Poland power grid cyberattack: New “DynoWiper” wiper malware points to Russia’s Sandworm

January 24, 2026
Poland power grid cyberattack: New “DynoWiper” wiper malware points to Russia’s Sandworm

WARSAW, Jan 24, 2026, 14:24 (CET)

  • ESET links the late-December cyberattacks on Poland’s power grid to the Russia-backed Sandworm group, though no disruptions occurred
  • According to the Polish government, two combined heat and power plants and renewable management systems were hit
  • Officials say tougher cybersecurity rules are being drafted after the attempted attack

Cybersecurity firm ESET has pointed to hackers tied to Russian military intelligence as the probable source of the cyberattacks targeting Poland’s power grid in late December. The intruders tried to unleash a data-wiping malware known as DynoWiper, though their attempt appears to have failed. The Russian Embassy in Washington has not responded to requests for comment. (Reuters)

The discovery sharpens the spotlight on an incident Polish officials now see as a serious threat to the country’s energy security. The focus has shifted away from data theft toward potential disruption. This development arrives as Warsaw advocates for tougher cyber rules targeting critical infrastructure.

TechCrunch labeled DynoWiper as “wiper” malware designed to delete data and disable computers. (TechCrunch)

Poland’s prime minister said the attacks on December 29-30 hit two combined heat and power plants—these facilities produce both electricity and heat—and also targeted a system managing power from renewables such as wind turbines and solar farms. Donald Tusk stated that “everything indicates” the operation was carried out by groups “directly linked to the Russian services.” (Gov)

Tusk said Poland’s defences remained solid, stressing that “at no point was critical infrastructure threatened.” He confirmed he ordered ministers and special services to work at full capacity and pointed to upcoming steps, including draft legislation for a national cybersecurity system.

ESET linked the attack to Sandworm with “medium confidence,” citing its analysis of both the malware and the attackers’ methods. The firm also noted, “We’re not aware of any successful disruption occurring as a result of this attack.” DynoWiper is a wiper—a kind of malware that deletes or overwrites data to make machines unusable. (We Live Security)

Energy Minister Milosz Motyka told reporters earlier this month that Poland’s cyber defense units detected “the strongest attack on the energy infrastructure in years.” The breach hit communication links between renewable energy facilities and power distribution operators. (Reuters)

Robert Lipovsky, principal threat intelligence researcher at ESET, called the operation “unprecedented” for Poland, pointing out that earlier cyberattacks hadn’t targeted disruption. “Pulling off a disruptive cyberattack against the Polish energy sector is a big deal,” he told journalist Kim Zetter. (ZERO DAY)

Sandworm, infamous for its destructive operations, has been tied by Western officials and experts to attacks on Ukraine’s power infrastructure, including a malware-driven blackout a decade ago. That late-December event in Poland has drawn notice given this background.

Poland’s new cyber law targets tougher risk management and incident response rules for IT networks as well as operational technology—the industrial control systems that run power plants and grid infrastructure.

Cyber attribution rarely produces courtroom-ready proof, and ESET’s findings rely on code and tactic similarities rather than any formal admission. The probe into the intended damage continues, and Polish officials haven’t disclosed how the breach happened—leaving open the chance of another attack using different techniques.

The December incident didn’t cause a blackout—at least, not this time. Still, it shows how fast data-wiping malware can jump from IT systems straight to the power grid. Energy operators are now gearing up for the attack they really dread: the next one.

Technology News

  • Apple plans 20+ product launches in 2026, including iPhone 17e and foldable iPhone
    January 24, 2026, 2:58 PM EST. Industry chatter suggests Apple will launch more than 20 new products in 2026, spanning hardware and software. In winter and spring, expect new Apple Home devices, a budget MacBook, the iPhone 17e, updates to the base iPad and a refreshed M4 iPad Air, a new AirTag with improved range, and revised MacBook Pro lines powered by an M5-series processor. New displays include the Apple Studio Display 2 and a second high-end screen. Summer focuses on software with iOS 27 at WWDC, plus mid-year M5 Mac mini and Mac Studio refreshes. Fall centers on the iPhone 18 Pro/Pro Max, a foldable iPhone Fold, a redesigned M6 MacBook Pro, and a potential new Apple Glasses. Timing remains fluid.