2025 Poland Wiper Attacks

2025 Poland Wiper Attacks is a Russian state-sponsored campaign that conducted destructive cyberattacks against Polish energy infrastructure in December 2025. Targets included more than 30 wind and photovoltaic farms, a combined heat and power (CHP) plant, and a manufacturing sector company. The attacks on the distributed energy resources (DER) disrupted communications between affected facilities and the distribution system operator, but did not impact electricity generation or heat supply. Across the campaign, threat actors deployed two previously undocumented wiper tools, DynoWiper, a Windows-based wiper and LazyWiper, a PowerShell wiper, distributed via malicious Group Policy Objects. At the CHP plant, threat actors had maintained access since at least March 2025, using that foothold to obtain credentials and move laterally before attempting wiper deployment. Some reporting has assessed the activity to be consistent with Russian Federal Security Service (FSB) threat activity group Dragonfly, also tracked as STATIC TUNDRA, while other reporting attributes the destructive wiper activities to the Russian General Staff Main Intelligence Directorate (GRU) threat activity group ELECTRUM, also tracked as Sandworm Team.[1][2][3][4]

ID: C0063
First Seen:  March 2025 [1][2]
Last Seen:  December 2025 [1][2]
Associated Campaigns: 2025 Poland Wiper Campaign
Contributors: Dragos Threat Intelligence
Version: 1.0
Created: 22 April 2026
Last Modified: 23 April 2026

Techniques Used

Domain ID Name Use
Enterprise T1583 .006 Acquire Infrastructure: Web Services

During the 2025 Poland Wiper Attacks, the adversaries configured the FortiGate devices to send notifications to an attacker-controlled Slack channel. During the 2025 Poland Wiper Attacks, the adversaries had also staged tools and files on services such as Dropbox and Pastebin.[1]

Enterprise T1560 .001 Archive Collected Data: Archive via Utility

During the 2025 Poland Wiper Attacks, the adversaries compressed stolen files into a zip file prior to exfiltration.[1]

Enterprise T1110 .002 Brute Force: Password Cracking

During the 2025 Poland Wiper Attacks, the adversaries attempted to crack user passwords.[1]

Enterprise T1059 .003 Command and Scripting Interpreter: Windows Command Shell

During the 2025 Poland Wiper Attacks, the adversaries leveraged PsExec to run cmd.exe commands on multiple victim machines.[1]

.004 Command and Scripting Interpreter: Unix Shell

During the 2025 Poland Wiper Attacks, the adversaries utilized the Linux dd command to overwrite portions of the disks with random data.[1]

.008 Command and Scripting Interpreter: Network Device CLI

During the 2025 Poland Wiper Attacks, the adversaries leveraged the native CLI of the targeted FortiGate device.[1]

Enterprise T1584 .001 Compromise Infrastructure: Domains

During the 2025 Poland Wiper Attacks, the adversaries compromised infrastructure to use for C2.[4]

.003 Compromise Infrastructure: Virtual Private Server

During the 2025 Poland Wiper Attacks, the adversaries used compromised VPS servers for C2.[1]

.008 Compromise Infrastructure: Network Devices

During the 2025 Poland Wiper Attacks, the adversaries used compromised Cisco routers for network communications.[1]

Enterprise T1555 Credentials from Password Stores

During the 2025 Poland Wiper Attacks, the adversaries configured a native CLI to gather a targeted elevated users password using grep.[1]

Enterprise T1485 Data Destruction

During the 2025 Poland Wiper Attacks, the adversaries utilized wiper malware to overwrite files using a 16-byte buffer that fully overwrites files 16 bytes or smaller or partially overwrites files greater than 16 bytes to speed up the process.[3][4]

Enterprise T1530 Data from Cloud Storage

During the 2025 Poland Wiper Attacks, the adversaries leveraged stolen credentials within cloud services to download targeted data from SharePoint, and Teams.[1]

Enterprise T1602 .002 Data from Configuration Repository: Network Device Configuration Dump

During the 2025 Poland Wiper Attacks, the adversaries gathered and used the FortiGate bookmarks defined in the configuration file to include the statically defined credentials that facilitated RDP connections to jump hosts.[1]

Enterprise T1074 .001 Data Staged: Local Data Staging

During the 2025 Poland Wiper Attacks, the adversaries compiled discovery data locally on the victim host in a file located within C:\Windows\TEMP\outlog.txt.[1]

Enterprise T1140 Deobfuscate/Decode Files or Information

During the 2025 Poland Wiper Attacks, the adversaries decoded a Base64-encoded ZIP archive using the built-in certutil.[1]

Enterprise T1587 .001 Develop Capabilities: Malware

During the 2025 Poland Wiper Attacks, the adversaries observed that their malware was initially detected by the victims EDR solutions, so they modified the payload and attempted to execute the new version within the same day.[1][3][4]

Enterprise T1006 Direct Volume Access

During the 2025 Poland Wiper Attacks, the adversaries copied volume shadow copies through executing vssadmin in order to dump the NTDS.dit file.[1]

Enterprise T1686 .002 Disable or Modify System Firewall: Network Device Firewall

During the 2025 Poland Wiper Attacks, the adversaries modified security settings within the victims Fortigate device, utilizing the native CLI. During the 2025 Poland Wiper Attacks, the adversaries also disabled network traffic logging.[1]

Enterprise T1484 .001 Domain or Tenant Policy Modification: Group Policy Modification

During the 2025 Poland Wiper Attacks, the adversaries had leveraged Group Policy Objects to distribute wiper malware to victim devices through a network share.[1]

Enterprise T1114 .002 Email Collection: Remote Email Collection

During the 2025 Poland Wiper Attacks, the adversaries leveraged stolen credentials within cloud services to gather data and email messages from Exchange services related to OT topics and technical work carried out within organizations.[1]

Enterprise T1048 .003 Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol

During the 2025 Poland Wiper Attacks, the adversaries exfiltrated data to an actor-controlled infrastructure using HTTP POSTs.[1]

Enterprise T1567 .004 Exfiltration Over Web Service: Exfiltration Over Webhook

During the 2025 Poland Wiper Attacks, the adversaries leveraged an attacker-controlled Slack channel to exfiltrate data.[1]

Enterprise T1133 External Remote Services

During the 2025 Poland Wiper Attacks, threat actors leveraged the FortiGate VPN interface that was exposed to the internet to gain access to the victim environment.[1][2]

Enterprise T1083 File and Directory Discovery

During the 2025 Poland Wiper Attacks, the adversaries obtained the contents of users’ directories using dir /s /b C:\Users command.[1]

Enterprise T1495 Firmware Corruption

During the 2025 Poland Wiper Attacks, adversaries performed a factory-reset on compromised devices that hampered forensic investigations.[1]

Enterprise T1590 .006 Gather Victim Network Information: Network Security Appliances

During the 2025 Poland Wiper Attacks, the adversaries obtained details on the configuration of the victim Fortinet perimeter device to include publicly disclosed details on an online forum used by criminal communities.[1]

Enterprise T1105 Ingress Tool Transfer

During the 2025 Poland Wiper Attacks, the adversaries downloaded malicious payloads to the victim server.[1]

Enterprise T1490 Inhibit System Recovery

During the 2025 Poland Wiper Attacks, the adversaries deleted Windows Volume Shadow Copies using vssadmin delete shadows.[1]

Enterprise T1570 Lateral Tool Transfer

During the 2025 Poland Wiper Attacks, the adversaries had placed the malicious payload on an accessible network share to facilitate propagation.[1][3][4]

Enterprise T1036 .005 Masquerading: Match Legitimate Resource Name or Location

During the 2025 Poland Wiper Attacks, the adversaries created rules that mimicked the name of an institution already present in the network device configuration to avoid detection.[1]

Enterprise T1556 .006 Modify Authentication Process: Multi-Factor Authentication

During the 2025 Poland Wiper Attacks, the adversaries modified two-factor settings within the FortiGate solution to unset.[1]

Enterprise T1046 Network Service Discovery

During the 2025 Poland Wiper Attacks, the adversaries utilized Ping, the Advanced Port Scanner and Advanced IP Scanner to enumerate network devices.[1]

Enterprise T1571 Non-Standard Port

During the 2025 Poland Wiper Attacks, the adversaries had created a Reverse SOCKS Proxy and communicated over the non-standard port 8008.[1][4]

Enterprise T1027 .013 Obfuscated Files or Information: Encrypted/Encoded File

During the 2025 Poland Wiper Attacks, the adversaries utilized a Base64-encoded ZIP archive to prevent content analysis.[1]

Enterprise T1588 .007 Obtain Capabilities: Artificial Intelligence

During the 2025 Poland Wiper Attacks, the adversaries generated custom script with an LLM.[1]

Enterprise T1003 .001 OS Credential Dumping: LSASS Memory

During the 2025 Poland Wiper Attacks, the adversaries attempted to dump credentials utilizing LSASS.[1][4]

.002 OS Credential Dumping: Security Account Manager

During the 2025 Poland Wiper Attacks, the adversaries had stolen Security Account Manager (SAM) and SYSTEM registry hives.[1]

.003 OS Credential Dumping: NTDS

During the 2025 Poland Wiper Attacks, the adversaries dumped the entire Active Directory database by extracting the contents of the ntds.dit file.[1]

Enterprise T1057 Process Discovery

During the 2025 Poland Wiper Attacks, the adversaries enumerated current running processes using tasklist.[1]

Enterprise T1090 Proxy

During the 2025 Poland Wiper Attacks, the adversaries utilized the rsocx tool identified as r.exe and rsocx.exe to tunnel within the internal infrastructure using a Reverse SOCKS Proxy.[1][4]

.003 Multi-hop Proxy

During the 2025 Poland Wiper Attacks, the adversaries utilized Tor nodes for C2.[1]

Enterprise T1021 .001 Remote Services: Remote Desktop Protocol

During the 2025 Poland Wiper Attacks, adversaries utilized RDP to log into jump hosts and then moved laterally to other victim devices to include a domain controller.[1]

Enterprise T1053 Scheduled Task/Job

During the 2025 Poland Wiper Attacks, the adversaries set FortiGate scheduled tasks to run the adversary generated CLI scripts weekly.[1]

Enterprise T1113 Screen Capture

During the 2025 Poland Wiper Attacks, the adversaries captured screenshots of devices using nircmd console through the command nircmd.exe "savescreenshot C:\Windows\Temp\imagetmp.png.[1]

Enterprise T1608 .002 Stage Capabilities: Upload Tool

During the 2025 Poland Wiper Attacks, the adversaries had staged tools and files for use on Dropbox and Pastebin.[1]

Enterprise T1558 Steal or Forge Kerberos Tickets

During the 2025 Poland Wiper Attacks, the adversaries used the Rubeus tool to forge a Diamond Ticket that is a modified legitimate Kerberos ticket.[1]

Enterprise T1016 System Network Configuration Discovery

During the 2025 Poland Wiper Attacks, the adversaries gathered network configuration details utilizing arp -a and nslookup commands. [1]

Enterprise T1049 System Network Connections Discovery

During the 2025 Poland Wiper Attacks, the adversaries identified network connections utilizing netstat -nao and netstat -r.[1]

Enterprise T1529 System Shutdown/Reboot

During the 2025 Poland Wiper Attacks, the adversaries forced victim devices to reboot to finalize destruction of impacted systems.[3][4]

Enterprise T1550 .002 Use Alternate Authentication Material: Pass the Hash

During the 2025 Poland Wiper Attacks, the adversaries attempted to reuse password hash values to gain access to other systems.[1]

Enterprise T1078 .002 Valid Accounts: Domain Accounts

During the 2025 Poland Wiper Attacks, threat actors utilized privileged accounts to access the FortiGate VPN solution and subsequent subnets.[1]

.004 Valid Accounts: Cloud Accounts

During the 2025 Poland Wiper Attacks, the adversaries leveraged stolen credentials from on-premises environments to access cloud services.[1]

Enterprise T1102 .002 Web Service: Bidirectional Communication

During the 2025 Poland Wiper Attacks, the adversaries had communicated to both Dropbox and Pastebin.[1]

ICS T0892 Change Credential

During the 2025 Poland Wiper Attacks, the adversaries changed the login password of Moxa NPort Serial Device Servers to impede system recovery.[1]

ICS T0807 Command-Line Interface

During the 2025 Poland Wiper Attacks, the adversaries executed PowerShell commands on the Human Machine Interface (HMI) to make configuration changes that enabled administrative shares and created a new firewall rule to enable traffic over port 445 as well as conducted network reconnaissance activities.[1]

During the 2025 Poland Wiper Attacks, the adversaries executed PowerShell commands on the domain controller that collected and exfiltrated the SAM and SYSTEM registry hives and the Active Directory database (ntds.dit).[1]

During the 2025 Poland Wiper Attacks, the adversaries logged into the Mikronika RTUs via SSH, with root privileges, and executed Linux commands to delete all the files on the system resulting in device failure.[1]

ICS T0885 Commonly Used Port

During the 2025 Poland Wiper Attacks, the adversaries enabled TCP port 445 on Mikronika HMI devices creating a new firewall rule named "Microsoft Update".[1]

ICS T0809 Data Destruction

During the 2025 Poland Wiper Attacks, the adversaries used DynoWiper and built-in commands to destroy data on Mikronika RTUs, Hitachi Relion Protection and Control Relays (IEDs), and HMI workstations.[1]

During the 2025 Poland Wiper Attacks, the adversaries used LazyWiper to destroy data at a manufacturing sector company.[1]

ICS T0816 Device Restart/Shutdown

During the 2025 Poland Wiper Attacks, the adversaries corrupted the firmware in the Hitachi RTUs resulting in a fault that triggered a reboot loop.[1]

ICS T0822 External Remote Services

During the 2025 Poland Wiper Attacks, the adversaries gained initial access by compromising Fortinet edge devices. [1]

ICS T0823 Graphical User Interface

During the 2025 Poland Wiper Attacks, the adversaries used a graphical user interface (GUI) via the Remote Desktop Protocol (RDP) to access the Mikronika HMI and to execute commands.[1]

During the 2025 Poland Wiper Attacks, the adversaries used a graphical user interface (GUI) to connect to the domain controller via the Remote Desktop Protocol (RDP) to collect and exfiltrate data and attempt to destroy data on the system.[1]

ICS T1694 .001 Insecure Credentials: Default Credentials

During the 2025 Poland Wiper Attacks, the adversaries used default credentials to access Hitatchi RTUs, Mikronika RTUs, Hitachi Relion Protection and Control Relays, Mikronika HMI Computers, and Moxa NPort Serial Device Servers.[1]

ICS T0827 Loss of Control

During the 2025 Poland Wiper Attacks, the adversaries damaged the Mikronika RTUs, Hitachi Relion Protection and Control Relays (IEDs), and HMI workstations resulting in a loss of communications and control between the facility and the distribution system operators (DSO).[1]

ICS T0829 Loss of View

During the 2025 Poland Wiper Attacks, the adversaries wiped devices and also damaged Mikronika RTUs, Hitachi Relion Protection and Control Relays (IEDs), and HMI workstations resulting in a loss of communications and view between the facility and the distribution system operators (DSO).[1][2]

ICS T1693 .001 Modify Firmware: System Firmware

During the 2025 Poland Wiper Attacks, the adversaries corrupted the firmware in the Hitachi RTUs resulting in a fault that triggered a reboot loop.[1]

ICS T0840 Network Connection Enumeration

During the 2025 Poland Wiper Attacks, the adversaries used netstat to enumerate network connections on the Mikronika HMI computers.[1]

ICS T0886 Remote Services

During the 2025 Poland Wiper Attacks, the adversaries gained initial access to the operational technology via the compromised Fortinet edge devices, and used used SSH, RDP, and SMB/Windows Admin Shares to connect to remote systems and execute commands.[1]

ICS T0846 Remote System Discovery

During the 2025 Poland Wiper Attacks, the adversaries used nslookup and ping to conduct remote system discovery activities.[1]

.001 Port Scan

During the 2025 Poland Wiper Attacks, the adversaries used Advanced Port Scanner and Advanced IP Scanner to conduct remote system discovery activities.[1]

.002 Broadcast Discovery

During the 2025 Poland Wiper Attacks, the adversaries used arp to conduct remote system discovery activities.[1]

ICS T0888 Remote System Information Discovery

During the 2025 Poland Wiper Attacks, the adversaries remotely executed commands on systems using PsExec to gather information about running processes, network connections, routing tables, ARP cache, and contents of user directories.[1]

ICS T0852 Screen Capture

During the 2025 Poland Wiper Attacks, the adversaries used the nircmd utility to capture screenshots of systems.[1]

ICS T0882 Theft of Operational Information

During the 2025 Poland Wiper Attacks, the adversaries stole sensitive operational information that was used to plan the attack on the operational technology systems.[1]

ICS T0859 Valid Accounts

During the 2025 Poland Wiper Attacks, the adversaries used valid accounts to access Hitatchi RTUs, Mikronika RTUs, Hitachi Relion Protection and Control Relays, Mikronika HMI Computers, and Moxa NPort Serial Device Servers.[1]

Software

ID Name Description
S0099 Arp

During the 2025 Poland Wiper Attacks, the adversaries used Arp to write to a file named outlog.txt, including: currently running processes, network connections, routing tables, ARP cache, and the contents of user directories.[1]

S0160 certutil

During the 2025 Poland Wiper Attacks, the adversaries decoded a Base64-encoded ZIP archive using the built-in certutil.[1]

S9038 DynoWiper

DynoWiper was used for destructive attacks during the 2025 Poland Wiper Attacks.[1][3]

S0357 Impacket

During the 2025 Poland Wiper Attacks, the adversaries used Impacket for lateral movement.[1]

S9039 LazyWiper

LazyWiper was used to conduct destructive attacks during the 2025 Poland Wiper Attacks.[1]

S0104 netstat

During the 2025 Poland Wiper Attacks, the adversaries used netstat to conduct reconnaissance, running C:\Windows\TEMP\outlog.txt && netstat -nao.[1]

S0097 Ping

During the 2025 Poland Wiper Attacks, the adversaries had utilized Ping to enumerate network devices.[1]

S0029 PsExec

During the 2025 Poland Wiper Attacks, the adversaries used PsExec to execute programs on target machines.[1]

S1071 Rubeus

During the 2025 Poland Wiper Attacks, the adversaries used the Rubeus tool to forge a Diamond Ticket that is a modified legitimate Kerberos ticket.[1][4]

S0057 Tasklist

During the 2025 Poland Wiper Attacks, the adversaries used Tasklist for reconnaissance activities running cmd.exe /c "tasklist > C:\Windows\TEMP\outlog.txt && netstat -nao >> C:\Windows\TEMP\outlog.txt && netstat -r >> C:\Windows\TEMP\ outlog.txt && arp -a >> C:\Windows\TEMP\outlog.txt && dir /s /b C:\ Users >> C:\Windows\TEMP\outlog.txt.[1]

S0183 Tor

During the 2025 Poland Wiper Attacks, the adversaries utilized Tor nodes for C2.[1]

References