Close Menu
geekfence.comgeekfence.com
    What's Hot

    Read This Before Your Next Subsea Networks Event

    January 27, 2026

    Inside OpenAI’s big play for science 

    January 27, 2026

    How Data Analytics Can Help You Construct A Financial Weather Map

    January 27, 2026
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    Facebook Instagram
    geekfence.comgeekfence.com
    • Home
    • UK Tech News
    • AI
    • Big Data
    • Cyber Security
      • Cloud Computing
      • iOS Development
    • IoT
    • Mobile
    • Software
      • Software Development
      • Software Engineering
    • Technology
      • Green Technology
      • Nanotechnology
    • Telecom
    geekfence.comgeekfence.com
    Home»Cyber Security»Sandworm behind cyberattack on Poland’s power grid in late 2025
    Cyber Security

    Sandworm behind cyberattack on Poland’s power grid in late 2025

    AdminBy AdminJanuary 27, 2026No Comments2 Mins Read0 Views
    Facebook Twitter Pinterest LinkedIn Telegram Tumblr Email
    Sandworm behind cyberattack on Poland’s power grid in late 2025
    Share
    Facebook Twitter LinkedIn Pinterest Email


    The attack involved data-wiping malware that ESET researchers have now analyzed and named DynoWiper

    ESET Research

    23 Jan 2026
     • 
    ,
    1 min. read

    ESET Research: Sandworm behind cyberattack on Poland’s power grid in late 2025

    In late 2025, Poland’s energy system faced what has been described as the “largest cyberattack” targeting the country in years. ESET Research has now found that the attack was the work of the notorious Russia-aligned APT group Sandworm.

    “Based on our analysis of the malware and associated TTPs, we attribute the attack to the Russia-aligned Sandworm APT with medium confidence due to a strong overlap with numerous previous Sandworm wiper activity we analyzed,” said ESET researchers. “We’re not aware of any successful disruption occurring as a result of this attack,” they added.

    Screenshot 2026-01-23 200943
    Source: ESET Research

    Sandworm has a long history of disruptive cyberattacks, especially on Ukraine’s critical infrastructure. Meanwhile, the attack on Poland’s power grid in the last week of December involved data-wiping malware that ESET has now analyzed and named DynoWiper. ESET security solutions detect DynoWiper as Win32/KillFiles.NMO.

    While details regarding the intended impact continue to be investigated, ESET researchers have highlighted the fact that the coordinated attack occurred on the 10th anniversary of the Sandworm-orchestrated attack against the Ukrainian power grid, which resulted in the first ever malware-facilitated blackout. Back in December 2015, Sandworm used the BlackEnergy malware to gain access to critical systems at several electrical substations, leaving around 230,000 people without electricity for several hours.

    Fast forward a decade and Sandworm continues to target entities operating in various critical infrastructure sectors, especially in Ukraine. In their latest APT Activity Report, covering April to September 2025, ESET researchers noted that they spotted Sandworm conducting wiper attacks against targets in Ukraine on a regular basis.

    For any inquiries about our research published on WeLiveSecurity, please contact us at threatintel@eset.com.

    ESET Research offers private APT intelligence reports and data feeds. For any inquiries about this service, visit the ESET Threat Intelligence page.

    IoCs

    SHA-1 Detection Description
    4EC3C90846AF6B79EE1A5188EEFA3FD21F6D4CF6 Win32/KillFiles.NMO DynoWiper.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    Modernising Data Rules for Europe’s AI Future

    January 26, 2026

    Android’s pKVM Becomes First Globally Certified Software to Achieve Prestigious SESIP Level 5 Security Certification

    January 24, 2026

    Fortinet confirms critical FortiCloud auth bypass not fully patched

    January 23, 2026

    Filling the Most Common Gaps in Google Workspace Security

    January 22, 2026

    Patch Tuesday, January 2026 Edition – Krebs on Security

    January 21, 2026

    Why LinkedIn is a hunting ground for threat actors – and how to protect yourself

    January 20, 2026
    Top Posts

    Understanding U-Net Architecture in Deep Learning

    November 25, 202511 Views

    Hard-braking events as indicators of road segment crash risk

    January 14, 202610 Views

    Microsoft 365 Copilot now enables you to build apps and workflows

    October 29, 20258 Views
    Don't Miss

    Read This Before Your Next Subsea Networks Event

    January 27, 2026

    It’s conference season and our traveling team of experts is preparing for lots of upcoming…

    Inside OpenAI’s big play for science 

    January 27, 2026

    How Data Analytics Can Help You Construct A Financial Weather Map

    January 27, 2026

    Maia 200: The AI accelerator built for inference

    January 27, 2026
    Stay In Touch
    • Facebook
    • Instagram
    About Us

    At GeekFence, we are a team of tech-enthusiasts, industry watchers and content creators who believe that technology isn’t just about gadgets—it’s about how innovation transforms our lives, work and society. We’ve come together to build a place where readers, thinkers and industry insiders can converge to explore what’s next in tech.

    Our Picks

    Read This Before Your Next Subsea Networks Event

    January 27, 2026

    Inside OpenAI’s big play for science 

    January 27, 2026

    Subscribe to Updates

    Please enable JavaScript in your browser to complete this form.
    Loading
    • About Us
    • Contact Us
    • Disclaimer
    • Privacy Policy
    • Terms and Conditions
    © 2026 Geekfence.All Rigt Reserved.

    Type above and press Enter to search. Press Esc to cancel.