Thursday 30 April, 2026
[email protected]
Resilience Media
  • About
  • News
  • Resilience Conference
    • Resilience Conference Warsaw 2026
    • Resilience Conference Copenhagen 2026
    • Resilience Conference London 2026
  • Guest Posts
    • Author a Post
  • Subscribe
No Result
View All Result
  • About
  • News
  • Resilience Conference
    • Resilience Conference Warsaw 2026
    • Resilience Conference Copenhagen 2026
    • Resilience Conference London 2026
  • Guest Posts
    • Author a Post
  • Subscribe
No Result
View All Result
Resilience Media
No Result
View All Result

Report maps Russia’s hybrid war on Poland

John BiggsbyJohn Biggs
April 30, 2026
in News
Share on Linkedin

A new report from Defence24 has outlined the role of Russia in a number of cyberattacks and acts of sabotage. The report calls this “Phase 0” of a full war between the countries and outlines how Russia is testing “methods and tools” for future hybrid attacks.

You Might Also Like

Spiral Hydrogen raises €2.7M to pilot its new hydrogen tech at the Port of Rotterdam

Report: Europe’s reliance on imported energy and technology presents both risk and opportunity

Inside the case of Roark Aerospace: The British defence unicorn no one can verify

“Poland has long been one of the primary targets of Russian hybrid operations,” wrote study author Aleksander Olech. “This has been a pattern that predates Russia’s aggression against Georgia in 2008 and Ukraine in 2014. It is important to stress, however, that the frequency of these attacks has increased dramatically since 2022, coinciding with Poland’s transformation into the main logistical hub for assistance to Kyiv.” 

qKVcDSy1DTR8Qd3EcQ8OeRjXBgKYydvH4RVMTsGc.7gav.png

The report lays out a pattern of hybrid attacks that sit just “below the threshold of war.” These attacks include sabotage, arson, and supply chain disruption in addition to standard cyberattacks that cannot be attributed to any particular enemy.

From the report: 

A variety of tools are used in these operations – from the exploitation of migration, as in the crisis on the Polish-Belarusian border, where migrants were used as a tool for political pressure and to test the state’s response, to intensive disinformation operations such as “Doppelgänger” and “Matryoshka”. The above-mentioned operations involved impersonating the media and discrediting fact-checking institutions, as well as acts of physical sabotage, including arson attacks on industrial and logistics facilities, carried out by individuals recruited by Russian intelligence. In addition, activities in cyberspace are an important component, ranging from massive DDoS2 attacks on government and infrastructure websites (as in the cases of Polish State Railways or the Polish Press Agency) to advanced data-theft operations involving military and personal data. All these actions are part of a coordinated hybrid strategy aimed at paralysing the functioning of the state, causing social chaos, weakening morale, and testing the limits of Poland’s resilience as a member of NATO and the European Union.

Fire and Mayhem

The first and most visible “Phase 0” tactic comes in the form of incursions by migrants on the border between Belarus and its Western neighbors. These crossings have been characterized as a form of hybrid warfare in which Russian-aligned Belarusian authorities sent countless migrants over the border in an effort to destabilize the Polish military and border patrol.

The report details efforts to push migrants across the Polish-Belarusian border, calling it a “demographic weapon” used to “destabilise the internal situation” and test state response. The tactics have evolved. Authorities found tunnels, ladders, and coordinated crossings, including one case where nearly 200 people entered Poland through a single tunnel.

“For example, on 11 December 2025, a tunnel was discovered near the town of Narewka. Its entrance was in the forest on the Belarusian side. It is estimated that 183 people entered Poland through it,” wrote the authors. “Another way to bypass the barrier is to use folding ladders with a boom and a several-meter-long rope, and to destroy a section of the infrastructure with a chainsaw or grinder.”

Interestingly, the move only pushed the Polish authorities to lock down the Belarusian border, resulting in “only 158 attempts to illegally cross the border [versus] 3,306 in the same period in 2022,” a drop of nearly 96 percent according to Euro.news.

Arson shows up repeatedly as a tactic. These attacks are often carried out by recruited individuals with little direct connection to the state directing them, which makes them harder to trace and easier to repeat. The report notes that “most acts of sabotage currently cause limited damage… [but] the scale of destruction will continue to grow.” 

In 2024, a Belarusian identified as Stepan K set fire to an OBI DIY store. The blaze, which Stepan allegedly set overnight, happened on April 14, 2024 and resulted in €830,000 in losses. Another fire on May 12, 2024, this time at a shopping center called Marywilska 44, appears to also have been set by Russian operatives.

“We now know for certain that the massive fire on Marywilska was the result of arson commissioned by Russian services,” Polish Prime Minister Donald Tusk wrote on X. “The actions were coordinated by a person residing in Russia. Some of the perpetrators are already in custody, while the rest have been identified and are being sought. We will catch them all!”

Saboteurs have attacked Poland’s Baltic neighbors, including torching IKEA stores in Vilnius and Riga. 

Rail infrastructure is another target. The report references “acts of diversion on Polish railways” as part of a wider campaign.  The report cites “massive DDoS attacks on government and infrastructure websites… as in the cases of Polish State Railways or the Polish Press Agency.” In 2023, for example, assailants used cheap devices to order a “radio stop” for the Polish PKP railways, resulting in a traffic shutdown. According to Wired, the “saboteurs reportedly interspersed the commands they used to stop the trains with the Russian national anthem and parts of a speech by Russian President Vladimir Putin.”

Some of the most unsettling examples sit at the edge of war. The report describes incidents involving drones and airspace violations, including “crashes of unmanned aerial vehicles… on NATO territory” and the risk that these could escalate into “damage to critical infrastructure.”

The Canary of Europe

Espionage cases show how deep this runs. Individuals are recruited through social media, criminal networks, even video games. Payment can be as low as a few dollars for graffiti or as high as “$10,000 for serious crimes such as murder.” Russian operatives allegedly use promises of work, propaganda, and even blackmail to convince saboteurs to take part in efforts to destabilize the country.

“Those recruited are usually young men with a background in the military or other paramilitary organisations, often with links to the criminal underworld. It should be noted that Russia consistently uses non-state actors (individuals, entities, groups, etc.) as tools to carry out hybrid activities, allowing it to conduct proxy operations below the threshold of open warfare while maintaining the ability to deny state involvement,” write the authors.  “Dozens of activities carried out by private entities and unrelated groups, such as sabotage of military and industrial infrastructure, acts of diversion on Polish railways, disinformation campaigns, cyberattacks, arson, drone flights, and weapons transfers, are not isolated incidents, but elements of a single, larger scheme of operations carried out by the Russian services.”

There are also direct information operations that blend into physical effects. One 2020 example involved a hack of a military university website, where attackers posted a fake letter urging soldiers to rebel and framing NATO forces as occupiers. These propaganda and disinformation attacks point to a larger trend of online media that targets undereducated Poles with admonitions to repel immigrants and to create a populist government in the MAGA vein. And things aren’t slowing down.

These attacks point to a single goal: the destabilization of the EU and NATO. In light of U.S. turmoil thanks to confounding and confusing presidential statements in addition to these attacks on a sovereign nation, all signs point to similar flare ups in other Western countries which could push “Phase 0” to “Phase 1.”

The report concludes:

A buildup of Russian activity marked the year 2025 and, at the same time, demonstrates that the Kremlin is capable of deploying a wide range of tools and sophisticated methods. It is expected that there will be even more hybrid attacks in 2026. The Russian Federation wants to prove at all costs that it can “hurt” a NATO country and will not suffer any real consequences for doing so.

Poland remains resilient in the face of these attacks but their concern is palpable. According to an anonymous Polish military officer, quoted in the report, “We do not realise how much will change in Poland after a single terrorist attack with casualties, carried out as part of hybrid operations by the Russian Federation. The fact that we have managed to avoid such a situation over the last few years is due to several factors. One of them is working across divisions, overcoming a silo mentality in the security sector, countering defeatism in cooperation between theorists and practitioners, and most importantly, thanks to the power of a network of people totally devoted to serving Poland, whom we consider to be the silent heroes of this story.”

Tags: defencePolandReports
Previous Post

China’s quantum five-year plan is a wake-up call

Next Post

Spiral Hydrogen raises €2.7M to pilot its new hydrogen tech at the Port of Rotterdam

John Biggs

John Biggs

John Biggs is an entrepreneur, consultant, writer, and maker. He spent fifteen years as an editor for Gizmodo, CrunchGear, and TechCrunch and has a deep background in hardware startups, 3D printing, and blockchain. His work has also appeared in Men’s Health, Wired, and the New York Times. He has written nine books including the best book on blogging, Bloggers Boot Camp, and a book about the most expensive timepiece ever made, Marie Antoinette’s Watch. He lives in Brooklyn, New York. He runs the Keep Going podcast, a podcast about failure. His goal is to share how even the most confident and successful people had to face adversity.

Related News

Spiral Hydrogen raises €2.7M to pilot its new hydrogen tech at the Port of Rotterdam

Spiral Hydrogen raises €2.7M to pilot its new hydrogen tech at the Port of Rotterdam

byFiona Alston
April 30, 2026

Estonian-Dutch dual-use startup Spiral Hydrogen will be taking its centrifugal bubble-free electrolysis technology from the lab to the Port of...

Line illustration showing trucks, cars and a cyclist, alongside a wind turbine, solar panel, power lines, buildings and a data centre, depicting energy infrastructure

Report: Europe’s reliance on imported energy and technology presents both risk and opportunity

byPaul Sawers
April 29, 2026

Europe’s reliance on external technology and infrastructure faces growing scrutiny, as policymakers and industry leaders confront the risks of depending...

Weekly Digest: The mystery of the British unicorn – the story of our dealings with Roark Aerospace

Inside the case of Roark Aerospace: The British defence unicorn no one can verify

byIngrid Lunden
April 28, 2026

On Boxing Day 2025, we received a press release from Roark Aerospace. The UK startup, which makes anti-drone systems, reported...

German military uniform (Touko Aikioniemi from Unsplash)

Europe’s armed forces are too reliant on US cloud providers, report finds

byPaul Sawers
April 28, 2026

Europe’s defence systems depend heavily on US cloud infrastructure, leaving key military functions exposed to potential service disruptions during geopolitical...

UNIVITY raises €27 million to build a 5G satellite constellation that can expand European communication networks

UNIVITY raises €27 million to build a 5G satellite constellation that can expand European communication networks

byJohn Biggs
April 24, 2026

UNIVITY has raised €27 million to transition its space-based telecom infrastructure from a demonstration phase to an early industrial stage....

Jacek Siewiera: a future NATO conflict will be fought against civilian targets

Jacek Siewiera: a future NATO conflict will be fought against civilian targets

byResilience Media
April 24, 2026

The wars in Iran and Ukraine have underscored how civilian infrastructure will become a feature of future conflicts. And Poland’s...

Sten Tamkivi: Poland’s defence start-ups should be seen as future GDP drivers

Sten Tamkivi: Poland’s defence start-ups should be seen as future GDP drivers

byResilience Media
April 24, 2026

Sten Tamkivi, a partner at Plural and an early Skype executive, joined Resilience Media publisher Leslie Hitchcock on stage during...

Where are Poland’s defence unicorns?

Where are Poland’s defence unicorns?

byResilience Media
April 24, 2026

"Where are the Polish unicorns in defence?" asked Marcin Hejka, managing partner at OTB Ventures, one of Poland's largest deep-tech...

Load More
Next Post
Spiral Hydrogen raises €2.7M to pilot its new hydrogen tech at the Port of Rotterdam

Spiral Hydrogen raises €2.7M to pilot its new hydrogen tech at the Port of Rotterdam

Most viewed

InVeris announces fats Drone, an integrated, multi-party drone flight simulator

Uforce raises $50M at a $1B+ valuation to build defence tech for Ukraine

Auterion, the drone software startup, eyes raising $200M at a $1.2B+ valuation

Senai exits stealth to help governments harness online video intelligence

Palantir and Ukraine’s Brave1 have built a new AI “Dataroom”

Twentyfour Industries emerges from stealth with $11.8M for mass-produced drones

Resilience Media is an independent publication covering the future of defence, security, and resilience. Our reporting focuses on emerging technologies, strategic threats, and the growing role of startups and investors in the defence of democracy.

  • About
  • News
  • Resilence Conference
    • Resilience Conference Copenhagen 2026
    • Resilience Conference Warsaw 2026
    • Resilience Conference 2026
  • Guest Posts
  • Subscribe
  • Privacy Policy
  • Terms & Conditions

© 2026 Resilience Media

No Result
View All Result
  • Home
  • Subscribe
  • About
  • Events
  • Guest Posts
  • Interview
  • News
  • Resilience Conference London 2026
  • Resilience Conference Copenhagen 2026
  • Resilience Conference Warsaw 2026
  • Startups
  • Venture
  • Weekly Digest

© 2026 Resilience Media

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.