CybersecurityCyber Attack on Polish Power Grid Linked to Russian ELECTRUM Group

Cyber Attack on Polish Power Grid Linked to Russian ELECTRUM Group

Key Takeaways

  • A coordinated cyber attack on the Polish power grid has been attributed to the Russian state-sponsored hacking group ELECTRUM with medium confidence.
  • The attack targeted distributed energy resources (DERs) and affected communication and control systems at combined heat and power (CHP) facilities and systems managing the dispatch of renewable energy systems.
  • The attack did not result in power outages, but the adversaries gained access to operational technology systems critical to grid operations and disabled key equipment beyond repair.
  • The attack is believed to be the work of ELECTRUM, which is known to work in conjunction with another group called KAMACITE to gain initial access to targeted organizations and perform reconnaissance and persistence activities.
  • The incident highlights the risk of OT-focused intrusions and the importance of securing critical infrastructure against cyber threats.

Introduction to the Attack

The Polish power grid was recently targeted in a coordinated cyber attack, which has been attributed to the Russian state-sponsored hacking group ELECTRUM with medium confidence. According to a new intelligence brief published by operational technology (OT) cybersecurity company Dragos, the attack occurred in late December 2025 and targeted distributed energy resources (DERs). The attack affected communication and control systems at combined heat and power (CHP) facilities and systems managing the dispatch of renewable energy systems from wind and solar sites. While the attack did not result in power outages, the adversaries gained access to operational technology systems critical to grid operations and disabled key equipment beyond repair at the site.

The Role of ELECTRUM and KAMACITE

ELECTRUM is known to work in conjunction with another group called KAMACITE to gain initial access to targeted organizations and perform reconnaissance and persistence activities. KAMACITE focuses on establishing and maintaining initial access to targeted organizations using spear-phishing, stolen credentials, and exploitation of exposed services. Once access is gained, the threat actor performs reconnaissance and persistence activities over extended periods of time as part of efforts to burrow deep into target OT environments and keep a low profile. This careful preparatory phase precedes actions executed by ELECTRUM, which targets the industrial control systems. The two groups have clear separation of roles and responsibilities, enabling flexibility in execution and facilitating sustained OT-focused intrusions when conditions are favorable.

The Attack on the Polish Power Grid

The attack on the Polish power grid targeted systems that facilitate communication and control between grid operators and DER assets, including assets that enable network connectivity. The adversary successfully disrupted operations at about 30 distributed generation sites by breaching Remote Terminal Units (RTUs) and communication infrastructure at the affected sites using exposed network devices and exploited vulnerabilities as initial access vectors. The findings indicate that the attackers possess a deep understanding of electrical grid infrastructure, allowing them to disable communications equipment, including some OT devices. However, the full scope of the malicious actions undertaken by ELECTRUM is unknown, with Dragos noting that it’s unclear if the threat actor attempted to issue operational commands to this equipment or focused solely on disabling communications.

The Nature of the Attack

The Poland attack is assessed to be more opportunistic and rushed than a precisely planned operation, allowing the hackers to take advantage of the unauthorized access to inflict as much damage as possible. The attackers wiped Windows-based devices to impede recovery, reset configurations, or attempted to permanently brick equipment. The majority of the equipment targeted was focused on grid safety and stability monitoring, per Dragos. This incident demonstrates that adversaries with OT-specific capabilities are actively targeting systems that monitor and control distributed generation. The disabling of certain OT or industrial control system (ICS) equipment beyond repair at the site moved what could have been seen as a pre-positioning attempt by the adversary into an attack.

Conclusion and Implications

The attack on the Polish power grid highlights the risk of OT-focused intrusions and the importance of securing critical infrastructure against cyber threats. The incident demonstrates that adversaries with OT-specific capabilities are actively targeting systems that monitor and control distributed generation, and that the division of labor between ELECTRUM and KAMACITE enables flexibility in execution and allows OT impact to remain an option, even when it is not immediately exercised. This extends risk beyond discrete incidents and into prolonged periods of latent exposure. As such, it is essential for organizations to prioritize the security of their OT systems and to be aware of the potential risks and threats posed by state-sponsored hacking groups like ELECTRUM and KAMACITE.

- Advertisement -spot_img

More From UrbanEdge

Coinbase Insider Breach: Leaked Support Tool Screenshots

In May 2025, Coinbase experienced a sophisticated insider breach affecting 70,000 users. Hackers bribed support agents to leak sensitive data, resulting in over $2 million in theft through targeted scams. Coinbase responded by refusing ransom, launching a bounty program, and refunding victims...

Sector Impact Overview: Architecting the AI Integration Era

Sector Impact Overview: Architecting the AI Integration Era 1. Introduction:...

The Pulse of the Global Artificial Intelligence Landscape

This collection of news headlines highlights the rapidly evolving landscape...

NSW Police Tighten Protest Rules Ahead of Israeli President’s Visit

Key Takeaways The NSW Police commissioner has announced an extension...

Meet Team USA’s Most Seasoned Athlete: A Midwest Curler Bound for 2026 Olympics

Key Takeaways Rich Ruohonen, a 54-year-old curler from Minnesota, is...

Maddie Hall Inquest: Family Seeks Answers Over Mental Health Failures

Key Takeaways Madeleine Hall, a 16-year-old girl, died by suicide...

Will Arnett Booted Famous Comedian from Podcast After Just 10 Minutes

Key Takeaways: Will Arnett shares a harsh opinion about a...

Insider Threat: How Unhappy Employees Compromise Data Security

Key Takeaways Disgruntled employees pose a significant cybersecurity threat to...

Zillow’s Concerns Over Compass’ Rising Technology Threat

Key Takeaways: Zillow has identified Compass' growing suite of agent-...
- Advertisement -spot_img