New DynoWiper Malware Used in Attempted Sandworm Attack on Polish Power Sector
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得通读全文,抓住主要信息。 文章主要讲的是俄罗斯的Sandworm黑客组织对波兰电力系统发动了大规模网络攻击,时间是在2025年12月底。这次攻击被描述为“最大的网络攻击”,但最终没有成功。波兰的能源部长提到这次攻击是近年来最强的,但没有造成破坏。 ESET的报告指出,Sandworm使用了一种新的擦除型恶意软件DynoWiper。攻击目标包括两个热电联产厂和一个管理可再生能源的系统。波兰总理表示这些攻击是由与俄罗斯有关的组织策划的,并准备加强网络安全措施。 此外,文章还提到这是Sandworm组织在乌克兰电力系统攻击十周年之际再次行动,显示了他们长期针对关键基础设施的历史。 现在我需要把这些信息浓缩到100字以内,确保涵盖主要事件、参与者、结果和背景。同时,不需要使用“文章内容总结”之类的开头语,直接描述即可。 </think> 俄罗斯黑客组织Sandworm被指对波兰电力系统发动大规模网络攻击,未成功。该组织使用新型擦除型恶意软件DynoWiper,目标包括热电联产厂和可再生能源管理系统。此次攻击发生在乌克兰电网遭袭十周年之际,显示Sandworm长期针对关键基础设施。 2026-1-24 08:21:0 Author: thehackernews.com(查看原文) 阅读量:0 收藏

Malware / Critical Infrastructure

The Russian nation-state hacking group known as Sandworm has been attributed to what has been described as the "largest cyber attack" targeting Poland's power system in the last week of December 2025.

The attack was unsuccessful, the country's energy minister, Milosz Motyka, said last week.

"The command of the cyberspace forces has diagnosed in the last days of the year the strongest attack on the energy infrastructure in years," Motyka was quoted as saying.

Cybersecurity

According to a new report by ESET, the attack was the work of Sandworm, which deployed a previously undocumented wiper malware codenamed DynoWiper. The links to Sandworm are based on overlaps with prior wiper activity associated with the adversary, particularly in the aftermath of Russia's military invasion of Ukraine in February 2022.

The Slovakian cybersecurity company, which identified the use of the wiper as part of the attempted disruptive attack aimed at the Polish energy sector on December 29, 2025, said there is no evidence of successful disruption.

The December 29 and 30, 2025, attacks targeted two combined heat and power (CHP) plants, as well as a system enabling the management of electricity generated from renewable energy sources such as wind turbines and photovoltaic farms, the Polish government said.

"Everything indicates that these attacks were prepared by groups directly linked to the Russian services," Prime Minister Donald Tusk said, adding the government is readying extra safeguards, including a key cybersecurity legislation that will impose strict requirements on risk management, protection of information technology (IT) and operational technology (OT) systems, and incident response.

It's worth noting that the activity occurred on the tenth anniversary of the Sandworm's attack against the Ukrainian power grid in December 2015, which led to the deployment of the BlackEnergy malware, plunging parts of the Ivano-Frankivsk region of Ukraine into darkness.

The trojan, which was used to plant a wiper malware dubbed KillDisk, caused a 4–6 hour power outage for approximately 230,000 people.

Cybersecurity

"Sandworm has a long history of disruptive cyberattacks, especially on Ukraine's critical infrastructure," ESET said. "Fast forward a decade and Sandworm continues to target entities operating in various critical infrastructure sectors."

In June 2025, Cisco Talos said a critical infrastructure entity within Ukraine was targeted by a previously unseen data wiper malware named PathWiper that shares some level of functional overlap with Sandworm's HermeticWiper.

The Russian hacking group has also been observed deploying data-wiping malware, such as ZEROLOT and Sting, in a Ukrainian university network, followed by serving multiple data-wiping malware variants against Ukrainian entities active in the governmental, energy, logistics, and grain sectors between June and September 2025.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/01/new-dynowiper-malware-used-in-attempted.html
如有侵权请联系:admin#unsafe.sh