By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Russia’s cyber attacks on Polish utilities draws NCSC alert | Computer Weekly
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > Russia’s cyber attacks on Polish utilities draws NCSC alert | Computer Weekly
News

Russia’s cyber attacks on Polish utilities draws NCSC alert | Computer Weekly

News Room
Last updated: 2026/02/09 at 6:47 PM
News Room Published 9 February 2026
Share
Russia’s cyber attacks on Polish utilities draws NCSC alert | Computer Weekly
SHARE

A series of cyber attacks against the Polich electricity grid that unfolded at the end of December 2025 have prompted a fresh warning from the UK’s National Cyber Security Centre (NCSC), alerting British utilities to the dangers of intrusions orchestrated by Russian state threat actors.

The attacks on Poland, which have been attributed to various units of Russia’s state cyber forces operated by the FSB and GRU intelligence agencies, systems enabling the management of electricity generated from renewable sources at multiple facilities, and two combined heat and power plants (CHPs).

Jonathon Ellison, NCAC director for national resilience, said that attacks like the one that unfolded in Poland may sound far-fetched but were far from it.

“Incidents like this speak to the severity of the cyber threat and highlight the necessity of strong cyber defences and resilience,” he said. “Operators of UK critical national infrastructure (CNI) must not only take note but, as we have said before, act now.”

Ellison highlighted various NCSC resources that such organisations can fall back on, including its Cyber Assessment Framework (CAF) – which is designed to help CNI operators and regulators understand and implement measures to improve resilience and can, if applied appropriately, help mitigate such intrusions.

The upcoming Cyber Security and Resilience Bill – which is currently heading to Committee after receiving its Second Reading in the House of Commons – also contains measures designed to strengthen the regulatory framework for CNI operators such as datacentres and utilities, government and public sector bodies, and other organisations considered critical to the functioning of society.

“Prior planning is the key here and we have recently published guidance on how to prepare for and plan your organisation’s response to severe cyber threat, which sets out defensive actions that may be proportionate if the cyber threat to the UK were to increase,” said Ellison.

“But these actions require careful preparation and forethought – they cannot be improvised under pressure.

“Although attacks can still happen, strong resilience and recovery plans reduce both the chances of an attack succeeding and the impact if one does,” he said.

Attacks on Poland rebuffed

The attacks on Poland were almost certainly part of Russia’s growing hybrid war on its European neighbours over their support for Ukraine, and that they happened at all is highly concerning, but it is important to note that they were successfully rebuffed in the moment.

Speaking in mid-January, Polish prime minister Donald Tusk said that there had been no serious impacts to the country’s national grid. “The systems we have in Poland today proved effective,” he said. “At no point was critical infrastructure threatened, meaning the transmission networks and everything that determines the safety of the entire system.

“Everything indicates that these attacks were prepared by groups directly linked to the Russian services,” Tusk told a press conference at the time.

In a report on the incident, Poland’s national Computer Emergency Response Team, CERT Polska, said that those responsible likely broke into the target environments through Fortinet FortiGate devices that were present at each affected facility, where they served as both VPN concentrators and firewalls.

In each case, the team said, the VPN interface had been left exposed to the public internet and enabled authentication to accounts defined in the configuration without multi-factor authentication.

At the renewables facilities targeted, the attackers sought to destroy various operational technology (OT) components, including Hitachi and Mikronika remote terminal unit (RTU) controllers, Hitachi protection and control relays, and Mikronika human machine interface (HMI) computers. At the power plants, they sought to use a wiper malware known as DynoWiper with the intent of irreversibly destroying vital data.

CERT Polska said that with the benefit of hindsight, it was clear that in the case of the CHPs, the hackers had gained access to the targeted systems in order to conduct reconnaissance and establish persistence as early as March of 2025.

The Poles believe that the attacks likely originated from a cluster of threat activity known to Microsoft as Ghost Blizzard (aka Beserk Bear and Static Tundra) based on an analysis of the attacker controlled infrastructure.

The presence of the DynoWiper malware, however, additionally raises the possibility of a link back to the Sandworm group, which infamously used multiple similar tools during the early months of the Ukraine war in 2022.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article NVIDIA CEO visits Taiwan to secure additional AI chip orders · TechNode NVIDIA CEO visits Taiwan to secure additional AI chip orders · TechNode
Next Article 5 Common 3D Printing Mistakes Most Beginners Make – BGR 5 Common 3D Printing Mistakes Most Beginners Make – BGR
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Shoppinlyst Earns a 35 Proof of Usefulness Score by Building an Advanced Grocery List System | HackerNoon
Shoppinlyst Earns a 35 Proof of Usefulness Score by Building an Advanced Grocery List System | HackerNoon
Computing
Grab the AirPods Pro 2 for just 9.99
Grab the AirPods Pro 2 for just $139.99
News
A new Apple Watch app for Rivian electric vehicles is in the works
A new Apple Watch app for Rivian electric vehicles is in the works
News
Zeekr recalls 38,277 Zeekr 001 WE 86 vehicles over potential battery safety risk · TechNode
Zeekr recalls 38,277 Zeekr 001 WE 86 vehicles over potential battery safety risk · TechNode
Computing

You Might also Like

Grab the AirPods Pro 2 for just 9.99
News

Grab the AirPods Pro 2 for just $139.99

3 Min Read
A new Apple Watch app for Rivian electric vehicles is in the works
News

A new Apple Watch app for Rivian electric vehicles is in the works

1 Min Read
This Is The Best Ethernet Cable For Your Home Network – BGR
News

This Is The Best Ethernet Cable For Your Home Network – BGR

5 Min Read
Samsung really might revive this 2019 camera feature just to take on Apple
News

Samsung really might revive this 2019 camera feature just to take on Apple

4 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?