Close Menu
geekfence.comgeekfence.com
    What's Hot

    Wealth management outlook for 2026: trends and sourcing implications 

    February 9, 2026

    T-Mobile US’ switching strategy lands in court again

    February 9, 2026

    Scientists create smart synthetic skin that can hide images and change shape

    February 9, 2026
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    Facebook Instagram
    geekfence.comgeekfence.com
    • Home
    • UK Tech News
    • AI
    • Big Data
    • Cyber Security
      • Cloud Computing
      • iOS Development
    • IoT
    • Mobile
    • Software
      • Software Development
      • Software Engineering
    • Technology
      • Green Technology
      • Nanotechnology
    • Telecom
    geekfence.comgeekfence.com
    Home»Cyber Security»Sandworm behind cyberattack on Poland’s power grid in late 2025
    Cyber Security

    Sandworm behind cyberattack on Poland’s power grid in late 2025

    AdminBy AdminJanuary 27, 2026No Comments2 Mins Read4 Views
    Facebook Twitter Pinterest LinkedIn Telegram Tumblr Email
    Sandworm behind cyberattack on Poland’s power grid in late 2025
    Share
    Facebook Twitter LinkedIn Pinterest Email


    The attack involved data-wiping malware that ESET researchers have now analyzed and named DynoWiper

    ESET Research

    23 Jan 2026
     • 
    ,
    1 min. read

    ESET Research: Sandworm behind cyberattack on Poland’s power grid in late 2025

    In late 2025, Poland’s energy system faced what has been described as the “largest cyberattack” targeting the country in years. ESET Research has now found that the attack was the work of the notorious Russia-aligned APT group Sandworm.

    “Based on our analysis of the malware and associated TTPs, we attribute the attack to the Russia-aligned Sandworm APT with medium confidence due to a strong overlap with numerous previous Sandworm wiper activity we analyzed,” said ESET researchers. “We’re not aware of any successful disruption occurring as a result of this attack,” they added.

    Screenshot 2026-01-23 200943
    Source: ESET Research

    Sandworm has a long history of disruptive cyberattacks, especially on Ukraine’s critical infrastructure. Meanwhile, the attack on Poland’s power grid in the last week of December involved data-wiping malware that ESET has now analyzed and named DynoWiper. ESET security solutions detect DynoWiper as Win32/KillFiles.NMO.

    While details regarding the intended impact continue to be investigated, ESET researchers have highlighted the fact that the coordinated attack occurred on the 10th anniversary of the Sandworm-orchestrated attack against the Ukrainian power grid, which resulted in the first ever malware-facilitated blackout. Back in December 2015, Sandworm used the BlackEnergy malware to gain access to critical systems at several electrical substations, leaving around 230,000 people without electricity for several hours.

    Fast forward a decade and Sandworm continues to target entities operating in various critical infrastructure sectors, especially in Ukraine. In their latest APT Activity Report, covering April to September 2025, ESET researchers noted that they spotted Sandworm conducting wiper attacks against targets in Ukraine on a regular basis.

    For any inquiries about our research published on WeLiveSecurity, please contact us at threatintel@eset.com.

    ESET Research offers private APT intelligence reports and data feeds. For any inquiries about this service, visit the ESET Threat Intelligence page.

    IoCs

    SHA-1 Detection Description
    4EC3C90846AF6B79EE1A5188EEFA3FD21F6D4CF6 Win32/KillFiles.NMO DynoWiper.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    Improving SOC efficiency with automation

    February 9, 2026

    Fake Dubai Crown Prince tracked to Nigerian mansion after $2.5M romance scam

    February 8, 2026

    Open Source, Rebuilt to Last

    February 7, 2026

    Man pleads guilty to hacking nearly 600 women’s Snapchat accounts

    February 6, 2026

    The Buyer’s Guide to AI Usage Control

    February 5, 2026

    Please Don’t Feed the Scattered Lapsus ShinyHunters – Krebs on Security

    February 4, 2026
    Top Posts

    Hard-braking events as indicators of road segment crash risk

    January 14, 202617 Views

    Understanding U-Net Architecture in Deep Learning

    November 25, 202512 Views

    Achieving superior intent extraction through decomposition

    January 25, 20268 Views
    Don't Miss

    Wealth management outlook for 2026: trends and sourcing implications 

    February 9, 2026

    Global wealth management is entering a defining phase in 2025-2026 as firms scale their businesses…

    T-Mobile US’ switching strategy lands in court again

    February 9, 2026

    Scientists create smart synthetic skin that can hide images and change shape

    February 9, 2026

    AI Shows How Payment Delays Disrupt Your Business

    February 9, 2026
    Stay In Touch
    • Facebook
    • Instagram
    About Us

    At GeekFence, we are a team of tech-enthusiasts, industry watchers and content creators who believe that technology isn’t just about gadgets—it’s about how innovation transforms our lives, work and society. We’ve come together to build a place where readers, thinkers and industry insiders can converge to explore what’s next in tech.

    Our Picks

    Wealth management outlook for 2026: trends and sourcing implications 

    February 9, 2026

    T-Mobile US’ switching strategy lands in court again

    February 9, 2026

    Subscribe to Updates

    Please enable JavaScript in your browser to complete this form.
    Loading
    • About Us
    • Contact Us
    • Disclaimer
    • Privacy Policy
    • Terms and Conditions
    © 2026 Geekfence.All Rigt Reserved.

    Type above and press Enter to search. Press Esc to cancel.