New DynoWiper Malware Targets Polish Power Sector in Sandworm Attack

Published:

spot_img

Major Cyber Attack on Poland’s Power System by Sandworm

Background of the Attack

In late December 2025, Poland faced what has been characterized as one of the most significant cyber assaults on its electrical infrastructure. Attributed to the Russian hacking group known as Sandworm, this incident raised considerable alarm over the security of critical systems within the country. Energy Minister Milosz Motyka confirmed that, although the attack did not succeed, it represented a serious threat to the nation’s energy grid.

Unfolding Events

On December 29, 2025, two combined heat and power (CHP) plants and a system managing electricity from renewable sources were specifically targeted. This raised suspicions of a concerted effort by groups linked to Russian state services. Prime Minister Donald Tusk emphasized the seriousness of the incident and announced that additional security measures were forthcoming. This included proposed cybersecurity legislation aimed at tightening regulations around risk management and the protection of both information and operational technology systems.

Technical Details of the Attack

The cybersecurity research firm ESET provided insights into the attack, revealing that it involved a previously unknown wiper malware dubbed DynoWiper. This malware was linked to previous operations by Sandworm, particularly following Russia’s military involvement in Ukraine starting in February 2022. ESET reported that, despite the sophistication of the attack, there was no evidence indicating successful disruption of services.

Historical Context

Interestingly, the timing of this attack coincided with the tenth anniversary of a notorious incident in December 2015 when Sandworm successfully targeted Ukraine’s power grid. That earlier attack, utilizing BlackEnergy malware, caused widespread power outages affecting over 230,000 residents in Ivano-Frankivsk for several hours. Such historical precedents add weight to the ongoing concerns about Sandworm’s persistent threat to critical infrastructure.

A Continued Threat

ESET noted that Sandworm has a well-documented history of launching aggressive cyber operations against Ukraine’s key infrastructure. In June 2025, Cisco Talos reported that a previously unseen malware, termed PathWiper, was used to target a critical infrastructure entity in Ukraine. This malware showed functional similarities to Sandworm’s HermeticWiper, hinting at a growing arsenal of disruptive tools.

Broader Impacts and Reactions

Since June 2025, Sandworm’s activities have extended to various sectors within Ukraine, including government, energy, logistics, and agriculture. Notable cases involved the deployment of several data-wiping malware variants aimed at crippling networks and services essential for these sectors. This trajectory highlights the ongoing risk not just for Poland but for countries with critical infrastructure.

Government Response

In response to this alarming event, the Polish government is committed to enhancing its cybersecurity framework. The impending legislation aims to enforce stricter requirements for risk management and incident response protocols. Such measures are critical as cyber threats continue to evolve, and nations must remain vigilant to protect their essential services.

Conclusion

As new threats emerge in the ever-changing landscape of cybersecurity, the incident involving Sandworm serves as a reminder of the vulnerabilities inherent in critical infrastructure. Continuous adaptation and proactive measures are essential for safeguarding against potential attacks that could have severe consequences for national security and public safety.

spot_img

Related articles

Recent articles

Leaked iPhone Hacking Tool Hits Dark Web: Government Resource in the Hands of Cyber Criminals

Cybersecurity Alert: Hacking Toolkit Coruna Falls into Criminal Hands In a troubling development, security researchers have revealed that a sophisticated hacking toolkit, initially linked to...

149 DDoS Attacks Target 110 Organizations Across 16 Countries in Wake of Middle East Conflict

Surge in Hacktivist Activity Amid U.S.-Israel Military Actions Recent developments in cybersecurity have raised alarms among experts regarding a notable uptick in hacktivist operations. This...

Ajman Ruler Enacts Law for Managing Lost and Abandoned Property

New Law on Lost and Abandoned Property in Ajman Introduction of Law No. (2) of 2026 His Highness Sheikh Humaid bin Rashid Al Nuaimi, the Ruler...

Mobile Banking Evolution: Access Your CIBIL Score Instantly

New Delhi | The digital banking landscape in India is evolving at an astonishing pace, significantly altering how customers interact with their financial institutions....