Escalation of Cyber Sabotage |
What Happened?
On the morning and afternoon of December 29, 2025, a lone attacker launched coordinated attacks on several critical infrastructure facilities across Poland. These attacks impacted at least 30 wind and solar farms, a private manufacturing company, and a large combined heat and power plant supplying heat to nearly 500,000 customers.
The main objective was to destroy data irreversibly and disrupt operations. The attacks impacted traditional information technology (IT) and operational technology (OT) systems, representing a significant escalation in cyber sabotage. The attackers succeeded in disrupting communications between wind farms and distribution system operators (DSOs). At the combined heat and power plant and the manufacturing company, the attackers used sophisticated "wiper" malware designed to permanently delete files and render systems inoperable.
Theft & Irreversible Destruction of Data | What Are the Consequences?
The consequences of these attacks are serious, ranging from operational failures to potential threats to public safety. Although power generation at the renewable energy plants was not immediately shut down, the loss of remote monitoring and control by the distribution system operator created a high-risk environment. It was possible to disconnect the 30 attacked plants from the power grid.
In the case of the combined heat and power plant, the sabotage targeted systems that were used during a period of high heating demand due to sub-zero temperatures. The irreversible destruction of data on workstations and servers could lead to long-term outages and massive costs for restoring the infrastructure. In addition, the theft of sensitive technical information related to SCADA systems and the modernization of OT networks could provide attackers with the information they need to carry out even more damaging attacks in the future.
Inadequate Password Hygiene |
How Did the Attackers Gain Access?
In almost all cases, the primary entry point for attackers was the exploitation of perimeter edge devices, particularly FortiGate firewalls and VPN concentrators. In renewable energy parks, these devices were exposed to the internet and lacked multi-factor authentication (MFA) in their authentication methods. Some of these devices had historical vulnerabilities, including remote code execution flaws that remained unpatched for extended periods.
A recurring problem was the use of default credentials and poor password management. Many OT systems were configured with factory default accounts, such as "Default."
In the manufacturing sector, an attacker obtained a device's configuration after it was made public in an online criminal forum. Additionally, the industry practice of reusing the same passwords for multiple facilities enabled the attacker to move from one compromised website to many others.
Destruction of OT and IT |
What Happened Next?
After gaining access to the networks, the attackers methodically conducted reconnaissance and persistence before ultimately destroying them.
How can the Damage of Such
Cyber Attacks Be Reduced?
It is difficult to protect yourself from an attack. However, you can reduce the impact of such attacks by using common security measures.
Enhanced Resilience for Greater Protection
To strengthen the resilience of OT in the energy sector, we recommend the following measures :
Did You Know?
We provide cybersecurity consulting and expert-led trainings for IT and OT.
Contact Us!
We’re looking forward to helping you.
- Have a question?
- Need more information?
- Would you like to request a demo?