Thursday 12 February, 2026
[email protected]
Resilience Media
  • About
  • News
  • Resilience Conference
    • Resilience Conference Warsaw 2026
    • Resilience Conference Copenhagen 2026
    • Resilience Conference London 2026
  • Guest Posts
    • Author a Post
  • Subscribe
No Result
View All Result
  • About
  • News
  • Resilience Conference
    • Resilience Conference Warsaw 2026
    • Resilience Conference Copenhagen 2026
    • Resilience Conference London 2026
  • Guest Posts
    • Author a Post
  • Subscribe
No Result
View All Result
Resilience Media
No Result
View All Result

Poland’s energy networks hit by ‘digital arson’ after basic firewall failures, report finds

CERT Polska’s technical analysis shows how attackers exploited weak remote access controls to disrupt wind, solar, and heat generation sites in a coordinated campaign last December

Carly PagebyCarly Page
February 2, 2026
in News
white windmills
Share on Linkedin

CERT Polska has described December’s cyberattack on Poland’s energy sector as an act of “digital arson.” A report from the government group, which provides emergency response to IT-related incidents, reveals that — contrary to earlier reports that attributed the cyberattack to sophisticated zero-day exploits — attackers gained access through a much more straightforward route: exposed firewalls with no multi-factor authentication.

You Might Also Like

Dronamics partners with HENSOLDT to build a heavy defence drone with 24-hour endurance

Estonia needs to stay on guard, says Estonian Foreign Intelligence Service

Germany awards Stark and Helsing contracts to deliver next-generation strike drones

The report offers the clearest technical account yet of what happened on 29 December, when multiple energy and industrial sites across Poland were hit in a coordinated campaign that prioritised destruction over disruption.

At least 30 wind and solar installations were affected, along with a large combined heat and power plant that supplies heat to hundreds of thousands of homes and a manufacturing company.

While electricity generation continued, operators temporarily lost remote visibility and control at several sites after attackers deliberately severed communications and damaged operational systems.

According to CERT Polska, the attackers didn’t weaponise a zero-day or exploit a supply chain; they walked in through internet-facing firewalls and VPNs that lacked multi-factor authentication and, in some cases, weak or reused passwords.

That access was sufficient to move laterally into internal systems and onward to operational technology that should never have been reachable from the public internet.

CERT Polska says the attackers moved quickly from access to damage, attempting to corrupt firmware, delete data, and disable remote terminal units responsible for monitoring and control. There was no indication of espionage or data theft, only deliberate destruction.

An analysis published by industrial cybersecurity firm Dragos provides additional context on the incident, particularly regarding the selection of targets.

Dragos researchers described the operation as “the first major cyberattack targeting distributed energy resources,” warning that wind farms, solar installations, and other decentralised assets present a growing and under-secured attack surface. Unlike traditional power plants, these sites are often designed for remote management at scale, using standardised hardware and configurations that make them efficient to run but easier to compromise en masse.

That assessment helps explain the attackers’ apparent focus. According to Dragos, once the adversary worked out how to access one site, the same approach could be replicated across many others using similar equipment. The result was a broad, coordinated impact that did not bring down the national grid but knocked out monitoring and control at dozens of locations simultaneously. Some equipment was damaged severely enough to require manual intervention and replacement, resulting in a longer recovery effort.

On attribution, CERT Polska diverges from some earlier assessments.

While ESET and Dragos linked the attacks to Sandworm, the Russia-backed group notorious for physically destructive attacks, CERT Polska’s analysis of the attack infrastructure found a high degree of overlap with activity publicly tracked under names such as “Berserk Bear” and “Dragonfly”, two other Russia-backed groups. It describes this as the first publicly documented case of destructive activity attributed to that group, which is better known for traditional cyberespionage.

Perhaps the most uncomfortable takeaway from the CERT Polska report is how preventable much of the intrusion appears to have been. The attack didn’t succeed because of sophisticated tradecraft, but because basic safeguards were missing. Multi-factor authentication, proper segmentation, and stricter controls on exposed devices would have significantly complicated operations, rather than leaving critical systems easy to reach.

We have reached out to industry sources for reaction and will update this post as we learn more.

Tags: cyberattackCybersecurityPolandRussiasandwormsecurity
Previous Post

The second valley of death

Next Post

The future of fuel: A conversation with Tim Böltken of Ineratec

Carly Page

Carly Page

Carly Page is a freelance journalist and copywriter with 10+ years of experience covering the technology industry, and was formerly a senior cybersecurity reporter at TechCrunch. Bylines include Forbes, IT Pro, LeadDev, The Register, TechCrunch, TechFinitive, TechRadar, TES, The Telegraph, TIME, Uswitch, WIRED, & more.

Related News

Dronamics partners with HENSOLDT to build a heavy defence drone with 24-hour endurance

Dronamics partners with HENSOLDT to build a heavy defence drone with 24-hour endurance

byJohn Biggs
February 12, 2026

This week, Sofia-based Dronamics announced the launch of its Detect and Defend version of the Black Swan, a long range...

an aerial view of a snowy city at night

Estonia needs to stay on guard, says Estonian Foreign Intelligence Service

byFiona Alston
February 12, 2026

The Estonian Foreign Intelligence Service produced their 2026 public report this week. Main takeaways suggest Estonia is safe from a...

Stark inks Virtus deal with NATO member in Northern Europe, one week after expanding to Sweden

Germany awards Stark and Helsing contracts to deliver next-generation strike drones

byCarly Page
February 12, 2026

Germany is preparing to introduce loitering strike drones into frontline service after awarding contracts to two venture-backed defence startups linked...

Stanhope AI raises $8M for new approach of AI for physical applications

Stanhope AI raises $8M for new approach of AI for physical applications

byIngrid Lunden
February 12, 2026

A startup spun out of UCL research into how the brain works is building a new kind of AI model...

Wrecking-ball politics and the end of mutually-assured stability

Wrecking-ball politics and the end of mutually-assured stability

byJohn Biggs
February 11, 2026

In a new report from the Munich Security Conference, the message is blunt: wrecking-ball politics, led by a belligerent American...

Monitoring the next theater: Acua Ocean and the case for persistent naval drones

Monitoring the next theater: Acua Ocean and the case for persistent naval drones

byJohn Biggs
February 11, 2026

Mike Tinmouth, co-founder and COO of Acua Ocean, argues that the open ocean is becoming the next operational frontier. His...

aerial view of city buildings during sunset

European defence, security and resilience startups raised a record $8.7B in 2025

byIngrid Lunden
February 10, 2026

Ahead of the big Munich Security Conference later this week, the analysts at Dealroom teamed up with the NATO Innovation...

Hypersonica raises €23.3M to develop hypersonic missiles for Europe

Hypersonica raises €23.3M to develop hypersonic missiles for Europe

byIngrid Lunden
February 10, 2026

Hypersonic weapons — seen for years as a long-shot in defence — have been put back into the frame as...

Load More
Next Post
The future of fuel: A conversation with Tim Böltken of Ineratec

The future of fuel: A conversation with Tim Böltken of Ineratec

UK startup Refute secures £5M to take AI fight to disinformation campaigns

UK startup Refute secures £5M to take AI fight to disinformation campaigns

Most viewed

InVeris announces fats Drone, an integrated, multi-party drone flight simulator

Twentyfour Industries emerges from stealth with $11.8M for mass-produced drones

Harmattan AI raises $200M at a $1.4B valuation from Dassault

Senai exits stealth to help governments harness online video intelligence

Palantir and Ukraine’s Brave1 have built a new AI “Dataroom”

Ukraine says drone campaign logged nearly 820,000 verified strikes in 2025, with UAVs driving majority of battlefield interactions

Resilience Media is an independent publication covering the future of defence, security, and resilience. Our reporting focuses on emerging technologies, strategic threats, and the growing role of startups and investors in the defence of democracy.

  • About
  • News
  • Resilence Conference
    • Resilience Conference Copenhagen 2026
    • Resilience Conference Warsaw 2026
    • Resilience Conference 2026
  • Guest Posts
  • Subscribe
  • Privacy Policy
  • Terms & Conditions

© 2026 Resilience Media

No Result
View All Result
  • About
  • News
  • Resilence Conference
    • Resilience Conference Copenhagen 2026
    • Resilience Conference Warsaw 2026
    • Resilience Conference 2026
  • Guest Posts
  • Subscribe
  • Privacy Policy
  • Terms & Conditions

© 2026 Resilience Media

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.