CERT Polska Reports Cyber Attacks on 30 Wind and Solar Farms

Poland’s critical energy infrastructure faced an unprecedented coordinated assault just days before the new year, as sophisticated threat actors launched a sweeping campaign against the nation’s renewable energy sector and heating systems. The attacks, which unfolded on December 29, 2025, exposed significant vulnerabilities within the operational technology networks that underpin modern energy distribution across the country. While the immediate physical impact was thankfully limited, the incident serves as a stark reminder of how geopolitical tensions increasingly manifest in cyberspace, with civilian energy infrastructure caught in the crosshairs of state-sponsored disruption campaigns designed to test defenses and potentially destabilize essential services during peak demand periods.

Coordinated Attacks Target 30+ Polish Wind and Solar Energy Farms

The scale of the operation was both ambitious and deeply concerning, with CERT Polska confirming that more than thirty wind and photovoltaic farms fell victim to synchronized intrusions alongside other critical targets. Beyond the renewable facilities, the attackers also compromised a private manufacturing company and a massive combined heat and power plant bearing responsibility for warming nearly half a million Polish households through harsh winter conditions. This wasn’t random digital vandalism; the adversaries carefully selected targets to maximize potential disruption precisely when energy demand peaks and heating systems operate under maximum strain, suggesting strategic timing designed to amplify psychological and practical impact.

Despite the attackers’ clearly destructive intentions, the renewable energy sector demonstrated notable resilience against the onslaught. While intruders successfully penetrated internal networks at power substations and temporarily severed communications between the farms and distribution system operators, actual electricity generation continued uninterrupted across the targeted facilities. The turbines kept spinning and solar panels maintained output, indicating that operational technology networks remained sufficiently segmented from compromised IT infrastructure to prevent cascading failures. This operational continuity likely averted what could have been a catastrophic blackout scenario during one of the year’s coldest and darkest periods when grid stability matters most.

The technical execution revealed sophisticated tradecraft and intimate knowledge of industrial control systems, as attackers moved far beyond traditional espionage to physically disruptive sabotage. They actively damaged firmware on critical controllers, systematically deleted essential system files, and deployed specialized malware payloads engineered to render hardware permanently inoperable. This evolution from reconnaissance to outright destruction of physical components marks a dangerous escalation in tactics, demonstrating that threat actors have developed capabilities to bridge the gap between cyberspace and tangible infrastructure damage in ways that could take months to repair even when attacks partially fail.

Russian FSB-Linked Static Tundra Group Deploys Wiper Malware

Attribution efforts have centered on a threat cluster designated Static Tundra, an advanced persistent threat group operating under an alphabet soup of aliases including Berserk Bear, Dragonfly, Energetic Bear, and Ghost Blizzard. CERT Polska has assessed with high confidence that this group operates under the auspices of Russia’s Federal Security Service, specifically Center 16, the FSB’s specialized military unit responsible for signals intelligence and offensive cyber operations. However, the attribution landscape remains complicated by parallel investigations from ESET and Dragos, which suggest with moderate confidence that the activity might alternatively link to Sandworm, another notorious Russian state-sponsored actor historically associated with destructive attacks against industrial control systems and critical infrastructure worldwide.

The malware arsenal deployed in this campaign featured a custom-built wiper dubbed DynoWiper by ESET researchers, specifically engineered to obliterate data and prevent system recovery through sophisticated anti-forensic techniques. In the most concerning intrusion against the combined heat and power plant, adversaries had maintained a stealthy, persistent presence dating back to March 2025, spending nine full months conducting detailed reconnaissance, escalating privileges, and moving laterally through the network to optimally position their destructive payload. This extended dwell time suggests meticulous preparation and deep environmental understandingβ€”characteristics typical of patient, well-resourced nation-state operations rather than opportunistic cybercriminals seeking quick financial gain.

Fortunately, the attackers’ attempts to detonate the wiper malware at the CHP facility ultimately failed, preventing the disruption of heat supply to hundreds of thousands of residents during freezing temperatures. CERT Polska emphasized that while all attacks shared a "purely destructive objective" with no evidence of ransomware or data extortion motives, defensive measures and possibly operational luck thwarted the most catastrophic outcomes. The incident nonetheless highlights the persistent, evolving threat facing critical infrastructure operators managing the increasingly complex intersection of information technology and operational technology, where a single compromised credential can potentially bridge gaps between administrative networks and physical control systems capable of affecting human safety.

As Poland’s energy sector continues forensic analysis and recovery efforts from this coordinated assault, the December attacks underscore the urgent necessity for enhanced cyber resilience protocols across Europe’s critical infrastructure landscape. The deliberate targeting of renewable energy sourcesβ€”often perceived as newer and potentially less hardened than traditional power generation facilitiesβ€”signals a troubling expansion of threat actor focus toward green energy transition assets. While quick containment and resilient system architecture prevented human suffering during winter’s coldest days, the incident serves as an unambiguous warning that distributed energy resources bring new attack surfaces which sophisticated adversaries are eager to exploit for strategic advantage. For operators of wind, solar, and thermal facilities worldwide, the message from Warsaw is unmistakable: the next such attack may not be foiled so fortunately, making sustained investment in network segmentation, real-time monitoring, and robust incident response capabilities not merely prudent business practice, but essential pillars of national security and public safety in an era of hybrid warfare.