A failed cyberattack targeting Poland's energy grid in late December was attributed to Russian government hackers by cybersecurity firm ESET, which investigated the incident. The attack, which occurred on December 29 and 30, targeted two heat and power plants and attempted to disrupt communication links between renewable installations and power distribution operators, according to Polish Energy Minister Milosz Motyka.
Motyka described the incident as the most significant attack on Poland's energy infrastructure in recent years, with the Polish government placing blame on Moscow. Local media reports indicated that the attacks had the potential to leave at least half a million homes without heat and power.
ESET reported on Friday that it had obtained a copy of the destructive malware used in the attack, which it named DynoWiper. This type of malware, known as wiper malware, is designed to permanently destroy data on computers, rendering them inoperable. ESET assessed with medium confidence that the malware was the work of Sandworm, a hacking group believed to be a unit within Russia's military intelligence agency, GRU.
The attribution to Sandworm aligns with previous instances of energy grid disruptions linked to the group. Sandworm has been implicated in cyberattacks targeting Ukraine's power grid in 2015 and 2016, causing widespread blackouts.
The Polish government has not yet released specific details regarding its planned response to the attempted cyberattack. However, officials have emphasized the importance of strengthening cybersecurity measures to protect critical infrastructure. The incident underscores the ongoing threat of state-sponsored cyberattacks targeting essential services and infrastructure in Europe.
Discussion
Join the conversation
Be the first to comment