Key Takeaways
- A Russian military intelligence hacking unit, known as Sandworm, was likely behind the large cyberattacks that targeted Poland’s power system in late December.
- The hackers attempted to deploy a piece of malware called DynoWiper, which would have destroyed files on targeted computer systems and rendered them inoperable.
- The attack was unsuccessful, with no disruption occurring as a result.
- Sandworm has been linked to a string of high-profile and destructive cyberattacks, including a 2015 attack on the Ukrainian power grid.
- The attack on Poland occurred on the tenth anniversary of the Sandworm-linked attack on the Ukrainian power grid.
Introduction to the Attack
The recent cyberattacks on Poland’s power system in late December have been attributed to a notorious Russian military intelligence hacking unit, known as Sandworm. Researchers with Slovakia-based ESET analyzed the malware used during the attack and determined that it was the work of Sandworm, based on the group’s past operations and code overlaps with other destructive cyberattacks. The Russian Embassy in Washington did not immediately respond to a request for comment on the allegations. The attack was significant, with Poland’s energy minister, Milosz Motyka, stating that it was the strongest attack on the country’s energy infrastructure in years.
The Malware Used in the Attack
The hackers attempted to deploy a piece of malware called DynoWiper, which would have destroyed files on targeted computer systems and rendered them inoperable. Fortunately, the attack was unsuccessful, with no disruption occurring as a result. The researchers noted that the malware was designed to cause significant damage, but the exact motivations behind the attack are still unclear. The use of DynoWiper is consistent with Sandworm’s past tactics, which have included the use of destructive malware to cause chaos and disruption.
The History of Sandworm
Sandworm has been linked to a string of high-profile and destructive cyberattacks, dating back more than a decade. The group has been attributed to Russian military intelligence by the U.S. and British governments, and has been involved in some of the most significant cyberattacks in recent history. One of the most notable attacks attributed to Sandworm was the 2015 attack on the Ukrainian power grid, which resulted in the first-ever malware-facilitated blackout. The attack on Poland occurred on the tenth anniversary of this attack, highlighting the ongoing threat posed by Sandworm.
The Significance of the Attack
The attack on Poland’s power system is significant, not only because of the potential disruption it could have caused, but also because of the ongoing tensions between Russia and Western countries. The attack highlights the need for increased cybersecurity measures, particularly in critical infrastructure such as power systems. The fact that the attack was unsuccessful is a testament to the effectiveness of Poland’s cybersecurity measures, but it also highlights the ongoing threat posed by groups like Sandworm. As the threat landscape continues to evolve, it is essential that countries and organizations remain vigilant and proactive in their cybersecurity efforts.
Conclusion and Future Implications
The attribution of the cyberattacks on Poland’s power system to Sandworm highlights the ongoing threat posed by Russian military intelligence hacking units. The use of destructive malware like DynoWiper is a significant concern, and highlights the need for increased cybersecurity measures to protect critical infrastructure. As the threat landscape continues to evolve, it is essential that countries and organizations remain vigilant and proactive in their cybersecurity efforts. The attack on Poland is a reminder that the threat from groups like Sandworm is ongoing, and that increased cooperation and information sharing are necessary to combat these threats. By working together, countries and organizations can reduce the risk of successful attacks and protect critical infrastructure from the threat of destructive cyberattacks.


