Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Default ICS Credentials Exploited in Destructive Attack on Polish Energy Facilities
    Cybersecurity

    Default ICS Credentials Exploited in Destructive Attack on Polish Energy Facilities

    adminBy adminFebruary 3, 2026No Comments5 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Electric utility hacked
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Poland’s computer emergency response team (CERT) has published a report detailing the recent attack by Russia-linked hackers on the country’s power grid.

    The attack targeted communication and control systems at roughly 30 sites, including combined heat and power (CHP) plants and renewable energy dispatch centers for wind and solar facilities.

    The hackers gained access to industrial control systems (ICS), but primarily targeted grid safety and stability monitoring systems rather than active power generation systems. While some ICS devices were permanently damaged, the incident did not result in any electrical outages. 

    “It should be noted, however, that given the level of access obtained by the attacker, there was a risk of causing a disruption in electricity generation at the affected facilities,” CERT.PL said in its report. “Even if such a disruption had occurred, analyses indicate that the combined loss of capacity across all 30 facilities would not have affected the stability of the Polish power system during the period in question.”

    According to the Polish CERT, the attack began as early as March 2025, with reconnaissance, unauthorized data access, and credential-harvesting attempts detected through July. 

    The CERT reported that each of the targeted facilities had Fortinet FortiGate devices exposed to the internet, using default credentials and lacking multi-factor authentication. These Fortinet appliances, which served as both firewalls and VPN interfaces, represented the initial attack vector. 

    Advertisement. Scroll to continue reading.

    The hackers initiated disruptive and destructive actions on December 29, with some of the activity partially automated.

    Targeted ICS

    CERT Polska’s report identifies three ICS vendors whose products were targeted in the attack: Hitachi Energy, Moxa, and Mikronika.

    In the case of Hitachi, targeted devices included RTU560 remote terminal units (RTUs), which threat actors accessed using default credentials. The access allowed the attackers to upload malicious firmware. Investigators found that a security feature meant to prevent malicious firmware updates had not been enabled, but even if it had been enabled the devices were affected by CVE-2024-2617, a known flaw allowing unsigned firmware updates.

    The threat actors also targeted Hitachi Relion protection and control relays. Access to these devices was possible due to the failure to disable a default FTP account (the vendor recommends disabling this account) and the use of default credentials. 

    The Russia-linked hackers also targeted RTUs and human-machine interfaces (HMIs) made by Mikronika, a Poland-based industrial automation solutions firm. Both types of ICS devices were protected with default credentials, allowing attackers to make malicious changes that ultimately enabled them to initiate destructive actions. 

    The threat actors deployed wipers on Windows machines hosting the HMI software, which, on devices protected by default local admin credentials, caused damage.

    Moxa NPort serial device servers were also targeted. According to CERT.PL, the attackers used exposed web interfaces and default credentials to access the systems and then reset them to factory settings, changed their login password, and assigned IP addresses that prevented legitimate users from accessing them.

    “In each of the analyzed cases, all Moxa devices accessible at the facility were targeted,” CERT.PL explained.

    Industrial cybersecurity firm Dragos previously reported that RTUs were ultimately recovered, but some unspecified ICS devices were damaged beyond repair. 

    While some threat actors have advanced capabilities and significant resources for conducting ICS attacks, this incident once again shows that industrial systems are often easy to hack even for low-skilled hackers. 

    ICS vendors respond

    Hitachi Energy published an advisory on Friday to inform customers that its RTU560 and Relion 650 products were targeted in the attack on Poland’s energy grid.

    The vendor has urged customers to update their devices and implement general cybersecurity measures, but noted that the attackers hacked its devices due to “insufficient cyber-hygiene within the broader system environment”.

    Hitachi noted that the compromised devices were configured with default credentials, had recommended security features disabled, were running outdated firmware, and were behind vulnerable firewalls.

    Mikronika told SecurityWeek that it collaborated with CERT Polska in investigating the incident and actively participated in the analysis of the entire attack.

    The company’s CSO, Tomasz Szała, confirmed to SecurityWeek that there is no evidence that zero-day vulnerabilities were used in the attack. “The attackers only leveraged default credentials,” Szała noted.

    At the time of writing Moxa has not published an advisory and it has not responded to SecurityWeek’s request for comment.

    Attribution

    Polish officials blamed Russia for the cyberattack shortly after the incident became public. However, cybersecurity firm ESET was the first to attribute it to a specific threat actor. 

    ESET reported with medium confidence, based on its analysis of the malware and associated TTPs, that the APT named Sandworm was behind the attack. The company’s analysis has focused on the wiper malware used in the attack, including DynoWiper.

    Dragos attributed the attack — also with moderate confidence — to a group it tracks as Electrum, which it describes as related to but not always identical to Sandworm. 

    Sandworm has been tied to Russian military intelligence and is mainly known for its destructive attacks, including the 2016 Ukraine power grid attack.

    In contrast, CERT.PL has connected the attack to a threat actor tracked as Static Tundra, Berserk Bear, Ghost Blizzard, and Dragonfly, which focuses on reconnaissance and espionage.

    Related: Access System Flaws Enabled Hackers to Unlock Doors at Major European Firms

    Related: New Reports Reinforce Cyberattack’s Role in Maduro Capture Blackout

    Attack Credentials Default Destructive energy Exploited facilities ICS Polish
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleiPhone Fold design details revealed in new leak
    Next Article Xiaomi Always-on display and Lock screen editor DEV-2321.0.0.1-01051756 APK Download by Xiaomi Inc.
    admin
    • Website

    Related Posts

    Madison Square Garden Data Breach Confirmed Months After Hacker Attack

    March 3, 2026

    30 Alleged Members of ‘The Com’ Arrested in Project Compass

    March 3, 2026

    Google Develops Merkle Tree Certificates to Enable Quantum-Resistant HTTPS in Chrome

    March 3, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    3 great Paramount+ movies you’ll want to watch this week (March 2

    March 3, 2026

    Nvidia partners with optics technology vendors Lumentum and Coherent to enhance AI infrastructure

    March 3, 2026

    Madison Square Garden Data Breach Confirmed Months After Hacker Attack

    March 3, 2026

    Google AI Generated Landing Page Patent Is Limited To Shopping & Ads

    March 3, 2026
    Categories
    • Blogging (32)
    • Cybersecurity (568)
    • Privacy & Online Earning (78)
    • SEO & Digital Marketing (355)
    • Tech Tools & Mobile / Apps (705)
    • WiFi / Internet & Networking (103)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    3 great Paramount+ movies you’ll want to watch this week (March 2

    March 3, 2026

    Nvidia partners with optics technology vendors Lumentum and Coherent to enhance AI infrastructure

    March 3, 2026

    Madison Square Garden Data Breach Confirmed Months After Hacker Attack

    March 3, 2026
    Most Popular
    • 3 great Paramount+ movies you’ll want to watch this week (March 2
    • Nvidia partners with optics technology vendors Lumentum and Coherent to enhance AI infrastructure
    • Madison Square Garden Data Breach Confirmed Months After Hacker Attack
    • Google AI Generated Landing Page Patent Is Limited To Shopping & Ads
    • 6 massive sci-fi and fantasy shows you need to watch in March
    • 30 Alleged Members of ‘The Com’ Arrested in Project Compass
    • Samsung Sticker Center 2.7.03.34 by Samsung Electronics Co., Ltd.
    • Google Develops Merkle Tree Certificates to Enable Quantum-Resistant HTTPS in Chrome
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.