Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

ICS Devices Bricked Following Russia-Linked Intrusion Into Polish Power Grid

Posted on January 30, 2026January 30, 2026 By CWS

The current assault on Poland’s energy grid, believed to have been carried out by Russian menace actors, focused communication and management methods throughout roughly 30 websites and in some instances resulted in everlasting industrial management system (ICS) harm, in keeping with industrial cybersecurity agency Dragos.

In a report printed this week, the safety agency, which has been concerned in responding to the incident, described it as the primary main operation particularly focusing on distributed power assets (DER).

The attackers gained entry to operational expertise (OT) methods at mixed warmth and energy (CHP) vegetation and renewable power dispatch facilities for wind and photo voltaic services, primarily focusing on grid security and stability monitoring methods quite than lively energy era.

Not like the assaults focusing on Ukraine’s grid in 2015 and 2016, the incident didn’t lead to electrical outages. Nonetheless, the attackers’ actions resulted in some tools on the affected websites being bricked.

ESET final week attributed the assault to Sandworm, a Russian state-sponsored menace group, reporting that the attackers had deployed wiper malware on compromised methods.

Dragos has linked the assault — with average confidence — to a bunch it tracks as Electrum, which it describes as associated to, however not at all times the identical as, Sandworm.Commercial. Scroll to proceed studying.

Based on Dragos’s technical evaluation, the hackers systematically compromised communication infrastructure and distant terminal models (RTUs), gadgets that interface between bodily tools at distributed websites and management methods.

“Taking up these gadgets requires capabilities past merely understanding their technical flaws,” Dragos defined. “It requires data of their particular implementation. The adversaries demonstrated this by efficiently compromising RTUs at roughly 30 websites, suggesting they’d mapped frequent configurations and operational patterns to take advantage of systematically.”

Dragos discovered that some ICS gadgets had been irreparably broken in the course of the assault. Phil Tonkin, Discipline CTO at Dragos, instructed SecurityWeek {that a} course of has been developed to restore hacked RTUs, however some gadgets had been “sufficiently broken that there was no strategy to restore them within the area”.

ICS gadgets bricked

“We are able to’t verify the precise operate of the gadgets at the moment, however can verify that the combo of OT gadgets we describe in report had been affected in methods which disrupted their operation, a few of which had been bricked,” Tonkin defined. 

The absence of energy outages seems to outcome from the inherent design of electrical energy methods. When communication infrastructure is misplaced, most industrial gadgets proceed to function of their final recognized state, permitting the facility to remain on even when distant monitoring and management are disabled.

Whereas the assault on Poland’s energy grid bears similarities to the operations geared toward Ukraine a decade in the past, Dragos famous that the current assault lacked the coordinated sequencing seen within the Ukraine blackouts.

The brand new assault seems rushed and opportunistic, and it’s unclear whether or not the hackers tried to concern malicious operational instructions to set off an outage or in the event that they had been glad with disrupting communications and damaging {hardware}, the safety agency stated.

The corporate identified that Electrum does possess the talents to trigger extra harm, however conducting an assault requires a big period of time, together with for growing customized payloads for every of the focused websites. 

It seems that the compressed timeline from reconnaissance to ultimate execution left little room for the preparation required to launch a extra disruptive assault.

“Dragos assesses with average confidence that opportunism was a key issue within the assault. Fairly than executing a exactly deliberate operation with particular outcomes, Electrum exploited no matter alternatives their entry offered: wiping Home windows-based gadgets, resetting configurations, or trying to completely harm (or brick) tools,” Dragos famous, including, “It seems the operation was rushed, however Dragos can’t make an evaluation as to why.”

Associated: New Reviews Reinforce Cyberattack’s Position in Maduro Seize Blackout

Associated: Entry System Flaws Enabled Hackers to Unlock Doorways at Main European Corporations

Security Week News Tags:Bricked, Devices, Grid, ICS, Intrusion, Polish, Power, RussiaLinked

Post navigation

Previous Post: Critical Ivanti Endpoint Manager RCE Vulnerabilities Actively Exploited in Attacks
Next Post: Hugging Face Abused to Deploy Android RAT

Related Posts

Hirundo Raises $8 Million to Eliminate AI’s Bad Behavior Security Week News
Cyber Insights 2026: Information Sharing Security Week News
Qantas Confirms 5.7 Million Impacted by Data Breach Security Week News
In Other News: Iranian Ships Hacked, Verified Android Developers, AI Used in Attacks Security Week News
CISA Warns of Exploited Flaw in Asus Update Tool Security Week News
US Cybersecurity Agency Flags Wi-Fi Range Extender Vulnerability Under Active Attack Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Badges, Bytes and Blackmail
  • Hugging Face Abused to Deploy Android RAT
  • ICS Devices Bricked Following Russia-Linked Intrusion Into Polish Power Grid
  • Critical Ivanti Endpoint Manager RCE Vulnerabilities Actively Exploited in Attacks
  • Education-Themed Malicious Domains Linked to Bulletproof Hosting Infrastructure Exposed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Badges, Bytes and Blackmail
  • Hugging Face Abused to Deploy Android RAT
  • ICS Devices Bricked Following Russia-Linked Intrusion Into Polish Power Grid
  • Critical Ivanti Endpoint Manager RCE Vulnerabilities Actively Exploited in Attacks
  • Education-Themed Malicious Domains Linked to Bulletproof Hosting Infrastructure Exposed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark