Poland Thwarts Major Cyberattack on Wind and Solar Energy Infrastructure

Related

Foxveil Malware Loader Uses Cloudflare, Netlify, and Discord to Evade Detection

What happened Security researchers discovered a new malware loader called Foxveil...

DigitStealer Infostealer Targets macOS Systems and Cryptocurrency Wallet Data

What happened A macOS-targeting infostealer called DigitStealer has seen increased...

QR Code Phishing Campaigns Deliver Malicious Links and Mobile Malware

What happened Security researchers at Palo Alto Networks Unit 42...

Carding-as-a-Service Marketplaces Fuel Surge in Global Credit Card Fraud

What happened Cybercriminals have built sophisticated Carding-as-a-Service (CaaS) marketplaces that...

Share

What happened

A coordinated cyberattack in late December 2025 targeted more than 30 wind and solar farms, a combined heat and power (CHP) plant, and a manufacturing facility in Poland, deploying wiper malware to damage operational technology and disrupt control systems, but failed to cause widespread outages. 

Who is affected

The incident hit Poland’s distributed energy resources (DERs), including wind turbines and photovoltaic installations, as well as key CHP infrastructure serving hundreds of thousands of customers.

Why CISOs should care

This event marks one of the first large-scale destructive cyberattacks against decentralized energy assets, exposing vulnerabilities in operational technology (OT) environments and remote access systems. Threat actors exploited default credentials and flawed network defenses to gain access and deploy destructive payloads, underscoring risks to utility and critical infrastructure sectors worldwide.

3 practical actions

  1. Harden OT environments: Eliminate default credentials, enforce strong authentication, and isolate critical control systems from direct internet exposure. 
  2. Improve network visibility and monitoring: Deploy robust OT/IT segmentation and continuous anomaly detection for remote terminal units (RTUs) and human-machine interfaces (HMIs).
  3. Test response readiness: Conduct regular tabletop exercises and incident response drills tailored to DER and ICS breach scenarios to reduce operational risk.