#BREAKING #ESETresearch provides technical details on #DynoWiper, a data‑wiping malware used in a data‑destruction incident on December 29, 2025, affecting a company in Poland’s energy sector.
https://www.welivesecurity.com/en/eset-research/dynowiper-update-technical-analysis-attribution/
@CERT_Polska_en did an excellent job investigating the incident and published a detailed analysis in a report:
https://cert.pl/en/posts/2026/01/incident-report-energy-sector-2025/
#ESETresearch attributes the attack to the 🇷🇺 Russia‑aligned #Sandworm APT group with medium confidence, based on strong overlaps in behavior and TTPs with multiple earlier Sandworm attacks. Specifically, DynoWiper operates in a broadly similar fashion to the ZOV wiper, which we attribute to Sandworm with high confidence.
IoCs available in our GitHub repo: https://github.com/eset/malware-ioc/tree/master/dynowiper

DynoWiper: attacco contro la rete elettrica della Polonia
A fine dicembre 2025 è stato effettuato un attacco informatico contro la rete elettrica della #polonia Gli esperti di #eset hanno scoperto il tipo di #malware e gli autori.I cybercriminali del gruppo #sandworm (noto anche come Seashell Blizzard), finanziato dal governo russo, hanno utilizzato #dynowiper Il Primo Ministro Donald Tusk ha dichiarato che non ci sono stati blackout o altre gravi conseguenze

@sicurezza

https://www.punto-informatico.it/dynowiper-attacco-contro-rete-elettrica-polonia/

DynoWiper: attacco contro la rete elettrica della Polonia

ESET ha scoperto che l'attacco contro la rete elettrica della Polonia è stato effettuato con il malware DynoWiper dal gruppo russo Sandworm.

Punto Informatico

#ESET Research: #Russian cyber actor #Sandworm behind #cyberattack on NATO member #Poland’s power grid in late 2025. The attack involved data-wiping malware #DynoWiper. Coincidentally on the 10th anniversary of #Ukraine power grid.

🔗 https://www.welivesecurity.com/en/eset-research/eset-research-sandworm-cyberattack-poland-power-grid-late-2025/

ESET Research: Sandworm behind cyberattack on Poland’s power grid in late 2025

The attack involved data-wiping malware that ESET researchers have now analyzed and named DynoWiper.

Nowy wiper w polskiej energetyce – atak na infrastrukturę krytyczną

Czy można „zetrzeć” prąd z dysku? Ktoś właśnie próbował – i to w Polsce.

Czytaj dalej:
https://pressmind.org/nowy-wiper-w-polskiej-energetyce-atak-na-infrastrukture-krytyczna/

#PressMindLabs #dynowiper #elektrocieplownie #eset #oze #sandworm

This was really big. On December 29-30, 2025, #Poland successfully defended against a coordinated cyberattack targeting its energy infrastructure. #ESET Research has attributed the attack to #Sandworm (APT44), a Russian #GRU-linked #hacking group.

Key Facts:

- Attack used #DynoWiper malware targeting two heat-and-power plants and renewable energy management systems

- Targeted communication infrastructure between energy producers and the national grid

- Attack occurred during temperatures below -15°C

- Polish authorities estimate 500,000 people could have lost heat if successful

- No disruption occurred; attack was detected and stopped

Context:

The #attack occurred nearly 10 years after Sandworm's 2015 #cyberattack on Ukraine's power grid, which caused the first #malware-induced #blackout, affecting approximately 230,000 people.

https://www.welivesecurity.com/en/eset-research/eset-research-sandworm-cyberattack-poland-power-grid-late-2025/

https://notesfrompoland.com/2026/01/14/poland-suffers-major-cyberattack-on-power-grid-says-russia-likely-responsible/

@remixtures

#Rusdia #RussiaUkraineWar #Ukrainewar

ESET Research: Sandworm behind cyberattack on Poland’s power grid in late 2025

The attack involved data-wiping malware that ESET researchers have now analyzed and named DynoWiper.

#BREAKING #ESETresearch identified the wiper #DynoWiper used in an attempted disruptive cyberattack against the Polish energy sector on Dec 29, 2025. At this point, no successful disruption is known, but the malware’s design clearly indicates destructive intent.
#ESETresearch attributes the attack to the Russia‑aligned #Sandworm APT group with medium confidence, based on strong overlaps in behavior and TTPs with multiple earlier Sandworm-linked wiper operations investigated by our team.
The attack struck during peak winter and the 10‑year anniversary of Sandworm’s 2015 attack on Ukraine’s power grid - the first malware-driven blackout, leaving ~230,000 people without electricity.
#ESET detects DynoWiper as Win32/KillFiles.NMO. Customers of our private ESET Threat Intelligence APT reports have already received additional technical details and IOCs to support rapid detection and response. IoC: 4EC3C90846AF6B79EE1A5188EEFA3FD21F6D4CF6
We continue to investigate the incident and broader implications. As new evidence or links to additional Sandworm activity emerge, we will share further updates to help defenders protect critical sectors.