Executive Summary

In late 2025, a highly targeted cyberattack attributed to the Sandworm group struck Poland's national power grid. Using custom data-wiping malware identified as DynoWiper, the attackers infiltrated critical infrastructure networks, demonstrating sophisticated knowledge of operational technology environments. The initial compromise involved lateral movement through segmented OT/IT networks, facilitated by exploitation of unprotected east-west traffic and weak segmentation controls. The subsequent deployment of DynoWiper caused destructive impacts, including service outages and loss of operational data across several regional substations, with cascading effects on grid stability and dependent sectors. Immediate containment was complicated by attacker persistence and the rapid spread of the wiper.

This incident underscores the rising trend of advanced, nation-state wiper malware targeting critical infrastructure, reflecting a shift from espionage to destructive tactics. Organizations face elevated urgency to harden network segmentation, implement robust egress security, and adopt zero trust operational models in light of these evolving threats.

Why This Matters Now

Wiper attacks on critical infrastructure represent a significant escalation in cyber risk, threatening not only business continuity but national security and societal stability. Proactive defenses against data-wiping operations, especially in essential sectors, are urgently needed as geopolitical tensions and targeting of vital services intensify.

Attack Path Analysis

Related CVEs

MITRE ATT&CK® Techniques

Potential Compliance Exposure

Sector Implications

Sources

Frequently Asked Questions

Gaps were identified in network segmentation, monitoring of east-west traffic, and timely enforcement of least privilege and egress controls.

Cloud Native Security Fabric Mitigations and ControlsCNSF

Zero Trust segmentation, privileged access restrictions, east-west traffic controls, and robust egress filtering would have disrupted adversary privilege escalation, lateral movement, and remote command activity—severely limiting the attack's ability to reach and destroy operational assets.

Initial Compromise

Control: Cloud Native Security Fabric (CNSF)

Mitigation: Inline controls block known malicious payloads and reduce external attack surface.

Privilege Escalation

Control: Zero Trust Segmentation

Mitigation: Microsegmentation and least privilege access limit privilege escalation scope.

Lateral Movement

Control: East-West Traffic Security

Mitigation: Internal traffic is tightly controlled to prevent unauthorized lateral movement.

Command & Control

Control: Multicloud Visibility & Control

Mitigation: Anomalous C2 communications are detected and policy-enforced.

Exfiltration

Control: Egress Security & Policy Enforcement

Mitigation: Unauthorized outbound and exfil channels are blocked and logged.

Impact (Mitigations)

Early anomalies or destructive actions are rapidly detected for response.

Impact at a Glance

Affected Business Functions

  • Energy Distribution
  • Power Generation
Operational Disruption

Estimated downtime: N/A

Financial Impact

Estimated loss: N/A

Data Exposure

No data exposure reported.

Recommended Actions

  • Enforce identity-based microsegmentation and least privilege to prevent privilege escalation and lateral movement between critical workloads.
  • Implement egress filtering and centralized outbound policy enforcement to disrupt C2 and exfiltration attempts from all workloads and zones.
  • Deploy inline intrusion prevention and distributed inspection to block exploit traffic and detect known wiper/ransomware payloads at the earliest stages.
  • Enhance real-time network visibility and anomaly detection, including internal east-west traffic monitoring, to rapidly uncover attacker movement and destructive actions.
  • Regularly update and audit Zero Trust segmentation, encryption, and policy enforcement across multicloud and hybrid cloud environments in line with CNSF best practices.

Secure the Paths Between Cloud Workloads

A cloud-native security fabric that enforces Zero Trust across workload communication—reducing attack paths, compliance risk, and operational complexity.

Cta pattren Image