Sandworm Deploys DynoWiper in Attack on Poland's Power Grid
ESET researchers attribute December cyberattack on Polish energy infrastructure to Russian GRU hackers. Previously unknown wiper malware recovered.
Russian military intelligence hackers launched what Polish officials are calling the country's most significant cyberattack on energy infrastructure in years—and security researchers say they've recovered the wiper malware used in the assault.
ESET published findings Friday attributing the late December attack to Sandworm, the GRU unit responsible for some of the most destructive cyber operations of the past decade, including the 2015 and 2016 Ukrainian blackouts. The attack coincided almost exactly with the tenth anniversary of those earlier power grid strikes.
What Happened
The attacks occurred on December 29 and 30, 2025, targeting multiple components of Poland's energy infrastructure. Affected entities included two heat-and-power plants and a management system for renewable energy sources like wind turbines and solar farms.
Polish Energy Minister Milosz Motyka confirmed in January that the assault represented the strongest attack on the country's power infrastructure in years. Had the attack succeeded, authorities estimate it could have disrupted power to approximately 500,000 Polish residents.
The attack was ultimately unsuccessful. Poland's cybersecurity authorities and energy operators detected and contained the intrusion before it achieved its apparent goal of operational disruption.
The DynoWiper Malware
ESET obtained and analyzed the malware deployed during the attack, which they've designated DynoWiper (detected as Win32/KillFiles.NMO). Unlike ransomware designed for extortion, wiper malware exists for a single purpose: destroying data irreversibly.
Malware Details:
- SHA-1: 4EC3C90846AF6B79EE1A5188EEFA3FD21F6D4CF6
- Classification: Data-wiping malware
- Detection: Win32/KillFiles.NMO
DynoWiper follows the pattern of previous Sandworm destructive tools. The group has deployed numerous wipers over the years, including BlackEnergy, Industroyer, NotPetya, and CaddyWiper—each associated with attacks on Ukrainian critical infrastructure or broader disruptive campaigns.
Why ESET Attributes This to Sandworm
ESET researchers attribute the Poland attack to Sandworm with medium confidence based on several factors. The operational tactics align with previous Sandworm wiper campaigns, and the targeting of critical infrastructure in Eastern Europe fits the group's established pattern.
Sandworm, also tracked as APT44 or Seashell Blizzard, operates under Russia's Main Intelligence Directorate (GRU). The U.S. and British governments have formally attributed the unit's operations to Russian military intelligence. For context on Sandworm's history and significance, our cybersecurity book recommendations include detailed accounts of the group's NotPetya and Ukrainian blackout operations.
The timing matters too. Sandworm has demonstrated what researchers describe as "anniversary attacks"—operations timed to coincide with significant dates. The December 2025 attack on Poland landed almost exactly ten years after Sandworm's pioneering attacks against Ukraine's power grid in December 2015.
Poland as a Target
This attack represents an escalation. Robert Lipovsky, principal threat intelligence researcher at ESET, characterized the operation as "unprecedented" for Poland. While the country has faced previous Russian-aligned cyber operations—particularly since Russia's full-scale invasion of Ukraine in 2022—prior attacks weren't disruptive in nature or intent.
Poland has been a vocal supporter of Ukraine and serves as a key logistics hub for Western military aid. The country shares a border with both Ukraine and Russia's Kaliningrad exclave, making it a natural target for Russian pressure campaigns.
The attack also fits a broader pattern. Russian APT groups, including Sandworm, have continued targeting Ukrainian infrastructure with wipers and ransomware throughout 2025. Poland's support for Ukraine appears to have extended the target list.
Why This Matters
The Poland attack signals that Russian cyber operations against European critical infrastructure continue to expand beyond Ukraine. Energy sector organizations—particularly those in NATO countries supporting Ukraine—should treat Sandworm-associated threats as an active concern.
The attack's failure doesn't diminish its significance. Sandworm operators will learn from this attempt. Defenders in Poland and allied nations gained intelligence about current Sandworm TTPs, but the group will adapt.
Organizations operating critical infrastructure should review network segmentation between IT and OT environments, ensure incident response plans account for destructive attacks (not just ransomware), and monitor for the specific IOCs ESET has released. Contact ESET's threat intelligence team at [email protected] for additional technical indicators.
We previously covered Amazon's disruption of a separate multi-year Sandworm campaign targeting the Western energy sector through misconfigured edge devices—a reminder that this threat actor maintains multiple concurrent operations against similar targets.
Related Articles
Amazon Disrupts Multi-Year Russian GRU Campaign Targeting Energy Sector
Amazon's threat intelligence team exposes and disrupts Sandworm operations targeting Western critical infrastructure through misconfigured edge devices.
Dec 17, 2025Finland Arrests Ship Crew Over Baltic Cable Sabotage
Two crew members detained after cargo vessel's anchor allegedly severed Finland-Estonia telecommunications cable in suspected hybrid warfare operation.
Jan 4, 2026Russia's Fancy Bear Running Low-Cost Credential Theft Across Three Continents
Recorded Future tracks APT28 harvesting credentials from energy, defense, and government targets in the Balkans, Middle East, and Central Asia using free hosting infrastructure.
Jan 22, 2026Black Basta Leader Oleg Nefedov Added to Interpol Wanted List
German and Ukrainian authorities identify 35-year-old Russian national as Black Basta boss, raid homes of two affiliates in Ukraine.
Jan 17, 2026