Hacking Attempt Reported at Poland’s Nuclear Research Center
Security WeekArchived Mar 16, 2026✓ Full text saved
Initial evidence indicates Iran may be behind the attack, but officials admitted it could be a false flag. The post Hacking Attempt Reported at Poland’s Nuclear Research Center appeared first on SecurityWeek .
Full text archived locally
✦ AI Summary· Claude Sonnet
Poland’s national nuclear research center was recently targeted in a cyberattack that may have been conducted by Iranian hackers.
The National Centre for Nuclear Research (NCBJ) is Poland’s largest research institute focused on nuclear science and technology. It operates the country’s only nuclear research reactor, MARIA, and conducts research in nuclear and particle physics, reactor technology, radiopharmaceuticals for medical applications, and industrial and environmental applications.
NCBJ also supports Poland’s civilian nuclear power program, but it does not conduct any military-related activities. Poland does not have a nuclear weapons program.
[ Read: Iranian Hacker Attack on Stryker Disrupted Manufacturing and Shipping ]
In a statement issued last week, the NCBJ said its IT infrastructure was recently targeted by hackers, but the attempt was thwarted and systems have not been compromised.
“There was no disruption to any production, operational or research processes, and the MARIA reactor works safely and without interference, with full power,” reads a translation of a statement from Jakub Kupecki, the nuclear center’s director.
Deputy Prime Minister and Minister of Digital Affairs Krzysztof Gawkowski told news broadcaster TVN24+ that early indicators suggest Iran as the source of the hacking attempt. He cautioned, however, that the evidence might have been planted to mislead investigators and obscure the true origin.
The attack on Poland’s nuclear research center comes roughly two months after a threat actor targeted the country’s power grid.
The power grid attack, attributed to a Russian group, did not result in any electrical outages, but did lead to permanent damage to some industrial control systems (ICS).
Related: US Cyber Strategy Targets Adversaries, Critical Infrastructure, and Emerging Technologies
Related: 3 Threat Groups Started Targeting ICS/OT in 2025: Dragos
Related: US Braces for Cyberattacks After Bombing Iranian Nuclear Sites
WRITTEN BY
Eduard Kovacs
Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
Iran-Linked Hacker Attack on Stryker Disrupted Manufacturing and Shipping
Authorities Disrupt SocksEscort Proxy Service Powered by AVrecon Botnet
Apple Updates Legacy iOS Versions to Patch Coruna Exploits
Meta Launches New Protection Tools as It Helps Disrupt Scam Centers
Polyfill Supply Chain Attack Impacting 100k Sites Linked to North Korea
MedTech Giant Stryker Crippled by Iran-Linked Hacker Attack
Wiz Joins Google Cloud as Landmark Acquisition Closes
OpenAI to Acquire AI Security Startup Promptfoo
Latest News
Oracle EBS Hack: Only 4 Corporate Giants Still Silent on Potential Impact
Security Firm Executive Targeted in Sophisticated Phishing Attack
China-Linked Hackers Hit Asian Militaries in Patient Espionage Operation
Threat Actor Targeting VPN Users in New Credential Theft Campaign
ForceMemo: Python Repositories Compromised in GlassWorm Aftermath
Loblaw Data Breach Impacts Customer Information
Critical HPE AOS-CX Vulnerability Allows Admin Password Resets
Starbucks Data Breach Impacts Employees
Trending
Webinar: Securing Fragile OT In An Exposed World
March 10, 2026
Get a candid look at the current OT threat landscape as we move past "doom and gloom" to discuss the mechanics of modern OT exposure.
Register
Virtual Event: Supply Chain Security And Third-Party Risk Summit
March 18, 2026
Join the event where top security experts unpack the biggest software supply chain risks.
Register
People on the Move
The US Senate has confirmed Army Lt. Gen. Joshua Rudd to lead NSA and CYBERCOM.
Business software company Rippling has appointed Adrian Ludwig as CSO.
Orca Security has named Rachel Nislick as Chief Marketing Officer.
More People On The Move
Expert Insights
The Human IOC: Why Security Professionals Struggle With Social Vetting
Applying SOC-level rigor to the rumors, politics, and 'human intel' can make or break a security team. (Joshua Goldfarb)
How To 10x Your Vulnerability Management Program In The Agentic Era
The evolution of vulnerability management in the agentic era is characterized by continuous telemetry, contextual prioritization and the ultimate goal of agentic remediation. (Nadir Izrael)
SIM Swaps Expose A Critical Flaw In Identity Security
SIM swap attacks exploit misplaced trust in phone numbers and human processes to bypass authentication controls and seize high-value accounts. (Torsten George)
Four Risks Boards Cannot Treat As Background Noise
The goal isn’t about preventing every attack but about keeping the business running when attacks succeed. (Steve Durbin)
How To Eliminate The Technical Debt Of Insecure AI-Assisted Software Development
Developers must view AI as a collaborator to be closely monitored, rather than an autonomous entity to be unleashed. Without such a mindset, crippling tech debt is inevitable. (Matias Madou)
Flipboard
Reddit
Whatsapp
Email