Sandworm behind cyberattack on Poland's power grid in late 2025
In late 2025, Poland's energy system was targeted by a major cyberattack, now attributed to the Russia-aligned APT group Sandworm by ESET Research. The attack involved data-wiping malware named DynoWiper, detected as Win32/KillFiles.NMO. While the full impact is still under investigation, researchers noted the attack's timing coincided with the 10th anniversary of Sandworm's 2015 attack on Ukraine's power grid. Sandworm continues to target critical infrastructure, particularly in Ukraine, with regular wiper attacks. The group's history of disruptive cyberattacks and the similarities in tactics, techniques, and procedures led to a medium-confidence attribution of this latest incident to Sandworm.
AI Analysis
Technical Summary
The cyberattack on Poland's power grid in late 2025 has been attributed with medium confidence to Sandworm, a Russia-aligned advanced persistent threat (APT) group known for targeting critical infrastructure. The attack involved the deployment of DynoWiper, a destructive malware variant classified as Win32/KillFiles.NMO, designed to irreversibly wipe data from infected systems. This malware's destructive nature aims to disrupt operational continuity by erasing critical files and system components, thereby impacting both data integrity and availability. The timing of the attack aligns with the 10th anniversary of Sandworm's 2015 cyberattack on Ukraine's power grid, suggesting a symbolic and strategic motive. Sandworm's tactics, techniques, and procedures (TTPs) in this campaign include the use of wiper malware, lateral movement, and system disruption techniques consistent with MITRE ATT&CK IDs T1561 (Disk Wipe), T1489 (Service Stop), T1565 (Data Manipulation), T1486 (Data Encrypted for Impact), and T1490 (Inhibit System Recovery). Although the full scope of the attack's impact is still under investigation, the campaign underscores Sandworm's persistent targeting of energy sector infrastructure in Eastern Europe. No known public exploits or patches are currently available for DynoWiper, complicating mitigation efforts. The attack demonstrates the evolving threat landscape where destructive cyber operations threaten national critical infrastructure, emphasizing the need for robust detection, incident response, and resilience strategies. The malware hash indicator (4ec3c90846af6b79ee1a5188eefa3fd21f6d4cf6) has been shared for detection purposes. This incident highlights the ongoing geopolitical cyber conflict involving Russia-aligned actors and European critical infrastructure.
Potential Impact
The attack on Poland's power grid by Sandworm using DynoWiper poses significant risks to the confidentiality, integrity, and availability of critical energy infrastructure systems. The destructive nature of the wiper malware can cause prolonged outages by erasing essential system files and data, potentially leading to blackouts or degraded power delivery. For European organizations, especially those in the energy sector, this represents a direct threat to operational continuity and national security. Disruption of power grids can cascade into other critical services such as healthcare, transportation, and communications, amplifying societal and economic impacts. The attack also signals a heightened risk of similar campaigns targeting other European countries with interconnected or similarly structured energy systems. Furthermore, the use of sophisticated APT tactics complicates detection and response, increasing the likelihood of successful infiltration and damage. The geopolitical context, with Russia-aligned actors focusing on Eastern Europe, elevates the threat level for countries in proximity or with strategic ties to Poland and Ukraine. This incident may also erode trust in digital infrastructure and necessitate increased investment in cybersecurity resilience across European critical sectors.
Mitigation Recommendations
1. Implement advanced endpoint detection and response (EDR) solutions capable of identifying wiper malware behaviors, including unusual file deletion and disk wiping activities. 2. Conduct regular and immutable backups of critical systems and data, ensuring offline or air-gapped storage to enable recovery from destructive attacks. 3. Harden network segmentation within energy infrastructure to limit lateral movement opportunities for attackers. 4. Deploy strict access controls and multi-factor authentication (MFA) for all operational technology (OT) and IT systems to reduce the risk of credential compromise. 5. Monitor for indicators of compromise (IOCs) such as the known DynoWiper hash (4ec3c90846af6b79ee1a5188eefa3fd21f6d4cf6) and related TTPs aligned with Sandworm activity. 6. Establish and regularly test incident response plans specifically addressing wiper malware scenarios and critical infrastructure disruptions. 7. Collaborate with national cybersecurity centers and share threat intelligence to stay updated on emerging threats and mitigation strategies. 8. Conduct threat hunting exercises focusing on MITRE ATT&CK techniques used by Sandworm, including T1561, T1489, T1565, T1486, and T1490. 9. Ensure OT systems have the latest security patches and firmware updates where applicable, despite no known public exploits, to reduce attack surface. 10. Increase employee awareness and training on spear-phishing and social engineering tactics commonly used by APT groups to gain initial access.
Affected Countries
Poland, Ukraine, Germany, Czech Republic, Slovakia, Lithuania
Indicators of Compromise
- hash: 4ec3c90846af6b79ee1a5188eefa3fd21f6d4cf6
Sandworm behind cyberattack on Poland's power grid in late 2025
Description
In late 2025, Poland's energy system was targeted by a major cyberattack, now attributed to the Russia-aligned APT group Sandworm by ESET Research. The attack involved data-wiping malware named DynoWiper, detected as Win32/KillFiles.NMO. While the full impact is still under investigation, researchers noted the attack's timing coincided with the 10th anniversary of Sandworm's 2015 attack on Ukraine's power grid. Sandworm continues to target critical infrastructure, particularly in Ukraine, with regular wiper attacks. The group's history of disruptive cyberattacks and the similarities in tactics, techniques, and procedures led to a medium-confidence attribution of this latest incident to Sandworm.
AI-Powered Analysis
Technical Analysis
The cyberattack on Poland's power grid in late 2025 has been attributed with medium confidence to Sandworm, a Russia-aligned advanced persistent threat (APT) group known for targeting critical infrastructure. The attack involved the deployment of DynoWiper, a destructive malware variant classified as Win32/KillFiles.NMO, designed to irreversibly wipe data from infected systems. This malware's destructive nature aims to disrupt operational continuity by erasing critical files and system components, thereby impacting both data integrity and availability. The timing of the attack aligns with the 10th anniversary of Sandworm's 2015 cyberattack on Ukraine's power grid, suggesting a symbolic and strategic motive. Sandworm's tactics, techniques, and procedures (TTPs) in this campaign include the use of wiper malware, lateral movement, and system disruption techniques consistent with MITRE ATT&CK IDs T1561 (Disk Wipe), T1489 (Service Stop), T1565 (Data Manipulation), T1486 (Data Encrypted for Impact), and T1490 (Inhibit System Recovery). Although the full scope of the attack's impact is still under investigation, the campaign underscores Sandworm's persistent targeting of energy sector infrastructure in Eastern Europe. No known public exploits or patches are currently available for DynoWiper, complicating mitigation efforts. The attack demonstrates the evolving threat landscape where destructive cyber operations threaten national critical infrastructure, emphasizing the need for robust detection, incident response, and resilience strategies. The malware hash indicator (4ec3c90846af6b79ee1a5188eefa3fd21f6d4cf6) has been shared for detection purposes. This incident highlights the ongoing geopolitical cyber conflict involving Russia-aligned actors and European critical infrastructure.
Potential Impact
The attack on Poland's power grid by Sandworm using DynoWiper poses significant risks to the confidentiality, integrity, and availability of critical energy infrastructure systems. The destructive nature of the wiper malware can cause prolonged outages by erasing essential system files and data, potentially leading to blackouts or degraded power delivery. For European organizations, especially those in the energy sector, this represents a direct threat to operational continuity and national security. Disruption of power grids can cascade into other critical services such as healthcare, transportation, and communications, amplifying societal and economic impacts. The attack also signals a heightened risk of similar campaigns targeting other European countries with interconnected or similarly structured energy systems. Furthermore, the use of sophisticated APT tactics complicates detection and response, increasing the likelihood of successful infiltration and damage. The geopolitical context, with Russia-aligned actors focusing on Eastern Europe, elevates the threat level for countries in proximity or with strategic ties to Poland and Ukraine. This incident may also erode trust in digital infrastructure and necessitate increased investment in cybersecurity resilience across European critical sectors.
Mitigation Recommendations
1. Implement advanced endpoint detection and response (EDR) solutions capable of identifying wiper malware behaviors, including unusual file deletion and disk wiping activities. 2. Conduct regular and immutable backups of critical systems and data, ensuring offline or air-gapped storage to enable recovery from destructive attacks. 3. Harden network segmentation within energy infrastructure to limit lateral movement opportunities for attackers. 4. Deploy strict access controls and multi-factor authentication (MFA) for all operational technology (OT) and IT systems to reduce the risk of credential compromise. 5. Monitor for indicators of compromise (IOCs) such as the known DynoWiper hash (4ec3c90846af6b79ee1a5188eefa3fd21f6d4cf6) and related TTPs aligned with Sandworm activity. 6. Establish and regularly test incident response plans specifically addressing wiper malware scenarios and critical infrastructure disruptions. 7. Collaborate with national cybersecurity centers and share threat intelligence to stay updated on emerging threats and mitigation strategies. 8. Conduct threat hunting exercises focusing on MITRE ATT&CK techniques used by Sandworm, including T1561, T1489, T1565, T1486, and T1490. 9. Ensure OT systems have the latest security patches and firmware updates where applicable, despite no known public exploits, to reduce attack surface. 10. Increase employee awareness and training on spear-phishing and social engineering tactics commonly used by APT groups to gain initial access.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.welivesecurity.com/en/eset-research/eset-research-sandworm-cyberattack-poland-power-grid-late-2025"]
- Adversary
- Sandworm
- Pulse Id
- 6973fa6df457081a422f550e
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash4ec3c90846af6b79ee1a5188eefa3fd21f6d4cf6 | — |
Threat ID: 6973fed44623b1157c688627
Added to database: 1/23/2026, 11:05:56 PM
Last enriched: 1/23/2026, 11:20:45 PM
Last updated: 2/6/2026, 5:11:34 AM
Views: 373
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Hundreds of Malicious Crypto Trading Add-Ons Found in Moltbot/OpenClaw
MediumThe Godfather of Ransomware? Inside Cartel Ambitions
MediumAI-assisted cloud intrusion achieves admin access in 8 minutes
MediumPunishing Owl Attacks Russia: A New Owl in the Hacktivists' Forest
MediumThe Chrysalis Backdoor: A Deep Dive into Lotus Blossom's toolkit
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.