusk stated that the attacks were linked to Russian services.
First reported: 24.01.2026 10:213 sources, 5 articlesShow sources
- New DynoWiper Malware Used in Attempted Sandworm Attack on Polish Power Sector — thehackernews.com — 24.01.2026 10:21
- Sandworm hackers linked to failed wiper attack on Poland’s energy systems — www.bleepingcomputer.com — 24.01.2026 23:58
- Wiper Attack on Polish Power Grid Linked to Russia’s Sandworm — www.infosecurity-magazine.com — 26.01.2026 12:55
- Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid — thehackernews.com — 28.01.2026 18:06
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
-
The attack coincided with the tenth anniversary of Sandworm's 2015 attack on Ukraine's power grid.
First reported: 24.01.2026 10:213 sources, 4 articlesShow sources
- New DynoWiper Malware Used in Attempted Sandworm Attack on Polish Power Sector — thehackernews.com — 24.01.2026 10:21
- Sandworm hackers linked to failed wiper attack on Poland’s energy systems — www.bleepingcomputer.com — 24.01.2026 23:58
- Wiper Attack on Polish Power Grid Linked to Russia’s Sandworm — www.infosecurity-magazine.com — 26.01.2026 12:55
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
-
Sandworm is also tracked as UAC-0113, APT44, and Seashell Blizzard.
First reported: 24.01.2026 23:583 sources, 5 articlesShow sources
- Sandworm hackers linked to failed wiper attack on Poland’s energy systems — www.bleepingcomputer.com — 24.01.2026 23:58
- Wiper Attack on Polish Power Grid Linked to Russia’s Sandworm — www.infosecurity-magazine.com — 26.01.2026 12:55
- Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid — thehackernews.com — 28.01.2026 18:06
- Cyberattack on Polish energy grid impacted around 30 facilities — www.bleepingcomputer.com — 29.01.2026 00:14
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
-
DynoWiper is detected by ESET as Win32/KillFiles.NMO with SHA-1 hash 4EC3C90846AF6B79EE1A5188EEFA3FD21F6D4CF6.
First reported: 24.01.2026 23:582 sources, 3 articlesShow sources
- Sandworm hackers linked to failed wiper attack on Poland’s energy systems — www.bleepingcomputer.com — 24.01.2026 23:58
- Cyberattack on Polish energy grid impacted around 30 facilities — www.bleepingcomputer.com — 29.01.2026 00:14
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
-
No samples of DynoWiper have been found on malware submission sites as of January 24, 2026.
First reported: 24.01.2026 23:582 sources, 3 articlesShow sources
- Sandworm hackers linked to failed wiper attack on Poland’s energy systems — www.bleepingcomputer.com — 24.01.2026 23:58
- Cyberattack on Polish energy grid impacted around 30 facilities — www.bleepingcomputer.com — 29.01.2026 00:14
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
-
The attackers deployed a wiper malware named DynoWiper during the attack on Poland's power grid in late December 2025.
First reported: 26.01.2026 12:553 sources, 4 articlesShow sources
- Wiper Attack on Polish Power Grid Linked to Russia’s Sandworm — www.infosecurity-magazine.com — 26.01.2026 12:55
- Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid — thehackernews.com — 28.01.2026 18:06
- Cyberattack on Polish energy grid impacted around 30 facilities — www.bleepingcomputer.com — 29.01.2026 00:14
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
-
ESET attributed the attack to the Russia-aligned Sandworm APT with medium confidence due to a strong overlap with numerous previous Sandworm wiper activities.
First reported: 26.01.2026 12:553 sources, 4 articlesShow sources
- Wiper Attack on Polish Power Grid Linked to Russia’s Sandworm — www.infosecurity-magazine.com — 26.01.2026 12:55
- Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid — thehackernews.com — 28.01.2026 18:06
- Cyberattack on Polish energy grid impacted around 30 facilities — www.bleepingcomputer.com — 29.01.2026 00:14
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
-
The campaign against Polish energy assets is still being investigated, but the timing of the coordinated cyber-attack might be deliberate, coinciding with the 10-year anniversary of the Sandworm-orchestrated attack against the Ukrainian power grid in December 2015.
First reported: 26.01.2026 12:553 sources, 4 articlesShow sources
- Wiper Attack on Polish Power Grid Linked to Russia’s Sandworm — www.infosecurity-magazine.com — 26.01.2026 12:55
- Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid — thehackernews.com — 28.01.2026 18:06
- Cyberattack on Polish energy grid impacted around 30 facilities — www.bleepingcomputer.com — 29.01.2026 00:14
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
-
Sandworm has been highly active since Russia's invasion of Ukraine in 2022, targeting energy infrastructure inside Ukraine on multiple occasions.
First reported: 26.01.2026 12:552 sources, 3 articlesShow sources
- Wiper Attack on Polish Power Grid Linked to Russia’s Sandworm — www.infosecurity-magazine.com — 26.01.2026 12:55
- Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid — thehackernews.com — 28.01.2026 18:06
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
-
In March 2024, Sandworm hit energy, heating, and water facilities in 10 regions of Ukraine in a bid to amplify the impact of missile strikes.
First reported: 26.01.2026 12:552 sources, 3 articlesShow sources
- Wiper Attack on Polish Power Grid Linked to Russia’s Sandworm — www.infosecurity-magazine.com — 26.01.2026 12:55
- Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid — thehackernews.com — 28.01.2026 18:06
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
-
In both Q2 and Q3 2025, Sandworm deployed data wipers such as Zerolot and Sting against government, energy, and logistics entities in Ukraine.
First reported: 26.01.2026 12:552 sources, 3 articlesShow sources
- Wiper Attack on Polish Power Grid Linked to Russia’s Sandworm — www.infosecurity-magazine.com — 26.01.2026 12:55
- Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid — thehackernews.com — 28.01.2026 18:06
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
-
The long-term goal of such attacks is to weaken the economy and demoralize the population, forcing the government to give in to the demands of the Putin administration.
First reported: 26.01.2026 12:552 sources, 3 articlesShow sources
- Wiper Attack on Polish Power Grid Linked to Russia’s Sandworm — www.infosecurity-magazine.com — 26.01.2026 12:55
- Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid — thehackernews.com — 28.01.2026 18:06
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
-
Polish Prime Minister Donald Tusk revealed that the country had successfully repelled the destructive attack on its own energy infrastructure a few weeks earlier.
First reported: 26.01.2026 12:552 sources, 3 articlesShow sources
- Wiper Attack on Polish Power Grid Linked to Russia’s Sandworm — www.infosecurity-magazine.com — 26.01.2026 12:55
- Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid — thehackernews.com — 28.01.2026 18:06
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
-
The systems in Poland proved effective, and at no point was critical infrastructure threatened, meaning the transmission networks and everything that determines the safety of the entire system.
First reported: 26.01.2026 12:552 sources, 3 articlesShow sources
- Wiper Attack on Polish Power Grid Linked to Russia’s Sandworm — www.infosecurity-magazine.com — 26.01.2026 12:55
- Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid — thehackernews.com — 28.01.2026 18:06
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
-
The Polish government is rushing to finalize a National Cybersecurity System Act to mandate stricter requirements for risk management, IT and OT security, and incident response.
First reported: 26.01.2026 12:552 sources, 3 articlesShow sources
- Wiper Attack on Polish Power Grid Linked to Russia’s Sandworm — www.infosecurity-magazine.com — 26.01.2026 12:55
- Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid — thehackernews.com — 28.01.2026 18:06
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
-
The attack took place on December 29 and 30, 2025, and targeted two combined heat and power (CHP) plants and a renewable energy system.
First reported: 26.01.2026 12:552 sources, 3 articlesShow sources
- Wiper Attack on Polish Power Grid Linked to Russia’s Sandworm — www.infosecurity-magazine.com — 26.01.2026 12:55
- Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid — thehackernews.com — 28.01.2026 18:06
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
-
The cyber attack on the Polish power grid in December 2025 was attributed with medium confidence to a Russian state-sponsored hacking group known as ELECTRUM.
First reported: 28.01.2026 18:062 sources, 3 articlesShow sources
- Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid — thehackernews.com — 28.01.2026 18:06
- Cyberattack on Polish energy grid impacted around 30 facilities — www.bleepingcomputer.com — 29.01.2026 00:14
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
-
The attack targeted distributed energy resources (DERs) and affected communication and control systems at combined heat and power (CHP) facilities and systems managing renewable energy systems.
First reported: 28.01.2026 18:062 sources, 3 articlesShow sources
- Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid — thehackernews.com — 28.01.2026 18:06
- Cyberattack on Polish energy grid impacted around 30 facilities — www.bleepingcomputer.com — 29.01.2026 00:14
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
-
ELECTRUM and KAMACITE share overlaps with the Sandworm cluster, with KAMACITE focusing on initial access and ELECTRUM conducting operations that bridge IT and OT environments.
First reported: 28.01.2026 18:062 sources, 3 articlesShow sources
- Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid — thehackernews.com — 28.01.2026 18:06
- Cyberattack on Polish energy grid impacted around 30 facilities — www.bleepingcomputer.com — 29.01.2026 00:14
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
-
The attackers gained access to operational technology systems critical to grid operations and disabled key equipment beyond repair at the site.
First reported: 28.01.2026 18:062 sources, 3 articlesShow sources
- Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid — thehackernews.com — 28.01.2026 18:06
- Cyberattack on Polish energy grid impacted around 30 facilities — www.bleepingcomputer.com — 29.01.2026 00:14
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
-
The attack was opportunistic and rushed, with the hackers attempting to inflict as much damage as possible by wiping Windows-based devices and resetting configurations.
First reported: 28.01.2026 18:062 sources, 3 articlesShow sources
- Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid — thehackernews.com — 28.01.2026 18:06
- Cyberattack on Polish energy grid impacted around 30 facilities — www.bleepingcomputer.com — 29.01.2026 00:14
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
-
The majority of the equipment targeted was related to grid safety and stability monitoring.
First reported: 28.01.2026 18:062 sources, 3 articlesShow sources
- Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid — thehackernews.com — 28.01.2026 18:06
- Cyberattack on Polish energy grid impacted around 30 facilities — www.bleepingcomputer.com — 29.01.2026 00:14
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
-
The coordinated attack on Poland's power grid in late December targeted multiple distributed energy resource (DER) sites across the country, including combined heat and power (CHP) facilities and wind and solar dispatch systems.
First reported: 29.01.2026 00:142 sources, 2 articlesShow sources
- Cyberattack on Polish energy grid impacted around 30 facilities — www.bleepingcomputer.com — 29.01.2026 00:14
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
-
Although the attacker compromised operational technology (OT) systems damaging "key equipment beyond repair," they failed to disrupt power, totalling 1.2 GW or 5% of Poland’s energy supply.
First reported: 29.01.2026 00:142 sources, 2 articlesShow sources
- Cyberattack on Polish energy grid impacted around 30 facilities — www.bleepingcomputer.com — 29.01.2026 00:14
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
-
Based on public reports, there are at least 12 confirmed affected sites. However, researchers at Dragos, a critical industrial infrastructure (OT) and control systems (ICS) security company say that the number is approximately 30.
First reported: 29.01.2026 00:142 sources, 2 articlesShow sources
- Cyberattack on Polish energy grid impacted around 30 facilities — www.bleepingcomputer.com — 29.01.2026 00:14
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
-
Dragos attributes the attack with moderate confidence to a Russian threat actor it tracks as Electrum, which, although it overlaps with Sandworm (APT44), the researchers underline that it is a distinct activity cluster.
First reported: 29.01.2026 00:142 sources, 2 articlesShow sources
- Cyberattack on Polish energy grid impacted around 30 facilities — www.bleepingcomputer.com — 29.01.2026 00:14
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
-
Electrum targeted exposed and vulnerable systems involved in dispatch and grid-facing communication, remote terminal units (RTUs), network edge devices, monitoring and control systems, and Windows-based machines at DER sites.
First reported: 29.01.2026 00:142 sources, 2 articlesShow sources
- Cyberattack on Polish energy grid impacted around 30 facilities — www.bleepingcomputer.com — 29.01.2026 00:14
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
-
Electrum successfully disabled communications equipment at multiple sites, resulting in a loss of remote monitoring and control, but power generation on the units continued without interruption.
First reported: 29.01.2026 00:142 sources, 2 articlesShow sources
- Cyberattack on Polish energy grid impacted around 30 facilities — www.bleepingcomputer.com — 29.01.2026 00:14
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
-
Certain OT/ICS devices were disabled, and their configurations were corrupted beyond recovery, while Windows systems at the sites were wiped.
First reported: 29.01.2026 00:142 sources, 2 articlesShow sources
- Cyberattack on Polish energy grid impacted around 30 facilities — www.bleepingcomputer.com — 29.01.2026 00:14
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
-
Even if the attacks had been successful in cutting the power, the relatively narrow targeting scope wouldn’t have been enough to cause a nationwide blackout in Poland.
First reported: 29.01.2026 00:142 sources, 2 articlesShow sources
- Cyberattack on Polish energy grid impacted around 30 facilities — www.bleepingcomputer.com — 29.01.2026 00:14
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
-
However, they could have caused significant destabilization of the system frequency. "Such frequency deviations have caused cascading failures in other electrical systems, including the 2025 Iberian grid collapse," the researchers say.
First reported: 29.01.2026 00:142 sources, 2 articlesShow sources
- Cyberattack on Polish energy grid impacted around 30 facilities — www.bleepingcomputer.com — 29.01.2026 00:14
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
-
CERT Polska revealed that coordinated cyber attacks targeted more than 30 wind and photovoltaic farms, a private company from the manufacturing sector, and a large combined heat and power plant (CHP) in Poland on December 29, 2025.
First reported: 31.01.2026 09:051 source, 1 articleShow sources
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
-
The attacks were attributed to a threat cluster dubbed Static Tundra, which is linked to Russia's Federal Security Service's (FSB) Center 16 unit.
First reported: 31.01.2026 09:051 source, 1 articleShow sources
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
-
The attacks had a purely destructive objective but did not affect the ongoing production of electricity or the heat supply to end users.
First reported: 31.01.2026 09:051 source, 1 articleShow sources
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
-
The attackers gained access to the internal network of power substations associated with a renewable energy facility to carry out reconnaissance and disruptive activities, including damaging the firmware of controllers, deleting system files, or launching custom-built wiper malware codenamed DynoWiper.
First reported: 31.01.2026 09:051 source, 1 articleShow sources
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
-
In the intrusion aimed at the CHP, the adversary engaged in long-term data theft dating back to March 2025, enabling them to escalate privileges and move laterally across the network.
First reported: 31.01.2026 09:051 source, 1 articleShow sources
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
-
The attackers' attempts to detonate the wiper malware were unsuccessful.
First reported: 31.01.2026 09:051 source, 1 articleShow sources
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
-
The targeting of the manufacturing sector company is believed to be opportunistic, with the threat actor gaining initial access via a vulnerable Fortinet perimeter device.
First reported: 31.01.2026 09:051 source, 1 articleShow sources
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
-
At least four different versions of DynoWiper have been discovered to date.
First reported: 31.01.2026 09:051 source, 1 articleShow sources
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
-
The wiper's functionality involves initializing a pseudorandom number generator (PRNG) called Mersenne Twister, enumerating files and corrupting them using the PRNG, and deleting files.
First reported: 31.01.2026 09:051 source, 1 articleShow sources
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
-
The malware does not have a persistence mechanism, a way to communicate with a command-and-control (C2) server, or execute shell commands, and it does not attempt to hide the activity from security programs.
First reported: 31.01.2026 09:051 source, 1 articleShow sources
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
-
The attack targeting the manufacturing sector company involved the use of a PowerShell-based wiper dubbed LazyWiper that scripts overwrites files on the system with pseudorandom 32-byte sequences to render them unrecoverable.
First reported: 31.01.2026 09:051 source, 1 articleShow sources
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
-
The malware used in the incident involving renewable energy farms was executed directly on the HMI machine.
First reported: 31.01.2026 09:051 source, 1 articleShow sources
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
-
In the CHP plant and the manufacturing sector company, the malware was distributed within the Active Directory domain via a PowerShell script executed on a domain controller.
First reported: 31.01.2026 09:051 source, 1 articleShow sources
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
-
The attacker used credentials obtained from the on-premises environment in attempts to gain access to cloud services, downloading selected data from services such as Exchange, Teams, and SharePoint.
First reported: 31.01.2026 09:051 source, 1 articleShow sources
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
-
The attacker was particularly interested in files and email messages related to OT network modernization, SCADA systems, and technical work carried out within the organizations.
First reported: 31.01.2026 09:051 source, 1 articleShow sources
- CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms — thehackernews.com — 31.01.2026 09:05
Similar Happenings
China-Linked APTs Deploy PeckBirdy JScript C2 Framework Since 2023
China-aligned APT actors have been using the PeckBirdy JScript-based command-and-control (C2) framework since 2023 to target Chinese gambling industries, Asian government entities, and private organizations. The framework leverages living-off-the-land binaries (LOLBins) for execution across various environments. Two campaigns, SHADOW-VOID-044 and SHADOW-EARTH-045, have been identified, each employing different tactics, including credential harvesting and malware delivery. The framework's flexibility allows it to operate across web browsers, MSHTA, WScript, Classic ASP, Node JS, and .NET, using multiple communication methods like WebSocket and Adobe Flash ActiveX objects. Additional scripts for exploitation, social engineering, and backdoor delivery have been observed, along with links to known backdoors like HOLODONUT and MKDOOR. HOLODONUT disables security features such as AMSI before executing payloads in memory, while MKDOOR disguises its network traffic as legitimate Microsoft support or activation pages and attempts to evade Microsoft Defender by altering exclusion settings. Infrastructure overlaps and shared tooling suggest SHADOW-VOID-044 is linked with UNC3569, a China-aligned group previously associated with the GRAYRABBIT backdoor. Some samples used stolen code-signing certificates to legitimize malicious Cobalt Strike payloads, and SHADOW-EARTH-045 showed weaker but notable ties to activity previously attributed to Earth Baxia. The Shadow-Void-044 campaign used stolen code-signing certificates, Cobalt Strike payloads, and exploits, including CVE-2020-16040, to maintain persistent access. The Shadow-Earth-045 campaign targeted a Philippine educational institution in July 2024, using the GrayRabbit backdoor and the HoloDonut backdoor. The threat actor behind the Shadow-Earth campaign developed a .NET executable to launch PeckBirdy with ScriptControl.
Black Basta Leader Identified and Added to Interpol's Red Notice List
Law enforcement in Ukraine and Germany have identified Oleg Evgenievich Nefedov, a 35-year-old Russian national, as the leader of the Black Basta ransomware gang. Nefedov, known by multiple aliases, has been added to Europol's 'Most Wanted' and Interpol's 'Red Notice' lists. Ukrainian police, in collaboration with German authorities, identified two additional individuals involved in initial network breaches and privilege escalation for ransomware attacks. These individuals were found to be 'hash crackers', specializing in extracting passwords from account databases. Raids in Ukraine seized digital storage devices and cryptocurrency assets. Black Basta has targeted over 500 companies globally and is estimated to have earned hundreds of millions of dollars in cryptocurrency. Nefedov is believed to have ties to Russian intelligence agencies and was arrested in Armenia but secured his freedom. The group's internal chat logs leaked, revealing its structure and key members, and its data leak site was taken down in February 2025. Former affiliates may have migrated to the CACTUS ransomware operation.
PluggyApe Backdoor Targets Ukraine's Defense Forces in Charity-Themed Campaign
Ukraine's Defense Forces were targeted in a charity-themed malware campaign between October and December 2025. The campaign delivered the PluggyApe backdoor, likely deployed by the Russian threat group Void Blizzard (Laundry Bear). The attacks began with instant messages over Signal or WhatsApp, directing recipients to malicious websites posing as charitable foundations. These sites distributed password-protected archives containing PluggyApe payloads. The malware profiles the host, sends victim information to attackers, and waits for further commands. The campaign highlights the increasing use of mobile devices as prime targets due to their poor protection and monitoring. Additionally, the Computer Emergency Response Team of Ukraine (CERT-UA) has disclosed details of new cyber attacks targeting its defense forces with malware known as PLUGGYAPE between October and December 2025. The threat actor is believed to be active since at least April 2024. The malware is written in Python and establishes communication with a remote server over WebSocket or Message Queuing Telemetry Transport (MQTT). The command-and-control (C2) addresses are retrieved from external paste services such as rentry[.]co and pastebin[.]com, where they are stored in base64-encoded form.
Phantom Stealer Malware Spread via ISO Phishing Emails Targeting Russian Finance Sector
A phishing campaign, codenamed Operation MoneyMount-ISO, is targeting Russian finance and accounting sectors with emails delivering Phantom Stealer malware via malicious ISO files. The campaign uses fake payment confirmation lures to trick recipients into opening a ZIP archive containing an ISO file that launches the malware. Phantom Stealer steals cryptocurrency wallet data, browser credentials, and other sensitive information, exfiltrating data via Telegram bots or Discord webhooks. Additionally, another campaign, DupeHike, targets HR and payroll departments with phishing emails deploying the DUPERUNNER implant, which loads the AdaptixC2 framework. This campaign is attributed to the threat cluster UNG0902. Other campaigns have targeted finance, legal, and aerospace sectors with tools like Cobalt Strike, Formbook, DarkWatchman, and PhantomRemote. The campaign is tracked as Operation MoneyMount-ISO and marks a continued shift toward ISO-based initial access techniques designed to bypass email security controls. The phishing email was written in formal Russian business language and carried the subject line "Подтверждение банковского перевода" or "Confirmation of Bank Transfer." The initial loader decrypted a malicious DLL, which then injected Phantom Stealer into the system while employing extensive anti-analysis checks to evade sandboxes and virtual machines. Targeted sectors included finance, accounting, treasury and payments teams in Russia, procurement, legal and HR or payroll functions, and executive assistants and small or medium-sized enterprises using Russian-language workflows.
Pro-Russia Hacktivists Target Critical Infrastructure with Low-Sophistication Attacks
Pro-Russia hacktivist groups are conducting opportunistic, low-sophistication cyberattacks against U.S., UK, and global critical infrastructure. These attacks target a wide range of sectors, including water treatment facilities, food production, energy systems, and local government bodies, using easily repeatable methods. The groups exploit minimally secured, internet-facing virtual network computing (VNC) connections to gain unauthorized access to operational technology (OT) control devices. The joint advisory from CISA, FBI, NSA, and global partners, along with a recent warning from the UK National Cyber Security Centre (NCSC), urges immediate action to mitigate these threats. The advisory highlights the use of basic methods to target supervisory control and data acquisition (SCADA) networks, sometimes combined with DDoS attacks. The cumulative impact of these activities poses a persistent and disruptive threat to essential services. According to a new report, groups such as Cyber Army of Russia Reborn (CARR), Z-Pentest, NoName057(16), and Sector16 are using simple reconnaissance tools and common password-guessing techniques to reach internet-facing human-machine interfaces. These groups have led to physical impacts in some cases, including temporary loss of view and costly manual recovery efforts. The NCSC warns of continued malicious activity from Russian-aligned hacktivist groups targeting critical infrastructure and local government organizations in the UK with disruptive denial-of-service (DDoS) attacks. The NCSC notes that NoName057(16) operates the DDoSia project, a platform that allows volunteers to contribute computing resources to carry out crowdsourced DDoS attacks and receive monetary rewards or recognition from the community. Operation Eastwood disrupted NoName057(16)'s activity in mid-July 2025 by arresting two members of the group, issuing eight arrest warrants, and taking down 100 servers. Despite these efforts, the group has returned to action, highlighting the evolving threat they pose.