Sandworm hackers linked to failed wiper attack on Poland’s energy systems
嗯,用户让我帮忙总结一下这篇文章的内容,控制在一百个字以内,而且不需要用“文章内容总结”或者“这篇文章”这样的开头。直接写描述就行。 首先,我需要通读整篇文章,抓住主要信息。文章讲的是2025年12月底波兰电网遭受的网络攻击,被归咎于俄罗斯支持的Sandworm黑客组织。他们使用了一种名为DynoWiper的新恶意软件,试图破坏数据。Sandworm之前还攻击过乌克兰的电网,导致大规模停电。 接下来,我需要提取关键点:时间、地点、攻击者、使用的工具、影响以及背景信息。这些是总结中必须包含的内容。 然后,控制在一百个字以内,这意味着要简洁明了。可能需要合并一些信息,比如提到Sandworm的历史攻击行为,以显示其一贯性。 最后,确保语言流畅自然,不使用任何开头模板。直接陈述事实即可。 现在开始组织语言:波兰电网在2025年12月遭受网络攻击,由俄罗斯支持的Sandworm组织使用DynoWiper恶意软件破坏数据。该组织曾于2015年攻击乌克兰电网导致停电。 检查字数是否在限制内,并确保所有关键点都被涵盖。 </think> 波兰电网在2025年12月底遭受网络攻击,由俄罗斯支持的Sandworm黑客组织使用新恶意软件DynoWiper破坏数据。该组织曾于2015年对乌克兰电网发动类似攻击,导致大规模停电。 2026-1-24 22:0:31 Author: www.bleepingcomputer.com(查看原文) 阅读量:3 收藏

Sandworm

A cyberattack targeting Poland’s power grid in late December 2025 has been linked to the Russian state-sponsored hacking group Sandworm, which attempted to deploy a new destructive data-wiping malware dubbed DynoWiper during the attack..

Sandworm (also tracked as UAC-0113, APT44, and Seashell Blizzard) is a Russian nation-state hacking group that has been active since 2009. The group is believed to be part of Russia's Military Unit 74455 of the Main Intelligence Directorate (GRU) and is known for carrying out disruptive and destructive attacks.

Almost exactly 10 years earlier, Sandworm conducted a destructive data-wiping attack on Ukraine's energy grid that left approximately 230,000 people without power. 

Wiz

According to ESET, Sandworm has now been linked to the December 29-30th attack on Poland's energy infrastructure, which used a data wiper called DynoWiper.

When executed, data wipers iterate through a filesystem, deleting files. When finished, the operating system is left unusable and must be rebuilt from backups or reinstalled. 

In a press statement, Polish officials said the attack targeted two combined heat and power plants as well as a management system used to control electricity generated from renewable sources such as wind turbines and photovoltaic farms.

"Everything indicates that these attacks were prepared by groups directly linked to the Russian services," Poland's Prime Minister Donald Tusk said at a press conference.

ESET has not shared many technical details about DynoWiper, only stating that the antivirus company detects it as Win32/KillFiles.NMO and that it has a SHA-1 hash of 4EC3C90846AF6B79EE1A5188EEFA3FD21F6D4CF6.

BleepingComputer has not been able to find a sample of the wiper uploaded to VirusTotal, Triage, Any.Run, and other malware submission sites.

While it is unclear how long the threat actors remained within Poland's systems or how they were breached, Senior Threat Intel Advisor for Team Cymru Will Thomas (aka BushidoToken) recommends that defenders read Microsoft's February 2025 report on Sandworm.

More recently, Sandworm was linked to destructive data-wiping attacks on Ukraine's education, government, and the grain sector in June and September 2025. 

Wiz

Secrets Security Cheat Sheet: From Sprawl to Control

Whether you're cleaning up old keys or setting guardrails for AI-generated code, this guide helps your team build securely from the start.

Get the cheat sheet and take the guesswork out of secrets management.


文章来源: https://www.bleepingcomputer.com/news/security/sandworm-hackers-linked-to-failed-wiper-attack-on-polands-energy-systems/
如有侵权请联系:admin#unsafe.sh