Poland’s Electric Grid Targeted by Russian Wiper Malware: Analysis of Recent Cyberattack
On January 13, researchers announced that Poland’s electric grid had been the target of a cyberattack involving wiper malware, with strong indications that the origin of this attack aligns with Russian state-sponsored hackers. This malicious software aims to disrupt the operations of electricity delivery systems, raising significant concerns regarding the resilience of critical infrastructure.
The attack took place during the last week of December, targeting communication lines between renewable energy installations and power distribution operators, as reported by various sources. However, the attack failed to achieve its objectives, with the underlying reasons for this failure not detailed in the reports.
Security firm ESET has identified the malware as a type of wiper, which functions by permanently erasing essential code and data on targeted servers, thereby crippling operational capabilities. Through their examination of the attack’s tactics, techniques, and procedures (TTPs), ESET researchers have placed the blame squarely on the Russian-affiliated hacking group known as Sandworm. They assert that the overlap with prior Sandworm activities suggests a medium level of confidence in this attribution.
The researchers emphasized their analysis: “We attribute the attack to the Russia-aligned Sandworm APT with medium confidence due to a strong overlap with numerous previous Sandworm wiper activities we analyzed. We are not aware of any successful disruption occurring as a result of this attack.” The lack of effective operational impact is noteworthy, especially given Sandworm’s notorious history of high-profile attacks.
Sandworm has executed several destructive operations on behalf of the Russian government, primarily targeting adversaries decades over the years. One of their most infamous attacks occurred in Ukraine in December 2015, which left approximately 230,000 residents without power for six hours during a frigid winter. The hackers utilized general-purpose malware, thereby infiltrating critical systems and disrupting power distribution with legitimate operational controls.
In the context of MITRE ATT&CK, several tactics and techniques could potentially have been employed during this incident. Initial access, for instance, may have involved exploiting vulnerabilities in the target infrastructure. Persistence could have been achieved through the establishment of backdoors or other covert methods, while privilege escalation techniques could have allowed attackers to gain authority over critical operational systems.
This recent cyber incident underscores the ongoing cybersecurity risks faced by critical infrastructure sectors and illustrates the considerable threat posed by sophisticated adversaries employing wiper malware. Business owners must remain diligent in their cyber defense strategies, acknowledge evolving threats, and ensure that their operational frameworks are adequately fortified against potential disruptions.