In the final days of December 2025, the landscape of critical infrastructure security shifted. A coordinated cyberattack targeted Poland’s power grid, marking what experts define as the first major offensive specifically designed to exploit the decentralized nature of modern green energy systems. Attributed to the Russian state-sponsored group ELECTRUM (a cluster closely linked to the notorious Sandworm APT), the operation did not target a single massive power plant, but rather the "edge" of the grid.

What Happened: The Decentralized Strike

The attack compromised approximately 30 distributed energy resource (DER) sites across Poland. These included a mix of wind farms, solar installations, and combined heat and power (CHP) plants. Unlike previous attacks on power grids, such as the 2015 and 2016 strikes on Ukraine, which targeted regional distribution substations, this campaign focused on the smaller, often less-protected nodes that feed into the national system.

While the incident did not result in immediate, widespread blackouts, the technical sophistication was high. Attackers successfully disabled remote monitoring and control systems, effectively "blinding" grid operators to the status of these facilities. According to Dragos Intelligence, the breach compromised roughly 1.5 gigawatts of potential energy production, representing approximately 5% of Poland’s total energy supply. This volume of power is more than enough to cause frequency instability if the attackers had chosen to abruptly disconnect the units from the grid.

Technical Details: Targeting the RTU

The attackers gained access by exploiting vulnerabilities in Remote Terminal Units (RTUs)—the hardware devices that interface between physical equipment and digital control systems. By compromising these units, ELECTRUM was able to execute unauthorized commands and disrupt the communication protocols used by Industrial Control Systems (ICS).

The methodology suggests a deep understanding of the IEC 60870-5-104 protocol, commonly used in European power systems. Security researchers from CERT Polska and Dragos noted that the attackers utilized custom malware designed to persist within the RTU firmware. This allowed them to maintain long-term access and bypass traditional perimeter defenses. Crucially, many of the targeted DER sites fell below the regulatory thresholds for mandatory high-level cybersecurity protections, making them "soft targets" compared to large-scale nuclear or coal-fired plants.

Impact Assessment: A Shift in Strategy

The impact of this attack is measured less in immediate darkness and more in the exposure of a systemic vulnerability. The shift toward renewable energy has led to a "fragmented" grid. Where we once had a few dozen massive generation points, we now have thousands of smaller DERs. This attack proved that an adversary doesn't need to take down a massive plant to threaten national stability; they can aggregate the impact of dozens of smaller sites.

The attribution to ELECTRUM/Sandworm is significant. This group has a history of aggressive, disruptive operations. By targeting Poland—a key NATO ally and logistical hub for aid to Ukraine—the attackers sent a clear geopolitical signal. The moderate confidence attribution suggests a level of tradecraft consistent with state-sponsored actors who have spent years refining their ability to manipulate electrical infrastructure.

What You Should Do: Securing the Edge

For security professionals managing industrial or IoT-integrated environments, this incident is a wake-up call to secure the "edge."

  • Audit Your RTUs: Ensure that all Remote Terminal Units and Gateways have updated firmware and that default credentials have been changed.
  • Implement Network Segmentation: DER sites should be isolated from the public internet and separated from corporate networks via robust firewalls and unidirectional gateways.
  • Monitor for Protocol Anomalies: Use ICS-aware network monitoring tools to detect unusual IEC 104 or Modbus traffic that could indicate unauthorized command execution.
  • Review Regulatory Compliance: Even if your facility falls below the legal threshold for mandatory security (e.g., under the NIS2 Directive in Europe), treat it as critical infrastructure. The attackers clearly do.

Lessons Learned: The Green Energy Security Gap

The Poland incident highlights a "security gap" in the global transition to green energy. As we move toward Net Zero targets, we are inadvertently increasing the attack surface of the power grid. Security must be "baked in" to the deployment of wind and solar, not added as an afterthought.

The fact that 30 facilities were hit simultaneously demonstrates that attackers are now thinking at scale. The lesson for the global community is clear: the decentralization of energy production must be met with a decentralization of security monitoring. We can no longer rely on protecting the "center" of the grid; we must protect every point where power meets the wire.

Resources