A failed cyberattack targeting Poland's energy grid in late December was attributed to Russian government hackers, according to a report released by cybersecurity firm ESET. The attack, which occurred on December 29 and 30, targeted two heat and power plants and attempted to disrupt communication links between renewable installations and power distribution operators, Polish Energy Minister Milosz Motyka told reporters last week.
The Polish government has blamed Moscow for the attempted disruption, which Motyka described as the "strongest attack on Poland's energy infrastructure in years." Local media outlets reported the attacks could have potentially knocked out heat and power for at least half a million homes.
ESET said it obtained a copy of the destructive malware used in the attack, which it named DynoWiper. The malware is designed to irreversibly destroy data on computers, rendering them inoperable. ESET attributed the malware with medium confidence to Sandworm, a hacking group believed to be a unit within Russia's military intelligence agency, the GRU. Sandworm has been linked to previous cyberattacks on energy infrastructure.
Wiper malware is a type of malicious software specifically designed to erase data, making recovery difficult or impossible. Its use in the Polish attack suggests an intent to cause significant disruption and damage, rather than simply stealing information.
The attribution to Sandworm, if confirmed, would align with previous accusations against Russia for targeting critical infrastructure in other countries. Russia has consistently denied involvement in such attacks.
The Polish government has not yet released specific details on its planned response to the attempted cyberattack. However, officials have emphasized the importance of strengthening cybersecurity defenses to protect critical infrastructure from future attacks. The incident highlights the ongoing vulnerability of energy grids to state-sponsored cyberattacks and the potential for significant disruption to civilian populations.
Discussion
Join the conversation
Be the first to comment