Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Hackers Deliver Malware via Fake DeepSeek TUI GitHub Rep
May 11, 2026
Cybercrime Network Takedown Exposes 22, Crimenetwork Users
May 11, 2026
ShinyHunters Breaches Instructure Canvas LMS Free-
May 11, 2026
Home/Threats/Coordinated Cyberattacks Hit 30 Polish Wind & Solar Farms
Threats

Coordinated Cyberattacks Hit 30 Polish Wind & Solar Farms

A coordinated cyberattack struck Poland on December 29, 2025, targeting over 30 wind and solar farms, a large combined heat and power plant, and a manufacturing facility. The attacks occurred during...

David kimber
David kimber
February 2, 2026 2 Min Read
3 0

A coordinated cyberattack struck Poland on December 29, 2025, targeting over 30 wind and solar farms, a large combined heat and power plant, and a manufacturing facility.

The attacks occurred during severe winter weather, when temperatures dropped and snowstorms threatened the nation’s energy stability.

All operations had purely destructive intentions, designed to damage critical infrastructure rather than steal information.

These coordinated strikes represent the first documented destructive operation by a sophisticated attack group, marking a significant escalation in threats against European energy infrastructure.

The assault targeted power substations serving as connection points between renewable energy sources and the distribution network. Industrial automation devices at these locations became prime objectives for the attackers.

These systems included remote terminal units managing telecontrol operations, human-machine interfaces displaying facility status, protection relays guarding against electrical damage, and communication equipment such as routers and network switches.

After establishing access to internal networks, attackers conducted detailed reconnaissance before executing their destructive plan through damaged firmware and custom-built wiper malware on December 29 morning.

Communication channels between farms and the distribution system operator were disrupted, though electricity generation continued unaffected.

Cert.pl analysts identified the attack infrastructure used in the operation, revealing significant overlap with infrastructure associated with threat groups known as “Static Tundra” by Cisco, “Berserk Bear” by CrowdStrike, “Ghost Blizzard” by Microsoft, and “Dragonfly” by Symantec.

These researchers noted the attackers demonstrated strong capabilities against industrial devices and historical focus on energy sectors.

Public analysis indicated this represented the first destructive campaign publicly attributed to this activity cluster, signaling an important tactical shift in their operations.

Wiper Malware Deployment and Infection Mechanism

The attackers employed identical wiper malware across multiple targets, deploying custom-built destructive software after gaining privileged access through prolonged infrastructure infiltration.

The malware’s operation centered on irreversible data destruction across targeted networks.

After establishing footholds through compromised accounts and stolen operational information, attackers prepared partially automated attack sequences ready for simultaneous activation.

When deployed against the combined heat and power plant, the malware’s execution was blocked by endpoint detection and response technology already running on the organization’s systems.

The manufacturing sector company faced similar coordinated assault, though the specific objective differed from energy targets.

This attack pattern demonstrated sophisticated planning, with the malware serving as the final payload following extensive preparation and network reconnaissance across multiple weeks of covert presence within target environments.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackMalwareThreat

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

DynoWiper Malware Wipes Data from Energy Companies

Next Post

Russian Hacker Alliance Launches Large-Scale Cyberattack on Denmark

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Hackers Deploy Trojanized ScreenConnect via Malicious JPEG
May 11, 2026
macOS Malware Spread via Google Ads & Claude.ai Leverages Legitimate
May 11, 2026
Google reCAPTCHA Update Blocks Privacy-Focused Android
May 11, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us