Poland's energy grid was targeted by wiper malware, but the attack ultimately failed to disrupt electricity delivery operations. The malicious software, known as DynoWiper, is believed to have been launched by Russian state hackers around the 10th anniversary of Russia's attack on Ukraine's power grid in December 2015.
Researchers from ESET, a cybersecurity firm, attributed the attack to the Sandworm APT (Advanced Persistent Threat) group, which has previously carried out destructive attacks on behalf of the Kremlin. The malware used in the Poland attack is thought to be similar to wiper malware used by Sandworm in Ukraine last year.
According to ESET researchers, the DynoWiper malware was designed to permanently erase code and data stored on servers with the goal of destroying operations completely. However, despite its destructive capabilities, the attack failed to disrupt electricity delivery operations.
The reasons for the attack's failure are not yet clear. It is possible that Russia planned the attack to be limited in scope in order to avoid provoking Polish allies. Alternatively, cyber defenses may have prevented the wiper from working as intended.
Researchers from ESET, a cybersecurity firm, attributed the attack to the Sandworm APT (Advanced Persistent Threat) group, which has previously carried out destructive attacks on behalf of the Kremlin. The malware used in the Poland attack is thought to be similar to wiper malware used by Sandworm in Ukraine last year.
According to ESET researchers, the DynoWiper malware was designed to permanently erase code and data stored on servers with the goal of destroying operations completely. However, despite its destructive capabilities, the attack failed to disrupt electricity delivery operations.
The reasons for the attack's failure are not yet clear. It is possible that Russia planned the attack to be limited in scope in order to avoid provoking Polish allies. Alternatively, cyber defenses may have prevented the wiper from working as intended.