Featured image of post Poland Faces Coordinated Hybrid Attacks January 2026
RSS - Research All RSS Feeds Share

Poland Faces Coordinated Hybrid Attacks January 2026

January 2026 marked one of the most intense periods of hybrid warfare, with coordinated cyber operations targeting Poland, highlighting the growing regional threat and strategic scope of russian state-related hybrid campaigns.

Poland Cyber Threat Assessment - January 2026

Comprehensive analysis of hybrid warfare operations targeting Poland. Intelligence derived from Baysec CTI and open-source reporting.


Table of Contents

  1. BLUF (Bottom Line Up Front)
  2. Executive Summary
  3. Credential Exposure
  4. Geopolitical Context
  5. Energy Grid Attack - DynoWiper (December 2025)
  6. January 2026 Events
  7. Campaign Analysis
  8. December 2025 to January 2026: Threat Landscape Overview
  9. MITRE ATT&CK Mapping
  10. Threat Actors
  11. Threat Actor Details
  12. Sources and References
  13. Confidence Levels

BLUF (Bottom Line Up Front)

In December 2025, russia-linked threat actors deployed DynoWiper against Polish energy infrastructure. ESET and Dragos linked the attack to Sandworm, while CERT Polska’s comprehensive report (January 30, 2026) attributed the infrastructure to Berserk Bear/Static Tundra. Throughout January 2026, 40+ pro-russian threat actors targeted 50+ Polish organizations across defense, energy, and government sectors. Key actors NoName057(16) and Z-PENTEST ALLIANCE have confirmed GRU ties per DOJ December 2025 indictments.


Executive Summary

Poland faces coordinated hybrid warfare operations combining destructive malware, sustained cyber activity and physical sabotage. This assessment covers January 2026 cyber operations, December 2025 DynoWiper attack and and past examples of physical sabotage.

The January operations show coordination beyond typical hacktivism: systematic sector rotation (between government, defence, and energy), multi-group same-day targeting, and timing correlated with geopolitical events. DDoS activity provides visible disruption while ICS access claims and ransomware represent more significant capability development.

Key Findings

FindingDetails
DynoWiper attackRussia-linked threat actors Berserk Bear (CERT atribution), Sandworm (ESET Atribution) deployed destructive wiper against Polish energy grid (Dec 2025)
Hybrid warfare surgeFourfold increase in Russian sabotage operations in 2024; 219 incidents since 2014, 86% since 2022
Scale40+ threat actors targeted 50+ Polish organizations
Defense targeting7 Polish Armaments Group subsidiaries targeted in 48 hours (13-14 JAN)
ICS/SCADA claims10+ access claims including heating systems, water treatment
Ransomware5 confirmed Polish victims (Dec 2025-Jan 2026)
State nexusKey actors (NoName057(16), Z-PENTEST/CARR) GRU-linked per DOJ indictments
Credential exposure50,000+ Polish domain credentials identified in infostealer logs

Key Assessments

AssessmentConfidenceBasis
December 2025 attack was state-sponsoredHIGHAll sources (ESET, Dragos, CERT Polska) attribute it to Russian-linked state actors
Attribution dispute (Sandworm/Berserk Bear) reflects operational complexityHIGHDifferent data sources (malware, behavior, infrastructure) yield different conclusions
Operations are coordinated, beyond independent hacktivismHIGHSequential sector targeting and multi-group same-day operations
Threat actors possess capabilities beyond DDoSHIGHDocumented data exfiltration, ICS access claims, ransomware
State direction for key actorsHIGHDOJ indictments confirm GRU funding/direction for CARR/Z-PENTEST, NoName057(16)
Timing correlates with geopolitical eventsMODERATEActivity surged after PM Tusk’s attribution and Polish Consulate Odessa strike

Credential Exposure

Stolen credentials represent a persistent threat enabling future intrusions.

In a sample of recent infostealer logs, we identified credentials for 50,000+ Polish domains - companies, banks, healthcare, government, financial services, energy, defense.

Processing infostealer logs A single infostealer dump: 4.1 million credentials across 1.38 million domains.

Polish credentials harvested by infostealers (RedLine, Raccoon, Vidar, LummaC2) are actively traded on Russian-language forums and Telegram. These credentials will be tested against Polish systems. Attackers exploit credential reuse across VPNs, email, cloud services, and internal systems.

Examples of Polish credential listings on Russian-language Telegram channels:

Example: Polish credential combolist Telegram channel sharing Polish credential dump

Example: Polish credential combolist Telegram channel sharing Polish credential dump

Example: Polish credential combolist Telegram post advertising Polish credentials

Example: Polish combolist posting Telegram channel sharing Polish credential dump

Example: Banned credential channels Telegram credential channels are frequently banned, but new ones emerge within hours.

Dark Web Activity Summary

Polish credential data is actively traded across multiple dark web forums and marketplaces. Activity levels observed in January 2026:

Forum TypeActivity LevelContent
TelegramVERY HIGHBreach posts, credential dumps, combolist sharing
Russian clearnet forumsVERY HIGHBreach posts, credential dumps
Breach forumsHIGHCombolist sharing
Credential forumsHIGHUnique combo posts
Dark marketsMODERATEFresh access sales
Carding forumsMODERATEAdmin access sales
Leak repositoriesLOW-MODERATEDatabase leaks

Source: Baysec CTI dark web monitoring


Geopolitical Context

Russia’s Hybrid Warfare Campaign

Russia has dramatically escalated hybrid warfare operations against Poland and Europe since 2022. According to IISS analysis, sabotage operations increased four times in 2024 compared to previous years. GLOBSEC research documented 219 Russian hybrid warfare incidents since 2014, with 86% occurring since 2022.

Three Pillars of Russian Hybrid Warfare:

Source: Canva/Baysec

Examples from Poland:

  • Subversion - Spreading disinformation during Polish government elections.

  • Coercion - Belarus border crisis.

  • Sabotage - Marywilska fire, railway sabotage.

Physical Sabotage Timeline (2024-2026)

DateOperationDetailsAttributionSource
May 2024Marywilska Shopping Center FireWarsaw’s Largest Shopping Center Destroyed; Over 1,400 Shops Affected, €500M+ in DamageGRUNotes From Poland
Nov 2025Railway SabotageFSB-directed sabotage via recruited Ukrainian proxiesFSBBBC
Dec 2025Mirgorodsky NetworkA 30-person FSB-directed sabotage network was disrupted, involving arson and reconnaissance activities.FSBReuters
29-30 Dec 2025Energy Grid Attack (DynoWiper)Wiper malware deployed against CHP plants and renewable energy systems. The attack was unsuccessful.Russia-linkedESET, CERT Polska
Jan 2026Polish Consulate Odessa StrikeRussian missile strike on diplomatic facilityRussian militaryKyiv Post

Marywilska Shopping Center Fire (May 2024):

On May 12, 2024, Warsaw’s largest shopping center was destroyed by arson. Polish government officially attributed the attack to GRU in May 2025:

  • PM Donald Tusk: “We already know for sure that the large fire at Marywilska was the result of arson ordered by the Russian security services”
  • Impact: 1,400+ shops destroyed, €500M+ damage
  • Attribution basis: Lithuanian intelligence corroborated Polish findings
  • Sources: Reuters, BBC, CNN

Marywilska Shopping Center fire - ground view

Marywilska Shopping Center fire, Warsaw, May 2024. Source: Reuters

Railway Sabotage (November 2025):

Railway sabotage Poland FSB-directed railway sabotage in Poland, November 2025. Attack carried out via recruited Ukrainian proxies.

Telegram Recruitment for Sabotage Operations

OCCRP investigation revealed that Russian intelligence services are actively recruiting European citizens via Telegram to conduct sabotage operations.

Anonymous Telegram channels lure people with payments of €500 to €2,000 for tasks ranging from graffiti to arson. Recruits are sent to carry out operations across several European countries, including Poland, Germany, France, Estonia, Latvia, Lithuania, and the Czech Republic, where they are tasked with arson, reconnaissance, infrastructure sabotage, and Molotov cocktail attacks.

Energy Grid Attack - DynoWiper (December 2025):

On December 29-30, 2025, Russian state actors deployed a previously undocumented wiper malware called DynoWiper against Polish energy infrastructure. The attack occurred on the 10th anniversary of Sandworm’s 2015 Ukrainian power grid attack.

AttributeDetails
Attack Date29-30 December 2025
Threat ActorRussia-linked
AttributionESET/Dragos: Sandworm · CERT Polska: Berserk Bear/Static Tundra
MalwareDynoWiper (Win32/KillFiles.NMO), LazyWiper
Malware TypeWiper - destructive data deletion
ImpactUnsuccessful - no service disruption confirmed

Targets:

  • Two combined heat and power (CHP) plants
  • Renewable energy management systems (wind turbines and photovoltaic farms coordination infrastructure)
  • RTU controllers (Mikronika), Moxa Nport devices

DynoWiper Technical Capabilities:

Technical Capabilities of DynoWiper AI generated image using Google Gemini with modifications

Conflicting Attribution:

On January 30, 2026, CERT Polska published comprehensive findings that arrived at a different conclusion than earlier commercial reporting. Three different intelligence perspectives produced two markedly different attribution conclusions:

  • ESET attributes the observed activity to Sandworm, based on malware analysis that identified similarities between DynoWiper and previous Sandworm wipers, particularly those in the ZOV wiper family.
  • Dragos links the activity to ELECTRUM/Sandworm through behavioral analysis, noting parallels with the cyber incidents that affected Ukraine’s power infrastructure in 2015 and 2016.
  • CERT Polska associates the activity with Berserk Bear/Static Tundra, citing infrastructure analysis in which the command-and-control proxy network matches previously documented Berserk Bear infrastructure.

CERT Polska Findings (January 30, 2026):

CERT Polska’s analysis included visibility into initial access and network infrastructure that commercial vendors lacked:

  • Attackers used compromised VPS servers and Cisco routers for command and control
  • Infrastructure analysis matched proxy networks described by Cisco (Static Tundra) and FBI
  • The proxy network overlaps significantly with known Berserk Bear/Dragonfly/Ghost Blizzard infrastructure

CERT Polska concluded that, based on the data collected, they cannot say for certain whether the actor behind the Sandworm cluster was involved in the attack in any way.

IOCs (CERT Polska):

TypeValueContext
SHA-2568759e79cf3341406564635f3f08b2f33 3b0547c444735dba54ea6fce8539cf15DynoWiper
SHA-256f4e9a3ddb83c53f5b7717af737ab0885 abd2f1b89b2c676d3441a793f65ffaeeDynoWiper
SHA-256835b0d87ed2d49899ab6f9479cddb8b4 e03f5aeb2365c50a51f9088dcede68d5LazyWiper
IP185.200.177[.]10VPN/O365 logons, DynoWiper execution
IP31.172.71[.]5Reverse proxy, data exfiltration
IP193.200.17[.]163VPN logons (multiple victims)

Assessment: This attack represents the most significant cyber operation against Polish critical infrastructure in years. While the attack was unsuccessful, the attribution dispute between commercial vendors (Sandworm) and Poland’s national CERT (Berserk Bear/Static Tundra) highlights the increasing complexity of tracking state-sponsored cyber operations. From a defender’s perspective, resolving which specific Russian cluster was responsible matters less than understanding the attack methodology and implementing appropriate defenses.

*Sources: CERT Polska Report, ESET Research, Pylos Analysis,

January 2026 Events

Data suggests a correlation between geopolitical events and cyber activities in mid-January 2026. On 12–13 January, following the attack on the Polish Consulate in Odessa, there was a noticeable surge in DDoS activity. A few days later, on 15 January, after Prime Minister Tusk publicly attributed energy sector attack to Russia, the Server Killers campaign was observed targeting relevant systems. On 17 January, the transfer of MiG-29 aircraft prompted ICS-related claims, further illustrating the connection between significant geopolitical developments and targeted cyber responses.

In total 50+ Polish organizations were targeted across defense, energy, government, financial, and transportation sectors.

Consolidated Threat Actor Timeline

Over 40 distinct threat actors targeted Poland and other European countries in January 2026. The table below highlights the most significant activities targeting Poland during this period, derived from Baysec CTI:

DateActorTarget/ActivityAttack Type
02 JANNoName057(16)Multiple polish targetsDDoS
06 JANletchikPolish Tax FirmUnauthorized access (Claimed)
06 JANThe Flash DDoS BOXMultiple polish targetsDDoS
07 JANThe GentlemenWamtechnikRansomware
08 JANDark Storm TeamGovernment websites, Gas Distribution, PKP, KRUSDDoS
11 JANBD Anonymousrozklad-pkp.pl, Ministry of Interior websiteDDoS (Claimed)
11 JANH4CKTHORMultiple Polish websitesDDoS
12 JANZ-PENTEST ALLIANCEWastewater CCTVICS access
13-14 JANNoName057(16)7 PGZ defense subsidiariesDDoS (Attacks caused only temporary website unavailability)
14 JANHEXROOTGROUPPolish server for playersDDoS
14 JANpayoutskingChemirolRansomware
14 JANNoName057(16)/DDoSiaTechnoAlpin Snow ProductionICS access (Claimed)
15 JANServer KillersMultiple government websitesDDoS
15 JANDark Storm TeamOlsztyn-Mazury AirportDDoS (Claimed)
17 JANBD AnonymousBLIKDDoS (Claimed)
17 JANthelastwhitehatPoradnikZdrowieData breach (Claimed)
17 JANQuietSecMTK-ACMO Heating ControllersICS access (Claimed)
19 JANQuietSecURE, PSE, ARE (Energy sector)DDoS
19 JANZ-PENTEST ALLIANCEIndustrial Dosing EquipmentICS access (Claimed)
22 JANQuietSece-podróżnik.pl, rozkład-pkp.pl (Polish travel portals)DDoS

Verification: Claimed = threat actor post only

Source: Baysec CTI

ICS/SCADA Access Claims

10+ claims of unauthorized access to Polish industrial control systems.CISA Advisory AA25-343a warned about pro-Russian groups active targeting of ICS via VNC exploitation and default credentials.

DateTargetActorRiskVerification
17 JANMTK-ACMO Heating ControllersQuietSecHighClaimed (Telegram post)
19 JANIndustrial Dosing EquipmentZ-PENTEST ALLIANCEHighClaimed (Telegram post)
02 JANWastewater Treatment ManagementZ-PENTEST ALLIANCEHighAssessed (TTP match)
15 JANWater Treatment StationZ-PENTEST ALLIANCEHighAssessed (TTP match)
12 JANWastewater Treatment Plant CCTVZ-PENTEST ALLIANCEModerateClaimed (Telegram post)
15 JANBoiler Management SystemNoName057(16)/DDoSiaModerateAssessed (TTP match)

Verification Key:

  • Claimed = Threat actor posted evidence (screenshots/video) on Telegram - not independently verified
  • Assessed = Attribution based on TTP alignment with CISA AA25-343A

Note: Z-PENTEST ALLIANCE is the primary water/wastewater sector threat actor per Cyble 2025 Threat Landscape Report. These are threat actor claims - actual ICS compromise has not been independently confirmed.

ICS Exploitation Methodology (CISA AA25-343A)

According to CISA Advisory AA25-343A, pro-Russian hacktivist groups employ the following TTP chain to compromise ICS/SCADA systems:

Attack Chain:

StepTechniqueMITRE IDDescription
1Scan for vulnerable devicesT0883, T1595.002Use internet-scraping tools (Nmap, OPENVAS) to find VNC services on ports 5900-5910
2Initiate temporary VPST1583.003Spin up disposable infrastructure to execute brute force attacks
3Access via VNCT1021.005Connect to hosts using VNC remote desktop software
4Confirm connectionT0886Verify access to vulnerable device
5Brute force credentialsT1110.003Use password spraying tools against default/weak credentials
6Gain HMI accessT0883, T0812, T0859Access Human-Machine Interface with default or no passwords
7Manipulate via GUIT0823Use HMI graphical interface to modify system parameters
8Cause impactT0828, T0829, T0836Modify settings, disable alarms, cause loss of view

HMI Manipulation Actions (observed):

  • Modify usernames/passwords (T0892) - operator lockout
  • Modify parameters and setpoints (T0836) - process disruption
  • Modify device/instrument settings (T0831) - calibration tampering
  • Disable alarms (T0878) - hide intrusion/effects
  • Create loss of view (T0829) - force manual intervention
  • Device restart/shutdown (T0816) - service disruption

What Makes These Attacks Successful:

  • VNC services exposed to internet on default ports
  • Default or weak credentials on HMI devices
  • Lack of MFA on critical control systems
  • No network segmentation between IT and OT
  • Insufficient monitoring of OT access attempts

Assessment: These actors show limited technical sophistication, yet they can still cause real harm. According to CISA, they often misunderstand the systems and processes they target, but their willingness to interfere with critical infrastructure creates real safety risks.


Campaign Analysis

Coordination Evidence

The January 2026 campaign shows indicators of coordination rather than independent hacktivism:

1. Sequential Sector Targeting:

  • Week 1 (01-07 JAN): Government services
  • Week 2 (08-14 JAN): Defense industrial base and ransomware attacks
  • Week 3 (15-20 JAN): Energy sector and ICS probing

2. Multi-Group Same-Day Operations:

  • 08 JAN: Dark Storm Team - 5 targets
  • 12 JAN: 4 groups, 7+ targets
  • 15 JAN: Server Killers + Dark Storm - 9+ targets

3. Geopolitical Correlation:

DateEventCyber Activity
12-13 JANPolish Consulate Odessa struckDDoS surge
15 JANTusk attributes energy attack to RussiaServer Killers campaign
17 JANMiG-29 transfer confirmedQuietSec ICS claims

DDoS Campaign Assessment

Attack Volume by Actor (January 2026):

ActorClaimed AttacksPrimary TargetsPeak Activity
NoName057(16)30+Defense, Regional Gov13-14 JAN
Dark Storm Team10+Government, Transport08 JAN
Server Killers7Government Services15 JAN
BD Anonymous6Government, Financial11, 17 JAN
QuietSec6Energy, ICS17, 19 JAN

Attack Verification:

  • Actors use check-host.net for public verification
  • Some claims are exaggerated or unverifiable
  • Actual downtime varies from minutes to hours

Pattern Analysis: Threat Actor Coordination

Evidence of Coordination:

PatternObservationAssessment
Temporal clusteringMultiple groups attack same day (08, 12, 15 JAN)Coordinated campaign timing
Target overlapMinistry of Interior hit by 3 groupsShared targeting intelligence
Sector rotationThe attacks targeted multiple sectors, spanning government, defense, and energyPlanned campaign phases
Telegram cross-postingDDoSia forwards Z-PENTEST claimsOperational relationship
Capability layeringDDoS, ICS, and ransomware groupsMulti-vector coordination

Communication Patterns:

  • NoName057(16) and Z-PENTEST ALLIANCE share content via Telegram
  • DDoSia Project forwards ICS access claims from affiliated groups
  • Attack announcements often appear within hours of each other

Assessment: The campaign structure suggests central coordination rather than independent hacktivist activity.


December 2025 to January 2026: Threat Landscape Overview

Poland faced a sharp rise in cyberattacks at the start of 2026. In December 2025, roughly 15 threat actors were targeting the country, but by January, that number had more than doubled, with over 40 actors active in the region. NoName057, shifted its focus from France, Belgium, and Denmark in December to launch more than 30 attacks on Polish targets in January alone.

In January 2026 Activity targeting industrial control systems (ICS/SCADA) also picked up, with over 10 confirmed access attempts recorded. The defense sector experienced concentrated attacks, as seven subsidiaries of PGZ were hit within just 48 hours.

The data point to a clear escalation in both the number of attackers and the intensity of their operations, underlining growing threats to Poland’s infrastructure and critical industries.

Source: Baysec CTI


MITRE ATT&CK Mapping

Enterprise Techniques

Technique IDNameThreat Actors
T1498Network Denial of ServiceNoName057(16), Dark Storm, Server Killers, QuietSec
T1499Endpoint Denial of ServiceNoName057(16), Dark Storm
T1078Valid AccountsQuietSec, Sector16, Z-PENTEST ALLIANCE
T1213Data from Information RepositoriesQuietSec, aiyewumi
T1567Exfiltration Over Web Servicethelastwhitehat, aiyewumi
T1486Data Encrypted for ImpactTHE GENTLEMEN, payoutsking
T1583.003Acquire Infrastructure: VPSZ-PENTEST ALLIANCE, Sector16
T1595.002Active Scanning: Vulnerability ScanningZ-PENTEST ALLIANCE, Sector16, NoName057(16)
T1021.005Remote Services: VNCZ-PENTEST ALLIANCE, Sector16, QuietSec
T1110.003Brute Force: Password SprayingZ-PENTEST ALLIANCE, Sector16
T1591Gather Victim Org InformationZ-PENTEST ALLIANCE, Sector16

ICS/OT Techniques (per CISA AA25-343A)

Technique IDNameThreat ActorsUse
T0883Internet Accessible DeviceZ-PENTEST ALLIANCE, Sector16, QuietSecGain access through internet-exposed HMI devices
T0812Default CredentialsZ-PENTEST ALLIANCE, Sector16Build libraries of known default passwords for control devices
T0859Valid AccountsZ-PENTEST ALLIANCE, Sector16, QuietSecUse password guessing tools to access legitimate accounts
T0886Remote ServicesZ-PENTEST ALLIANCE, Sector16, QuietSecLeverage VNC services to access system HMI devices
T0823Graphical User InterfaceZ-PENTEST ALLIANCE, Sector16, QuietSec, NoName057(16)Interact with HMI devices via GUIs to modify control devices
T0816Device Restart/ShutdownZ-PENTEST ALLIANCE, NoName057(16)Turn off HMIs during intrusion
T0878Alarm SuppressionZ-PENTEST ALLIANCE, NoName057(16)Use HMI interfaces to clear alarms caused by activity
T0892Change CredentialZ-PENTEST ALLIANCE, Sector16, QuietSecChange HMI usernames/passwords for operator lockout
T0836Modify ParameterZ-PENTEST ALLIANCE, NoName057(16)Change operational device limits from HMI
T0855Unauthorized Command MessageZ-PENTEST ALLIANCESend unauthorized commands to control system assets
T0828Loss of Productivity and RevenueZ-PENTEST ALLIANCE, Sector16, QuietSec, NoName057(16)Purposefully impact productivity and create costs
T0829Loss of ViewZ-PENTEST ALLIANCE, QuietSecChange credentials preventing remote process modification
T0831Manipulation of ControlZ-PENTEST ALLIANCE, NoName057(16)Change setpoints impacting process efficiency

Threat Actors

Key Groups Active in January 2026

ActorAttacksPrimary TTPsState Nexus
Sandworm/Berserk Bear1 (Dec 2025)DynoWiper, infrastructure destructionRussia-linked (disputed)
NoName057(16)30+DDoSia botnet, Layer 7 DDoSGRU-linked (DOJ Dec 2025)
Z-PENTEST ALLIANCE5 ICS claimsVNC exploitation, SCADA accessGRU-linked Unit 74455 (CISA AA25-343a)
QuietSec6DDoS, ICS claims, data exfiltrationPro-Russian
Dark Storm Team10+DDoS, defacementPro-Russian/Pro-Palestinian
Server Killers7Layer 7 DDoSPro-Russian
BD Anonymous6DDoSPro-Russian
HEXROOTGROUP1+DDoS, defacementPro-Russian
H4CKTHOR3+DDoSHacktivist
The Flash DDoS BOX1+DDoS-for-hireCriminal (DDoS-as-a-Service)
Infrastructure Destruction Squad1+DDoSPro-Russian

Ransomware Operators

ActorVictimDate
SafePaypolhun.pl25 DEC 2025
LockBit 5mostykatowice.pl30 DEC 2025
THE GENTLEMENWamtechnik07 JAN
payoutskingChemirol14 JAN

Source: Baysec CTI


Threat Actor Details

For organizations seeking a deeper understanding of the threat landscape, our team of cybersecurity experts can provide a comprehensive report on the threat actors outlined above.

The report includes detailed profiles, technical indicators, tactics, techniques, and procedures (TTPs), as well as historical activity and patterns that may impact business operations.

Access to threat actor analysis delivers actionable intelligence on emerging threats, enabling informed risk assessment and the enhancement of organizational cybersecurity posture. Reports are customized, ensuring the insights are relevant, timely, and practical for strategic decision-making.For more information or to request a full report, please contact us at: kontakt@baysec.eu

Sources and References

Government & Law Enforcement

  • CERT Polska. Raport Incydent Sektor Energii 2025. January 30, 2026.
  • CISA. AA25-343A: Pro-Russia Hacktivists Conduct Opportunistic Attacks Against US and Global Critical Infrastructure. December 2025.
  • US Department of Justice. Justice Department Announces Actions to Combat Two Russian State-Sponsored Cyber Criminal. December 2025.
  • Europol. Global Operation Targets NoName057(16) Pro-Russian Cybercrime Network. 2025.
  • FBI IC3. Static Tundra/Berserk Bear Proxy Infrastructure Advisory. August 2025.
  • CERT Polska. Polish National CERT Advisories and Incident Reports.

Think Tanks & Research

  • GLOBSEC. How Russia’s Hybrid Warfare Will Escalate in 2026. 2026.
  • IISS. The Scale of Russian Sabotage Operations. August 2025.
  • Cyble. Critical Infrastructure Attacks Became Routine for Hacktivists in 2025. 2025.

News & Investigative Journalism

  • Reuters. PM Tusk Attributes Energy Attack to Russia. January 15, 2026.
  • Notes From Poland. Poland Confirms Russia Behind Marywilska Fire. May 12, 2025.
  • OCCRP. Make a Molotov Cocktail: How Europeans Are Recruited Through Telegram to Commit Sabotage, Arson, and Murder. 2025.
  • BBC. Poland Railway Sabotage (FSB Attribution). November 2025.
  • Euronews. Poland Accuses Russia of Marywilska Arson. May 12, 2025.
  • Kyiv Post. Polish Consulate Odessa Strike. January 2026.

Threat Intelligence

  • Baysec CTI. Primary Threat Intelligence Platform. Internal.
  • ESET Research. Sandworm DynoWiper Attack on Poland Power Grid. January 2026.
  • Pylos. Attributive Questions in High-Profile Incidents. January 31, 2026.
  • Cisco Talos. Static Tundra (Berserk Bear) Infrastructure Analysis. 2025.
  • The Hacker News. New DynoWiper Malware Used in Attempted Attack. January 2026.
  • Security Bez Tabu. DynoWiper - Poland Energy Sector Attack. January 2026.
  • Ransomware.live. THE GENTLEMEN Group Profile. 2025.
  • Cybereason. THE GENTLEMEN Ransomware Analysis. 2025.
  • SOCRadar. NoName057(16) and DDoSia Analysis. 2025.
  • Picus Security. How NoName057(16) Uses DDoSia to Attack NATO Targets. 2025.

Confidence Levels:

  • CONFIRMED: Multiple independent sources, government attribution
  • ASSESSED: Technical indicators align with known patterns
  • CLAIMED: Threat actor statement only, unverified