A series of well-planned cyberattacks targeted Poland's energy infrastructure This article explores energy infrastructure hackers. . Hackers targeted a private manufacturing company, a large combined heat and power (CHP) plant that serves almost half a million customers, and over thirty wind and photovoltaic farms during the morning and afternoon hours.
These assaults aimed purely at destruction, akin to digital arson, hitting during brutal low temperatures and snowstorms just before New Year’s. Although the attacks disrupted communications and remote controls, they were unable to stop the supply of heat or electricity, protecting end users from immediate danger. The incidents marked a rare hybrid assault on both IT networks and physical industrial devices, escalating beyond typical cyber espionage.
In a comprehensive report detailing the attack sequence and tactics, security researchers have called for increased vigilance against sabotage in vital sectors. This event underscores the growing threat to renewable energy grids, where automation devices form vulnerable hubs. Assault On Renewable Energy Farms Power substations, which are crucial grid connection points that channel energy from solar panels and wind turbines into Poland's distribution system, were the main targets.
These sites host critical industrial gear, including remote terminal units (RTUs) for telecontrol and monitoring, human-machine interfaces (HMIs) for status visualization, protection relays to guard against electrical faults, and communication tools like serial port servers, modems, routers, and switches. Hackers first infiltrated the internal networks of these substations.
They conducted thorough reconnaissance to map devices, then devised a destructive blueprint: corrupting controller firmware, wiping system files, and deploying custom wiper malware. This semi-automated sabotage plan activated on the morning of December 29. Communication with the distribution system operator (DSO) was severely hampered by damaged RTUs, making remote supervision and control impossible.
However, since core production processes were unaffected by the attacks, local energy generation continued uninterrupted. This precision targeting highlights attackers’ deep knowledge of operational technology (OT), blending IT exploits with physical-layer disruption a tactic seldom seen in prior incidents. Strike on Manufacturing Company and CHP Plant According to Cert, the CHP plant faced a stealthier threat. Following months of infiltration, attackers were able to move laterally throughout the network by seizing privileged accounts and stealing sensitive operational data.
They want to sabotage heat production by using wiper malware to permanently destroy data on internal devices. The payload was stopped before it could spread by endpoint detection and response (EDR) software. A manufacturing company was hit in parallel that same day.
It used the same wiper malware and synchronized timing with the main attacks, despite being opportunistic and unrelated to energy goals. Technical analysis reveals the malware’s sophistication, designed for mass file deletion and system paralysis.
Details of Malware Features Type Wiper (destructive payload) Method of Deployment Execution of privileged accounts post-infiltration Effects Firmware corruption, file deletion, network isolation Protections Observed Blocked by EDR at CHP plant The attacks are linked to the infamous threat cluster known as "Static Tundra" (Cisco), "Berserk Bear" (CrowdStrike), "Ghost Blizzard" (Microsoft), and "Dragonfly" (Symantec) due to compromised VPS servers, routers, traffic flows, and anonymization chains. This group has long fixated on energy sectors, boasting tools for OT disruption. Notably, this marks their first publicly documented destructive operation, shifting from espionage to outright sabotage.
As part of its response, Poland quickly isolated the impacted systems and conducted forensic investigations. No group has claimed responsibility, but the timing amid geopolitical tensions raises alarms.
Experts warn of copycat risks to Europe’s green energy push, where legacy OT devices often lack modern defenses. Network segmentation, firmware integrity checks, and EDR in OT environments should be given top priority by operators. A new era of cyber-physical warfare is heralded by this incident, necessitating robust defenses for critical infrastructure.
Set Cyberpress as a Preferred Source in Google












.webp%3Fw%3D1068%26resize%3D1068%2C0%26ssl%3D1&w=3840&q=75)