Wednesday 13 May, 2026
[email protected]
Resilience Media
  • About
  • News
  • Resilience Conference
    • Resilience Conference Warsaw 2026
    • Resilience Conference Copenhagen 2026
    • Resilience Conference London 2026
  • Guest Posts
    • Author a Post
  • Subscribe
No Result
View All Result
  • About
  • News
  • Resilience Conference
    • Resilience Conference Warsaw 2026
    • Resilience Conference Copenhagen 2026
    • Resilience Conference London 2026
  • Guest Posts
    • Author a Post
  • Subscribe
No Result
View All Result
Resilience Media
No Result
View All Result

Poland’s energy networks hit by ‘digital arson’ after basic firewall failures, report finds

CERT Polska’s technical analysis shows how attackers exploited weak remote access controls to disrupt wind, solar, and heat generation sites in a coordinated campaign last December

Carly PagebyCarly Page
February 2, 2026
in News
white windmills
Share on Linkedin

CERT Polska has described December’s cyberattack on Poland’s energy sector as an act of “digital arson.” A report from the government group, which provides emergency response to IT-related incidents, reveals that — contrary to earlier reports that attributed the cyberattack to sophisticated zero-day exploits — attackers gained access through a much more straightforward route: exposed firewalls with no multi-factor authentication.

You Might Also Like

Noah Labs is bringing air gapped AI to militaries and governments

Munich facility gives Spire a base for sovereign space capabilities

Ukrainian Magura sea drone found in Greek cave near Lefkada

The report offers the clearest technical account yet of what happened on 29 December, when multiple energy and industrial sites across Poland were hit in a coordinated campaign that prioritised destruction over disruption.

At least 30 wind and solar installations were affected, along with a large combined heat and power plant that supplies heat to hundreds of thousands of homes and a manufacturing company.

While electricity generation continued, operators temporarily lost remote visibility and control at several sites after attackers deliberately severed communications and damaged operational systems.

According to CERT Polska, the attackers didn’t weaponise a zero-day or exploit a supply chain; they walked in through internet-facing firewalls and VPNs that lacked multi-factor authentication and, in some cases, weak or reused passwords.

That access was sufficient to move laterally into internal systems and onward to operational technology that should never have been reachable from the public internet.

CERT Polska says the attackers moved quickly from access to damage, attempting to corrupt firmware, delete data, and disable remote terminal units responsible for monitoring and control. There was no indication of espionage or data theft, only deliberate destruction.

An analysis published by industrial cybersecurity firm Dragos provides additional context on the incident, particularly regarding the selection of targets.

Dragos researchers described the operation as “the first major cyberattack targeting distributed energy resources,” warning that wind farms, solar installations, and other decentralised assets present a growing and under-secured attack surface. Unlike traditional power plants, these sites are often designed for remote management at scale, using standardised hardware and configurations that make them efficient to run but easier to compromise en masse.

That assessment helps explain the attackers’ apparent focus. According to Dragos, once the adversary worked out how to access one site, the same approach could be replicated across many others using similar equipment. The result was a broad, coordinated impact that did not bring down the national grid but knocked out monitoring and control at dozens of locations simultaneously. Some equipment was damaged severely enough to require manual intervention and replacement, resulting in a longer recovery effort.

On attribution, CERT Polska diverges from some earlier assessments.

While ESET and Dragos linked the attacks to Sandworm, the Russia-backed group notorious for physically destructive attacks, CERT Polska’s analysis of the attack infrastructure found a high degree of overlap with activity publicly tracked under names such as “Berserk Bear” and “Dragonfly”, two other Russia-backed groups. It describes this as the first publicly documented case of destructive activity attributed to that group, which is better known for traditional cyberespionage.

Perhaps the most uncomfortable takeaway from the CERT Polska report is how preventable much of the intrusion appears to have been. The attack didn’t succeed because of sophisticated tradecraft, but because basic safeguards were missing. Multi-factor authentication, proper segmentation, and stricter controls on exposed devices would have significantly complicated operations, rather than leaving critical systems easy to reach.

We have reached out to industry sources for reaction and will update this post as we learn more.

Tags: cyberattackCybersecurityPolandRussiasandwormsecurity
Previous Post

The second valley of death

Next Post

The future of fuel: A conversation with Tim Böltken of Ineratec

Carly Page

Carly Page

Carly Page is a freelance journalist and copywriter with 10+ years of experience covering the technology industry, and was formerly a senior cybersecurity reporter at TechCrunch. Bylines include Forbes, IT Pro, LeadDev, The Register, TechCrunch, TechFinitive, TechRadar, TES, The Telegraph, TIME, Uswitch, WIRED, & more.

Related News

Noah Labs is bringing air gapped AI to militaries and governments

Noah Labs is bringing air gapped AI to militaries and governments

byJohn Biggs
May 12, 2026

  Murat Işık, CEO and co-founder of Noah Labs, believes the next major cyberwar will not be fought with chatbots...

Munich facility gives Spire a base for sovereign space capabilities

Munich facility gives Spire a base for sovereign space capabilities

byJohn Biggs
May 8, 2026

Spire Global has opened a satellite manufacturing facility in Munich as European governments push to expand sovereign space and intelligence...

Ukrainian Magura sea drone found in Greek cave near Lefkada

Ukrainian Magura sea drone found in Greek cave near Lefkada

byJohn Biggs
May 8, 2026

Greek authorities are investigating the discovery of an unmanned surface vehicle (USV), known as a Magura V5 waterborne drone, off...

‘One alone isn’t a fighter’: Latvia opens up to allies as NATO DIANA supersizes

Two drones entering from Russia and armed with warheads land in Latvia

byJulia Gifford
May 8, 2026

Update: Late Sunday, 10 May, Latvia's Minister for Defence, Andris Sprūds, resigned from his role. Resilience Media reported earlier that...

black and white computer keyboard

Analysis: Europe’s chip ambitions risk going stale

byPaddy Stephens
May 8, 2026

Headlines warn that helium shortages – caused by the ongoing war in Iran and the wider region – are threatening...

ARX expands Ukraine presence as uncrewed ground robot demand surges

ARX expands Ukraine presence as uncrewed ground robot demand surges

byJohn Biggs
May 7, 2026

The robotic ground war is heating up in Ukraine with companies are sending hundreds of uncrewed ground vehicles (UGVs) to...

(L-to-R): James Palles-Dimmock (CEO) with co-founders Prof John Morton (CTO) and Prof Simon Benjamin (CSO)

Quantum Motion raises $160M for silicon-based quantum computers that fit in a server rack

byPaul Sawers
May 7, 2026

Large-scale quantum computers remain an elusive goal, but with multiple nations hustling to be the first to build and use...

L-to-R: Joakim Sjöblom (co-founder & CEO), Sebastian Reismer (head of construction), Carl Duforce (co-founder & COO)

Swebal raises $35M to rekindle Europe’s TNT supply chain

byPaul Sawers
May 7, 2026

NATO is facing a shortage of TNT, an essential explosive in the manufacturing of weapons. Now, startups are setting up...

Load More
Next Post
The future of fuel: A conversation with Tim Böltken of Ineratec

The future of fuel: A conversation with Tim Böltken of Ineratec

UK startup Refute secures £5M to take AI fight to disinformation campaigns

UK startup Refute secures £5M to take AI fight to disinformation campaigns

Most viewed

InVeris announces fats Drone, an integrated, multi-party drone flight simulator

Uforce raises $50M at a $1B+ valuation to build defence tech for Ukraine

Auterion, the drone software startup, eyes raising $200M at a $1.2B+ valuation

Palantir and Ukraine’s Brave1 have built a new AI “Dataroom”

Senai exits stealth to help governments harness online video intelligence

Twentyfour Industries emerges from stealth with $11.8M for mass-produced drones

Resilience Media is an independent publication covering the future of defence, security, and resilience. Our reporting focuses on emerging technologies, strategic threats, and the growing role of startups and investors in the defence of democracy.

  • About
  • News
  • Resilence Conference
    • Resilience Conference Copenhagen 2026
    • Resilience Conference Warsaw 2026
    • Resilience Conference 2026
  • Guest Posts
  • Subscribe
  • Privacy Policy
  • Terms & Conditions

© 2026 Resilience Media

No Result
View All Result
  • Home
  • Subscribe
  • About
  • Events
  • Guest Posts
  • Interview
  • News
  • Resilience Conference London 2026
  • Resilience Conference Copenhagen 2026
  • Resilience Conference Warsaw 2026
  • Startups
  • Venture
  • Weekly Digest

© 2026 Resilience Media

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.