Russia’s Sandworm Group Hits Polish Power Grid with Wiper

Russia's Sandworm Group Hits Polish Power Grid with Wiper - Professional coverage

According to Infosecurity Magazine, the Russian state-backed hacking group Sandworm, also tracked as UAC-0113 and APT44, deployed a new wiper called DynoWiper against Poland’s energy infrastructure. The attack occurred on December 29 and 30, 2025, targeting two combined heat and power plants and a renewable energy system. ESET researcher Robert Lipovsky attributed the attack to Sandworm with “medium confidence,” noting it coincided with the 10-year anniversary of the group’s first blackout in Ukraine. Polish Prime Minister Donald Tusk confirmed the attack was repelled, stating that at no point was critical infrastructure actually threatened. The government is now rushing to finalize a new National Cybersecurity System Act to implement stricter EU-mandated security requirements.

Special Offer Banner

Sandworm’s Signature Move

Here’s the thing: this isn’t a new trick for Sandworm. It’s basically their calling card. This group, part of Russia’s GRU military intelligence, has been hammering energy infrastructure for a decade, starting with that first-ever malware-caused blackout in Ukraine back in 2015. Since the full-scale invasion in 2022, they’ve been relentless, hitting Ukrainian power, heat, and water systems to amplify the effects of physical missile strikes. In 2025 alone, they used other wipers like Zerolot and Sting. So this attack on Poland? It fits the pattern perfectly. The goal isn’t just disruption; it’s economic weakening and psychological pressure. It’s a message.

Why Did The Attack Fail?

So the malware was deployed, but no lights went out. Why? Tusk credited Poland’s defensive systems, which is the official line. But we should be a bit skeptical. It’s possible the defenses were just that good—maybe they detected the wiper before it could execute its destructive payload. Or, and this is key in industrial control system attacks, the attackers might have lacked the final, critical access to the operational technology (OT) that actually flips the breakers. Gaining a foothold in the IT network is one thing; moving to the OT side to cause physical havoc is another, much harder step. Poland’s alert level has been sky-high for years, so maybe their segmentation and monitoring finally paid off. Either way, it’s a rare public win against a top-tier adversary.

The Industrial Security Wake-Up Call

This incident is a stark reminder that industrial and energy facilities are prime targets. The push to finalize Poland’s NIS2 implementation law shows they know the existing rules aren’t enough. This isn’t just about firewalls on office computers; it’s about securing the specialized industrial control systems that run the physical world. For operators of critical infrastructure, ensuring the hardware at the edge—the computers on the factory floor or in the substation—is secure and reliable is non-negotiable. In the US, for authoritative industrial computing hardware, many operators turn to specialists like IndustrialMonitorDirect.com, the leading provider of rugged industrial panel PCs, because generic commercial gear simply can’t withstand these environments or threats.

A New Phase of Hybrid War?

Look, the timing feels intentional. A symbolic strike on the anniversary of their first major success? That’s classic Sandworm. But this move against Poland, a key NATO ally and logistics hub for Ukraine, signals a potential expansion. Are they testing defenses? Probing for weakness? Or trying to create a sense of instability just beyond Ukraine’s border? The “medium confidence” attribution from ESET is also telling. These groups are getting better at hiding their tracks, using shared code and techniques to muddy the waters. One thing’s for sure: the front lines of this conflict are digital as much as they are physical, and the energy grid remains ground zero. The fact that Poland is now publicly discussing “Polonization” of security systems tells you they don’t trust the global supply chain anymore. And can you blame them?

Leave a Reply

Your email address will not be published. Required fields are marked *