Russia-Aligned ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid - The Hacker News
The Hacker NewsArchived Mar 16, 2026✓ Full text saved
Russia-Aligned ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid The Hacker News
Full text archived locally
✦ AI Summary· Claude Sonnet
Russia-Aligned ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid
Ravie LakshmananJan 28, 2026Critical Infrastructure / Threat Intelligence
The "coordinated" cyber attack targeting multiple sites across the Polish power grid has been attributed with medium confidence to a Russian state-sponsored hacking crew known as ELECTRUM.
Operational technology (OT) cybersecurity company Dragos, in a new intelligence brief published Tuesday, described the late December 2025 activity as the first major cyber attack targeting distributed energy resources (DERs).
"The attack affected communication and control systems at combined heat and power (CHP) facilities and systems managing the dispatch of renewable energy systems from wind and solar sites," Dragos said. "While the attack did not result in power outages, adversaries gained access to operational technology systems critical to grid operations and disabled key equipment beyond repair at the site."
It's worth pointing out that ELECTRUM and KAMACITE share overlaps with a cluster referred to as Sandworm (aka APT44 and Seashell Blizzard). KAMACITE focuses on establishing and maintaining initial access to targeted organizations using spear-phishing, stolen credentials, and exploitation of exposed services.
Beyond initial access, the threat actor performs reconnaissance and persistence activities over extended periods of time as part of efforts to burrow deep into target OT environments and keep a low profile, signaling a careful preparatory phase that precedes actions executed by ELECTRUM targeting the industrial control systems.
"Following access enablement, ELECTRUM conducts operations that bridge IT and OT environments, deploying tooling within operational networks, and performs ICS-specific actions that manipulate control systems or disrupt physical processes," Dragos said. "These actions have included both manual interactions with operator interfaces and the deployment of purpose-built ICS malware, depending on the operational requirements and objectives."
Put differently, the two clusters have clear separation of roles and responsibilities, enabling flexibility in execution and facilitating sustained OT-focused intrusions when conditions are favourable. As recently as July 2025, KAMACITE is said to have engaged in scanning activity against industrial devices located in the U.S.
Although no follow-on OT disruptions have been publicly reported to date, this highlights an operational model that is not geographically constrained and facilitates early-stage access identification and positioning.
"KAMACITE's access-oriented operations create the conditions under which OT impact becomes possible, while ELECTRUM applies execution tradecraft when timing, access, and risk tolerance align," it explained. "This division of labor enables flexibility in execution and allows OT impact to remain an option, even when it is not immediately exercised. This extends risk beyond discrete incidents and into prolonged periods of latent exposure."
Dragos said the Poland attack targeted systems that facilitate communication and control between grid operators and DER assets, including assets that enable network connectivity, allowing the adversary to successfully disrupt operations at about 30 distributed generation sites.
The threat actors are assessed to have breached Remote Terminal Units (RTUs) and communication infrastructure at the affected sites using exposed network devices and exploited vulnerabilities as initial access vectors. The findings indicate that the attackers possess a deep understanding of electrical grid infrastructure, allowing them to disable communications equipment, including some OT devices.
That said, the full scope of the malicious actions undertaken by ELECTRUM is unknown, with Dragos noting that it's unclear if the threat actor attempted to issue operational commands to this equipment or focused solely on disabling communications.
The Poland attack is also assessed to be more opportunistic and rushed than a precisely planned operation, allowing the hackers to take advantage of the unauthorized access to inflict as much damage as possible by wiping Windows-based devices to impede recovery, resetting configurations, or attempting to permanently brick equipment. The majority of the equipment is targeted at grid safety and stability monitoring, per Dragos.
"This incident demonstrates that adversaries with OT-specific capabilities are actively targeting systems that monitor and control distributed generation," it added. "The disabling of certain OT or industrial control system (ICS) equipment beyond repair at the site moved what could have been seen as a pre-positioning attempt by the adversary into an attack."
Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.
SHARE
Tweet
Share
Share
SHARE
critical infrastructure, cybersecurity, Industrial Control Systems, Operational Technology, Threat Intelligence
Trending News
OpenAI Codex Security Scanned 1.2 Million Commits and Found 10,561 High-Severity Issues
Microsoft Reveals ClickFix Campaign Using Windows Terminal to Deploy Lumma Stealer
APT28 Tied to CVE-2026-21513 MSHTML 0-Day Exploited Before Feb 2026 Patch Tuesday
Google Confirms CVE-2026-21385 in Qualcomm Android Component Exploited
Starkiller Phishing Suite Uses AitM Reverse Proxy to Bypass Multi-Factor Authentication
149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict
⚡ Weekly Recap: Qualcomm 0-Day, iOS Exploit Chains, AirSnitch Attack and Vibe-Coded Malware
Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries
Anthropic Finds 22 Firefox Vulnerabilities Using Claude Opus 4.6 AI Model
ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket
Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities
Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1
ThreatsDay Bulletin: DDR5 Bot Scalping, Samsung TV Tracking, Reddit Privacy Fine and More
New Chrome Vulnerability Let Malicious Extensions Escalate Privileges via Gemini Panel
Load More ▼
Popular Resources
Self-Hosted WAF: Block SQLi, XSS, and Bots Before They Reach Your Apps
Read CYBER360 2026: From Zero Trust Limits to Data-Centric Security Paths
Identity Controls Checklist: Find Missing Protections in Apps
19,053 Confirmed Breaches in 2025 – Key Trends and Predictions for 2026