Poland narrowly avoided a large-scale power outage after repelling a cyberattack targeting its energy grid on December 29-30, 2025. The attack—attributed to Russia’s Sandworm (GRU Unit 74455)—struck approximately 30 facilities and marks the first major cyberattack against distributed energy resources (DERs) worldwide.

Incident overview

AttributeDetails
Attack datesDecember 29-30, 2025
AttributionSandworm (APT44, GRU Unit 74455)
ConfidenceMedium (ESET)
Facilities compromised~30
Potential affected population500,000
Malware deployedDynoWiper, LazyWiper
OutcomeAttack repelled; no widespread outage
Physical damageSome equipment damaged beyond repair

Timeline

DateEvent
December 29-30, 2025Attack on Polish energy infrastructure
January 2026Polish PM Donald Tusk publicly blames Russia
January 15, 2026ESET publishes analysis attributing attack to Sandworm
January 2026Poland fast-tracks new cybersecurity legislation
January 2026Arrests of individuals suspected of Russian espionage

The attack occurred on the 10th anniversary of Sandworm’s 2015 attack on Ukraine’s power grid—the first-ever malware-facilitated blackout, which left 230,000 people without electricity.

Attack scope

According to Dragos, approximately 30 facilities were compromised:

Target TypeDetailsImpact
Wind farmsMultiple sitesOperational technology compromised
Solar farmsMultiple sitesRemote terminal units affected
Combined heat and power plantSupplies heat to ~500,000 customersCritical heating infrastructure
Private manufacturing companyUndisclosedIndustrial systems targeted
Remote terminal units (RTUs)Communication infrastructureEquipment damaged beyond repair

Attack outcome

MetricStatus
Power outagesNone (attack repelled)
Transmission systemNot affected
Physical damageEquipment at multiple sites damaged beyond repair
OT system accessAttackers gained access to operational technology
RecoveryOngoing at damaged facilities

Polish officials stated the attack could have affected 500,000 people if successful. Digital affairs minister confirmed Poland came “very close” to a blackout.

DynoWiper malware

ESET named the wiper malware DynoWiper (detected as Win32/KillFiles.NMO). A second variant, LazyWiper, was also deployed.

Technical characteristics

AttributeDetails
Primary purposeData destruction
Ransomware componentNone—pure destruction
Target systemsIT systems, recovery infrastructure
Destruction methodFile overwriting with random data
Reboot triggerForces system restart after wiping

Destruction mechanism

File sizeBehavior
≤16 bytesFully overwritten
>16 bytesPartial overwrite (speed optimization)
Final actionForced system reboot

The wiper uses a 16-byte buffer containing random data generated at execution start. Files larger than 16 bytes have only portions overwritten to speed up destruction.

Relationship to ZOV wiper

SimilarityDetails
Directory exclusionsSame logic for protected paths
File handlingSimilar small/large file processing
Previous deploymentZOV used against Ukrainian financial institution (November 2025)

DynoWiper operates in a broadly similar fashion to the ZOV wiper, suggesting shared development or tooling.

First-ever DER attack

Dragos described this as “the first major cyber attack targeting distributed energy resources (DERs), the smaller wind, solar, and [combined heat and power] facilities being added to grids worldwide.”

Why DERs are vulnerable

FactorRisk
Limited investmentSmaller facilities receive less security funding
Internet exposureRemote management creates attack surface
MisconfigurationsCommon in rapidly deployed renewable infrastructure
StaffingOften lack dedicated security personnel
IT/OT convergenceShared networks without segmentation

Physical damage confirmed

“While the attack did not result in power outages, adversaries gained access to operational technology systems critical to grid operations and disabled key equipment beyond repair at the site.”

This confirms that cyberattacks on energy infrastructure can cause permanent physical damage—not just operational disruption.

Attribution

ESET attributes the attack to Sandworm with medium confidence based on:

EvidenceDetails
Malware overlapStrong similarity to previous Sandworm wiper activity
Tactical patternsMatches Ukraine grid attack techniques
Target selectionConsistent with Russian strategic interests
TimingAnniversary of 2015 Ukraine blackout
Political contextPoland actively supporting Ukraine

Sandworm background

AttributeDetails
Also tracked asUAC-0113, APT44, Seashell Blizzard
AffiliationRussia’s GRU Military Unit 74455
Active sinceAt least 2009
Previous grid attacksUkraine 2015, 2016, 2022
SpecializationCritical infrastructure disruption

Previous Sandworm grid attacks

YearTargetOutcome
2015Ukraine power grid230,000 without power (first malware blackout)
2016Ukraine power gridOutages in Kyiv area
2022Ukraine power gridAttempted during Russian invasion
2025Poland power gridAttack repelled; equipment damaged

Polish Prime Minister Donald Tusk publicly blamed Russia for the attack.

Poland’s response

Immediate actions

ActionResult
Attack repelledNo widespread outage
Transmission protectedBackbone infrastructure secure
Incident responseRapid containment
Public attributionRussia blamed publicly

Legislative response

Poland is fast-tracking new cybersecurity legislation with requirements for:

RequirementPurpose
Enhanced risk managementMandatory security assessments
IT/OT system protectionSegmentation requirements
Incident response capabilitiesRapid response mandates
Critical infrastructure standardsElevated security baselines

Enforcement

Arrests of individuals suspected of involvement in Russian espionage rings have followed the attack.

Expert assessment

Dragos warning

“An attack on a power grid at any time is irresponsible, but to carry it out in the depths of winter is potentially lethal to the civilian population dependent on it.”

The timing—late December in Poland—maximized potential harm to civilian populations dependent on heating during winter.

Polish government response

“The systems we have in Poland today proved effective. At no point was critical infrastructure threatened, meaning the transmission networks and everything that determines the safety of the entire system.” — Prime Minister Donald Tusk

Implications for energy sector

For grid operators

PriorityAction
CriticalAssess DER security posture—smaller facilities are proven targets
CriticalAudit internet exposure—RTUs and communication systems shouldn’t be directly accessible
HighImplement IT/OT segmentation—wiper malware on IT shouldn’t affect operations
HighPlan for recovery without IT—attackers specifically targeted recovery capabilities
HighCoordinate with national authorities—state-sponsored attacks require government response

For policy makers

The Poland attack demonstrates:

FindingImplication
DERs expand attack surfaceRenewable deployment increases grid vulnerability
State actors target civiliansWinter attacks maximize harm potential
Physical damage possibleCyber can destroy equipment permanently
Investment gapDER security hasn’t kept pace with deployment

Detection indicators

IndicatorMeaning
DynoWiper file operationsActive wiper deployment
Win32/KillFiles.NMO detectionESET signature match
Forced reboots after file operationsWiper completing destruction cycle
RTU communication anomaliesCompromised remote terminal units
Unexpected IT system failuresPotential wiper activity

Recommendations

For energy infrastructure operators

PriorityAction
CriticalSegment DER facilities from central grid management
CriticalRemove direct internet exposure from OT systems
HighImplement offline backup and recovery capabilities
HighDeploy wiper-specific detection signatures
HighConduct tabletop exercises for destructive attacks
OngoingCoordinate with national cyber defense agencies

For governments

PriorityAction
CriticalMandate security standards for DER facilities
HighProvide threat intelligence to energy sector
HighFund security improvements for renewable infrastructure
OngoingInternational coordination on state-sponsored threats

Context

Sandworm’s targeting of Poland—a NATO member actively supporting Ukraine—fits the pattern of Russian cyber operations against nations opposing Russian interests. The attack’s timing on the anniversary of the 2015 Ukraine blackout appears deliberate.

The Poland attack represents a significant escalation: the first major cyberattack targeting distributed energy resources, with confirmed physical damage to equipment. As grids worldwide add wind, solar, and distributed generation, this attack surface will only grow.

Energy infrastructure worldwide should assume similar attacks are possible and plan accordingly. The combination of wiper malware, OT targeting, and winter timing demonstrates that state-sponsored actors are willing to risk civilian harm to achieve strategic objectives.