Poland's energy grid was targeted by never-before-seen wiper malware
Posted by Bender 9 hours ago
Comments
Comment by altern8 7 hours ago
Potential damage: "Most notable was one [attack] in Ukraine in December 2015. It left roughly 230,000 people without electricity for about six hours during one of the coldest months of the year."
Comment by TheDauthi 4 hours ago
Thankfully, the article did clear that up, but the fact that my brain didn't even think, "that's a stupid idea that no one would buy that" is a bit depressing.
Comment by canada_dry 58 minutes ago
Why not?? Is Russia's grid infrastructure so old as to not be as vulnerable?
Comment by United857 1 hour ago
Comment by csomar 1 hour ago
We still operate with a primitive homunculi where a gunshot is considered aggressive, but sabotaging infrastructure that can kill hundreds from cold is being waved at.
Comment by tartoran 2 hours ago
Comment by HPsquared 7 hours ago
Comment by general1465 7 hours ago
On the bright side, using these weapon grade malware is burning exploits and also showing current state and techniques of Russian cyberwarfare which defender can learn a lot from.
Comment by WhyNotHugo 4 hours ago
Or perhaps they used an already-known malware to measure defensive capabilities without showing any of their cards.
Comment by mrtesthah 10 minutes ago
Comment by msuniverse2026 42 minutes ago
Comment by wolvesechoes 26 minutes ago
Comment by breve 7 hours ago
Comment by dijit 7 hours ago
It is totally fair to say that in a digital context, Russia is absolutely at war with Europe.
As far as I can tell, they don’t even try to hide it.
Comment by reactordev 7 hours ago
Comment by naryJane 5 hours ago
[0] https://www.rt.com/news/265399-putin-nato-europe-ukraine-ita...
[1] https://www.buzzfeednews.com/article/ilanbenmeir/that-time-t...
Comment by reactordev 3 hours ago
Comment by mrtesthah 8 minutes ago
Comment by cookiengineer 5 hours ago
Eversince notpetya and the colonial pipeline hack, the cyber strategy game changed a lot. Notpetya was genius as a deployment, because they abused the country's tax software deployment pipeline to cripple all (and I mean all, beyond 99%) businesses in one surgical strike.
The same is gonna happen to other tax software providers, because the DATEV AG and similar companies are pretty much the definition of digital incompetence wherever you look.
I could name other takedowns but the list would continue beyond a reasonable comment, especially with vendors like Hercules and Prophete that are now insolvent because they never prioritized cyber security at all, got hacked, didn't have backups, and ran out of money due to production plant costs.
Comment by throw310822 6 hours ago
Comment by pjc50 6 hours ago
Comment by bnjemian 6 hours ago
Comment by Zagitta 6 hours ago
But thanks for proving the point about Russia's disinformation war.
Comment by throw310822 35 minutes ago
Comment by tosapple 7 hours ago
Comment by jacquesm 5 hours ago
If they succeed they may well not be reversible. The question is if this had succeeded would we have shrugged it off again or responded appropriately?
Comment by K0balt 5 hours ago
Comment by 3eb7988a1663 4 hours ago
Stuxnet destroyed centrifuges. It does not seem impossible that a sophisticated attack could shred some critical equipment. During the Texas 2021 outage -they were incredibly close to losing the entire grid and being in a blackstart scenario. Estimates were that it could take weeks to bring back power - all this without any physical equipment destroyed or malicious code within the network.
Edit: Had to look it up, the Texas outage was "only" two weeks and scattershot in where it hit. The death toll is estimated at 246-702.
Comment by jacquesm 24 minutes ago
Yes, there is the risk of cascading failures, some industrial processes are very hard to re-start once interrupted (or even impossible) and the lead time on 'some transformers' can be a year or more. These are nothing like the kind that you can buy at the corner hardware store. A couple of hundred tons or so for the really large ones.
Grid infra is quite expensive, hard to replace and has very long lead times.
The very worst you could do is induce oscillations.
Comment by thimkerbell 1 hour ago
Comment by applied_heat 3 hours ago
Comment by sillywalk 2 hours ago
Bloomberg had a decent article[0] about transformers and their lead time. They're currently a bottleneck on building. It wasn't paywalled for me.
"The Covid-19 pandemic strained many supply chains, and most have recovered by now. The supply chain for transformers started experiencing troubles earlier — and it’s only worsened since. Instead of taking a few months to a year, the lead time for large transformer delivery is now three to five years. " [0]
[0] https://www.bloomberg.com/features/2025-bottlenecks-transfor...
Comment by esafak 3 hours ago
Comment by 3eb7988a1663 3 hours ago
Comment by jacquesm 27 minutes ago
Comment by genocidicbunny 3 hours ago
Comment by tosapple 5 hours ago
Comment by jacquesm 5 hours ago
Comment by tosapple 5 hours ago
Vietnam too.
Comment by shakna 5 hours ago
If you succeed in attacking the grid, you achieve the same widespread industry impact, without the cost of the munitions.
It can take decades to recover from a cyber attack like this, if it succeeds.
Comment by tosapple 5 hours ago
Comment by shakna 4 hours ago
These attacks are widespread, damaging, and the repercussions are felt for decades in their wake. We _are_ being carpet bombed, and the costs for the victims are ongoing and growing. The collateral damage is everywhere.
Do you really think there's no impact?
> Cyber units from at least one nation state routinely try to explore and exploit Australia’s critical infrastructure networks, almost certainly mapping systems so they can lay down malware or maintain access in the future.
> We recently discovered one of those units targeting critical networks in the United States. ASIO worked closely with our American counterpart to evict the hackers and shut down their global accesses, including nodes here in Australia.
> https://www.intelligence.gov.au/news/asio-annual-threat-asse...
Comment by tosapple 4 hours ago
Comment by shakna 1 hour ago
But one last try.
You suggested that the cost of cyberattacks on industry, is not so great as when we were destroying it with bombs instead.
However, every time we have power outages, people die. Then we have the cost of securing the infrastructure. And the cost of everyone else affected, who has to increase their resilience.
Your bank is collateral damage, as is the people freezing to death in their homes. Entire industries are on the verge of collapse - getting a new turbine to help stabilise your grid has a lead time of _years_, not days or weeks. And if you hit weeks, people die.
Insurance responds to attacks, and that trickles out to everywhere that is touched. VISA and MasterCard have to prepare for eventualities, because of attacks not aimed at them, but at power infrastructure.
When power is hit... There is nothing unaffected.
Volt Typhoon hit the US power grid, and required a massive multinational effort to extract them, that took almost a year... And VT wasn't intended to do damage, just look for weak spots. So that next time, they can cause damage. As part of that survival process, various hardware partners were kicked to the curb, and the repercussions are still in the process of being felt. Half the industry may have issues surviving because of it.
Industroyer is one of the reasons that Kyiv got as bad as it did. Malware is not some hand-wave and fix thing. Half the city's relays were permanently damaged.
Then of course, there was Stuxnet. Which blew up centrifuges, and the research centres hit are still trying to recover from where they were, then.
Cyberattacks are a weapon of war, people die, industries die, and there is no easy path to recovery following it.
An entire industry exists, just to defend against these kinds of attacks. The money spent on that, is counted, which means it has to be less than the cost of the attack succeeding. Trillions are spent, because there is absolute weight behind surviving these attacks.
If things were easier, it'd be an industry solely focused on backups and flipping a switch. But it's not.
Comment by idiotsecant 4 hours ago
Comment by rdtsc 7 hours ago
It seems as if the European war has been pushed to the background recently, and most people kind of forgot about it. If you walk down the streets of Paris or Berlin does it look like it’s wartime, do people talk about it much, do they share the latest front news and so on?
Comment by joe_mamba 6 hours ago
Like what exactly would you want them to do? Run around screaming all day because there's a war in another country 2000 km away from them?
No, people just go on with their lives, doing their jobs, taking care of family and friends, paying their taxes, so that specialized workers in the ministry of defence can take care of the war stuff for them. That's how modern society works.
It's even similar in Kiev, when you walk down the streets you see people living their lives. Gyms, bars, cafes, clubs are full and lively. People don't stop living and enjoying their daily lives just because there's shelling somewhere else in the country.
Comment by jsrcout 3 hours ago
While it's true to a certain degree, you make it sound like Kyiv residents are having a grand old time right now. But in reality, the majority are trying very hard to keep from freezing to death as Russian attacks targeting their power and heating infrastructure have destroyed much of it.
Comment by koiueo 5 hours ago
And "enjoying their daily lives" diminishes real tragedies of Ukrainians' daily lives.
Comment by joe_mamba 5 hours ago
Comment by pocksuppet 4 hours ago
Comment by TacticalCoder 5 hours ago
Comment by RobotToaster 3 hours ago
[0] at least recently
Comment by anonnon 4 hours ago
Comment by anotherbadday 4 hours ago
We know the name of their leaders, their (ethno-religious) background, etc. They aren't Iranian. They aren't Muslim. They aren't Russian...
Comment by dopa42365 2 hours ago
Comment by redeeman 5 hours ago
Comment by jacquesm 5 hours ago
Comment by OKRainbowKid 5 hours ago
Comment by RobotToaster 3 hours ago
If someone makes tanks with paper for armour, because it cuts costs, they are to blame if those tanks catch fire.
Comment by nawgz 1 hour ago
It's fine to have this view that software should be defect free and hardened against sophisticated nation-state attackers, but it stretches the meaning of "defect" to me. A defect would be serving to fulfill that utility it had been designed for, not succumbing to malicious attackers.
Comment by IncreasePosts 7 hours ago
Comment by tokai 6 hours ago
Comment by johanneskanybal 6 hours ago