Featured image of post Poland Faces Russian Coordinated Hybrid Attacks January 2026
RSS - Research All RSS Feeds Share

Poland Faces Russian Coordinated Hybrid Attacks January 2026

January 2026 marked one of the most intense periods of Russian hybrid warfare, with coordinated cyber operations targeting Poland, Ukraine, and Europe, highlighting the growing regional threat and strategic scope of Moscow’s hybrid campaigns.

Poland Cyber Threat Assessment - January 2026

Comprehensive analysis of Russian hybrid warfare operations targeting Poland. Intelligence derived from Baysec CTI and open-source reporting.


Table of Contents

  1. BLUF (Bottom Line Up Front)
  2. Executive Summary
  3. Credential Exposure
  4. Geopolitical Context
  5. Targeted Organizations - January 2026
  6. ICS/SCADA Access Claims - January 2026
  7. Threat Actors
  8. Threat Actor Details
  9. Campaign Analysis
  10. Threat Landscape: December 2025 → January 2026
  11. MITRE ATT&CK Mapping
  12. Sources and References
  13. Confidence Levels

BLUF (Bottom Line Up Front)

In December 2025, Sandworm (GRU Unit 74455) deployed DynoWiper against Polish energy infrastructure. Throughout January 2026, 40+ pro-Russian threat actors targeted 50+ Polish organizations across defense, energy, and government sectors. Key actors NoName057(16) and Z-PENTEST ALLIANCE have confirmed GRU ties per DOJ December 2025 indictments.


Executive Summary

Poland faces coordinated Russian hybrid warfare operations combining physical sabotage, destructive malware, and sustained cyber activity. This assessment covers January 2026 cyber operations, December 2025 DynoWiper attack and past physical sabotage for broader context. (Marywilska arson, railway attacks).

The January operations show coordination beyond typical hacktivism: systematic sector rotation (government → defense → energy), multi-group same-day targeting, and timing correlated with geopolitical events. DDoS activity provides visible disruption while ICS access claims and ransomware represent more significant capability development.

Key Findings

FindingDetails
DynoWiper attackSandworm (GRU) deployed destructive wiper against Polish energy grid (Dec 2025)
Physical sabotageGRU: Marywilska fire; FSB: railway sabotage, 30-person network disrupted
Hybrid warfare surge4x increase in Russian sabotage operations in 2024; 219 incidents since 2014, 86% since 2022
Scale40+ threat actors targeted 50+ Polish organizations
Defense targeting7 Polish Armaments Group subsidiaries targeted in 48 hours (13-14 JAN)
ICS/SCADA claims10+ access claims including heating systems, water treatment
Ransomware5 confirmed Polish victims (Dec 2025-Jan 2026)
State nexusKey actors (NoName057(16), Z-PENTEST/CARR) GRU-linked per DOJ indictments
Credential exposure50,000+ Polish domain credentials identified in infostealer logs

Key Assessments

AssessmentConfidenceBasis
Operations are coordinated, beyond independent hacktivismHIGHSequential sector targeting; multi-group same-day operations
Threat actors possess capabilities beyond DDoSHIGHDocumented data exfiltration, ICS access claims, ransomware
State direction for key actorsHIGHDOJ indictments confirm GRU funding/direction for CARR/Z-PENTEST, NoName057(16)
Timing correlates with geopolitical eventsMODERATEActivity surged after PM Tusk’s attribution and Polish Consulate Odessa strike

Credential Exposure

Stolen credentials represent a persistent threat enabling future intrusions.

In a sample of recent infostealer logs, we identified credentials for 50,000+ Polish domains - companies, banks, healthcare, government, financial services, energy, defense. This includes both government employee credentials and Polish citizen credentials for government service portals.

Processing infostealer logs A single infostealer dump: 4.1 million credentials across 1.38 million domains.

Polish credentials harvested by infostealers (RedLine, Raccoon, Vidar, LummaC2) are actively traded on Russian-language forums and Telegram. These credentials will be tested against Polish systems. Attackers exploit credential reuse across VPNs, email, cloud services, and internal systems.

Examples of Polish credential listings on Russian-language Telegram channels:

Example: Polish credential combolist Telegram channel sharing Polish credential dump

Example: Polish credential combolist Telegram channel sharing Polish credential dump

Example: Polish credential combolist Telegram post advertising Polish credentials

Example: Polish credential listing Telegram channel sharing Polish credential dump

Example: Polish combolist posting Telegram channel sharing Polish credential dump

Example: Infostealer cloud logs channel Telegram “cloud” channel distributing fresh infostealer logs.

Example: Banned credential channels Telegram credential channels are frequently banned, but new ones emerge within hours.


Geopolitical Context

Russia’s Hybrid Warfare Campaign

Russia has dramatically escalated hybrid warfare operations against Poland and Europe since 2022. Per IISS analysis, sabotage operations increased 4x in 2024 compared to previous years. GLOBSEC research documented 219 Russian hybrid warfare incidents since 2014, with 86% occurring since 2022.

Three Pillars of Russian Hybrid Warfare:

PillarMethodsPoland Examples
SubversionInformation manipulation, election interference, narrative warfarePolish election disinformation
CoercionMilitary posturing, energy leverage, economic pressureBelarus border crisis; pre-2022 gas dependency
SabotagePhysical attacks, infrastructure destructionMarywilska fire, railway sabotage

Physical Sabotage Timeline (2024-2026)

DateOperationDetailsAttributionSource
May 2024Marywilska Shopping Center FireWarsaw’s largest shopping center destroyed; 1,400+ shops, €500M+ damageGRUNotes From Poland
Nov 2025Railway SabotageFSB-directed sabotage via recruited Ukrainian proxiesFSBBBC
Dec 2025Mirgorodsky Network30-person FSB sabotage network disrupted; included arson, reconnaissanceFSBReuters
29-30 Dec 2025Energy Grid Attack (DynoWiper)Wiper malware deployed against CHP plants and renewable energy systems; attack unsuccessfulSandworm (GRU Unit 74455)ESET, The Hacker News
Jan 2026Polish Consulate Odessa StrikeRussian missile strike on diplomatic facilityRussian militaryKyiv Post

Marywilska Shopping Center Fire (May 2024):

On May 12, 2024, Warsaw’s largest shopping center was destroyed by arson. Polish government officially attributed the attack to GRU in May 2025:

  • PM Donald Tusk: “We already know for sure that the large fire at Marywilska was the result of arson ordered by the Russian security services”
  • Impact: 1,400+ shops destroyed, €500M+ damage
  • Attribution basis: Lithuanian intelligence corroborated Polish findings
  • Sources: Reuters, BBC, CNN

Marywilska Shopping Center fire - aerial view Marywilska Shopping Center fire, Warsaw, May 2024. Source: Reuters

Marywilska Shopping Center fire - ground view Firefighters respond to Marywilska Shopping Center blaze. GRU attribution confirmed by Polish government May 2025. Source: Reuters

Railway Sabotage (November 2025):

Railway sabotage Poland FSB-directed railway sabotage in Poland, November 2025. Attack carried out via recruited Ukrainian proxies.

Energy Grid Attack - DynoWiper (December 2025):

On December 29-30, 2025, Sandworm (GRU Unit 74455) deployed a previously undocumented wiper malware called DynoWiper against Polish energy infrastructure. The attack occurred on the 10th anniversary of Sandworm’s 2015 Ukrainian power grid attack.

AttributeDetails
Attack Date29-30 December 2025
Threat ActorSandworm (GRU Unit 74455)
Attribution ConfidenceMedium (ESET)
MalwareDynoWiper (Win32/KillFiles.NMO)
Malware TypeWiper - destructive data deletion
ImpactUnsuccessful - no service disruption confirmed

Targets:

  • Two combined heat and power (CHP) plants
  • Renewable energy management systems (wind turbines and photovoltaic farms coordination infrastructure)

DynoWiper Technical Capabilities:

  • Erases files and disables system recovery mechanisms
  • Removes Shadow Copies and restore points
  • Designed to destabilize critical infrastructure systems

Attribution Basis:

  • ESET attributed with “medium confidence due to a strong overlap with numerous previous Sandworm wiper activity”
  • Links based on overlaps with prior wiper activity associated with Sandworm, particularly post-February 2022 Ukraine invasion
  • ESET’s Q2-Q3 2025 APT Activity Report documented regular wiper attacks against Ukrainian targets by this group

IOC:

  • SHA-1: 4EC3C90846AF6B79EE1A5188EEFA3FD21F6D4CF6
  • Detection: Win32/KillFiles.NMO

Assessment: This attack represents the most significant cyber operation against Polish critical infrastructure in years. The targeting of both conventional CHP plants and renewable energy coordination systems demonstrates sophisticated operational planning aimed at cascading infrastructure failures. While unsuccessful, the attack confirms Sandworm’s continued focus on energy sector disruption in NATO countries.

Sources: ESET Research, The Hacker News, Security Bez Tabu

Telegram Recruitment for Sabotage Operations

Per OCCRP investigation, Russian intelligence services are actively recruiting European citizens via Telegram to conduct sabotage operations:

  • Recruitment method: Anonymous Telegram channels offer €500-€2,000 for tasks ranging from graffiti to arson
  • Target countries: Poland, Germany, France, Estonia, Latvia, Lithuania, Czech Republic
  • Tasks assigned: Arson, reconnaissance, infrastructure damage, Molotov cocktail attacks

January 2026 Events

DateEventCyber Response
12-13 JANPolish Consulate Odessa struckDDoS surge
15 JANTusk attributes energy attack to RussiaServer Killers campaign
17 JANMiG-29 transfer confirmedICS claims

Targeted Organizations - January 2026

50+ Polish organizations were targeted across defense, energy, government, financial, and transportation sectors.

Consolidated Threat Actor Timeline - January 2026

Timeline of all threat actors targeting Poland, derived from Baysec CTI:

DateActorTarget/ActivityAttack TypeVerification
02 JANNoName057(16)PolandDDoSConfirmed
06 JANletchikPolish Tax FirmUnauthorized accessClaimed
06 JANThe Flash DDoS BOXPolandDDoSConfirmed
07 JANThe GentlemenWamtechnikRansomwareConfirmed
08 JANDark Storm TeamGovernment websites, Gas Distribution, PKP, KRUSDDoSConfirmed
10 JANYiix074Polish ArmyData leakUnverified claim
11 JANBD Anonymousrozklad-pkp.pl, Ministry of Interior websiteDDoSConfirmed
11 JANH4CKTHORMultiple Polish websitesDDoSConfirmed
12 JANaiyewumiInpostData breachUnverified Claim
12 JANZ-PENTEST ALLIANCEWastewater CCTVICS accessConfirmed
13-14 JANNoName057(16)7 PGZ defense subsidiariesDDoSConfirmed
14 JANHEXROOTGROUPPolish server for playersDDoSConfirmed
14 JANpayoutskingChemirolRansomwareConfirmed
14 JANNoName057(16)/DDoSiaTechnoAlpin Snow ProductionICS accessClaimed
15 JANServer KillersGovernment websitesDDoSConfirmed
15 JANDark Storm TeamOlsztyn-Mazury AirportDDoSClaimed
17 JANBD AnonymousBLIKDDoSClaimed
17 JANthelastwhitehatPoradnikZdrowieData breachClaimed
17 JANQuietSecMTK-ACMO Heating ControllersICS accessClaimed
19 JANQuietSecURE, PSE, ARE (Energy sector)DDoSConfirmed
19 JANZ-PENTEST ALLIANCEIndustrial Dosing EquipmentICS accessClaimed
22 JANQuietSece-podróżnik.pl, rozkład-pkp.pl (Polish travel portals)DDoSConfirmed

40+ unique threat actors targeted Poland and Europe in January 2026. This timeline shows major activities.

Verification: Confirmed = independently verified; Claimed = threat actor post only; Unverified = no supporting evidence.

Source: Baysec CTI


ICS/SCADA Access Claims - January 2026

10+ claims of unauthorized access to Polish industrial control systems. Per CISA Advisory AA25-343a, pro-Russian groups are actively targeting ICS via VNC exploitation and default credentials.

DateTargetActorRiskVerification
17 JANMTK-ACMO Heating ControllersQuietSecHighClaimed (Telegram post)
19 JANIndustrial Dosing EquipmentZ-PENTEST ALLIANCEHighClaimed (Telegram post)
02 JANWastewater Treatment ManagementZ-PENTEST ALLIANCEHighAssessed (TTP match)
15 JANWater Treatment StationZ-PENTEST ALLIANCEHighAssessed (TTP match)
12 JANWastewater Treatment Plant CCTVZ-PENTEST ALLIANCEModerateClaimed (Telegram post)
15 JANBoiler Management SystemNoName057(16)/DDoSiaModerateAssessed (TTP match)

Verification Key:

  • Claimed = Threat actor posted evidence (screenshots/video) on Telegram - not independently verified
  • Assessed = Attribution based on TTP alignment with CISA AA25-343A

Note: Z-PENTEST ALLIANCE is the primary water/wastewater sector threat actor per Cyble 2025 Threat Landscape Report. These are threat actor claims - actual ICS compromise has not been independently confirmed.

ICS Exploitation Methodology (CISA AA25-343A)

Per CISA Advisory AA25-343A, pro-Russian hacktivist groups employ the following TTP chain to compromise ICS/SCADA systems:

Attack Chain:

StepTechniqueMITRE IDDescription
1Scan for vulnerable devicesT0883, T1595.002Use internet-scraping tools (Nmap, OPENVAS) to find VNC services on ports 5900-5910
2Initiate temporary VPST1583.003Spin up disposable infrastructure to execute brute force attacks
3Access via VNCT1021.005Connect to hosts using VNC remote desktop software
4Confirm connectionT0886Verify access to vulnerable device
5Brute force credentialsT1110.003Use password spraying tools against default/weak credentials
6Gain HMI accessT0883, T0812, T0859Access Human-Machine Interface with default or no passwords
7Manipulate via GUIT0823Use HMI graphical interface to modify system parameters
8Cause impactT0828, T0829, T0836Modify settings, disable alarms, cause loss of view

HMI Manipulation Actions (observed):

  • Modify usernames/passwords (T0892) - operator lockout
  • Modify parameters and setpoints (T0836) - process disruption
  • Modify device/instrument settings (T0831) - calibration tampering
  • Disable alarms (T0878) - hide intrusion/effects
  • Create loss of view (T0829) - force manual intervention
  • Device restart/shutdown (T0816) - service disruption

Targeted Sectors (per CISA):

  • Water and Wastewater Systems - Treatment facilities, distribution
  • Food and Agriculture - Dairy farms, food processing
  • Energy - Oil wells, heating systems, power distribution

Why These Attacks Succeed:

  • VNC services exposed to internet on default ports
  • Default or weak credentials on HMI devices
  • Lack of MFA on critical control systems
  • No network segmentation between IT and OT
  • Insufficient monitoring of OT access attempts

Assessment: These actors have limited technical sophistication but cause real harm. Per CISA, they frequently misunderstand the processes they aim to disrupt, but their willingness to manipulate systems creates genuine safety risks.


Defense Industrial Base

NoName057(16) targeted 7 PGZ (Polska Grupa Zbrojeniowa) subsidiaries in 48 hours (13-14 January):

OrganizationDateAttack
Polski Holding Obronny14 JANDDoS
DEZAMET S.A.13 JANDDoS
Gamrat S.A.13 JANDDoS
Cenzin sp. z o.o.14 JANDDoS
ELTA13 JANDDoS
Zakłady Mechaniczne Tarnów14 JANDDoS
OBRUM14 JANDDoS

Assessment: Target selection suggests familiarity with Polish defense structure. Attacks caused temporary website unavailability - no data breaches confirmed.

Energy Sector

OrganizationDateActorAttack
Poland’s Energy Regulatory Office (URE)19 JANQuietSecDDoS
Polish Power Grids (PSE)19 JANQuietSecDDoS
Agencja Rynku Energii S.A. (ARE)19 JANQuietSecDDoS
Polish Gas Distribution Company08 JANDark Storm TeamDDoS

Government

OrganizationAttacksActorsAttack
gov.pl (Official Portal)1Dark StormDDoS
Ministry of Interior4Dark Storm, Server Killers, BD AnonymousDDoS
KRUS (Agricultural Insurance)3Dark StormDDoS
Electronic Documents Archive3Dark Storm, Server KillersDDoS
E-Dowód (Digital Identity)1Server KillersDDoS
15+ Regional governmentsMultipleNoName057(16)DDoS

Financial Sector

OrganizationDateActorAttack
BLIK17 JANBD AnonymousDDoS
TimeTax06 JANletchikUnauthorized access

Transportation

OrganizationDateActorAttack
Olsztyn-Mazury Airport15 JANDark Storm TeamDDoS
rozklad-pkp.pl08, 11 JANDark Storm, BD AnonymousDDoS
Koleje Mazowieckie14 JANNoName057(16)DDoS
MPK Poznań06, 13 JANNoName057(16)DDoS

Private Sector

OrganizationDateActorAttack
Inpost12 JANaiyewumiUnconfirmed data breach
Wamtechnik07 JANThe GentlemenRansomware
Chemirol14 JANpayoutskingRansomware
PoradnikZdrowie17 JANthelastwhitehatUnconfirmed data breach

Threat Actors

Key Groups Active in January 2026

ActorAttacksPrimary TTPsState NexusConfidence
Sandworm1 (Dec 2025)DynoWiper, infrastructure destructionGRU Unit 74455CONFIRMED (ESET)
NoName057(16)30+DDoSia botnet, Layer 7 DDoSGRU-linkedCONFIRMED (DOJ Dec 2025)
Z-PENTEST ALLIANCE5 ICS claimsVNC exploitation, SCADA accessGRU Unit 74455CONFIRMED (CISA AA25-343a, DOJ)
QuietSec6DDoS, ICS claims, data exfiltrationPro-RussianUNCONFIRMED
Dark Storm Team10+DDoS, defacementPro-Russian/Pro-PalestinianUNCONFIRMED
Server Killers7Layer 7 DDoSPro-RussianUNCONFIRMED
BD Anonymous6DDoSPro-RussianUNCONFIRMED
HEXROOTGROUP1+DDoS, defacementPro-RussianUNCONFIRMED
H4CKTHOR3+DDoSHacktivistUNCONFIRMED
The Flash DDoS BOX1+DDoS-for-hireCriminal (DDoS-as-a-Service)N/A
Infrastructure Destruction Squad1+DDoSPro-RussianUNCONFIRMED

Confidence Key:

  • CONFIRMED = Official attribution (DOJ indictment, CISA advisory, OFAC sanctions)
  • UNCONFIRMED = Self-declared alignment; no official attribution

Ransomware Operators

ActorVictimDate
SafePaypolhun.pl25 DEC 2025
LockBit 5mostykatowice.pl30 DEC 2025
THE GENTLEMENWamtechnik07 JAN
payoutskingChemirol14 JAN

Source: Baysec CTI

THE GENTLEMEN Ransomware - Detailed Profile

AttributeDetails
TypeRansomware-as-a-Service (RaaS)
EmergedAugust 2025 (Trend Micro, Blackpoint)
Victims63+ across 17+ countries (Ransomware.live)
ModelDual extortion (encrypt + exfiltrate)
EncryptionXChaCha20 + Curve25519 (Cybereason)
PlatformsWindows, Linux, VMware ESXi
CIS RestrictionOperations prohibited in Russia/CIS - indicates Russia-based operation
DetectionRansomware/Win.GentlemenCrypt (AhnLab)

Background:

THE GENTLEMEN ransomware group emerged in August 2025 and rapidly became a significant threat. Per Ransomware.live and Cybereason analysis, the group operates a sophisticated RaaS platform.

Operation Restrictions:

THE GENTLEMEN ransomware includes explicit restrictions prohibiting operations in Russia and CIS countries:

“Work prohibited in Russia and CIS countries”

This restriction is a common indicator of Russia-based or Russia-aligned ransomware operations, providing operators with protection from Russian law enforcement.

Technical Capabilities:

  • Encryption: XChaCha20 stream cipher with Curve25519 key exchange
  • Driver Abuse: Exploits CVE-2025-7771 (ThrottleStop.sys BYOVD - Bring Your Own Vulnerable Driver)
  • Target Platforms: Windows workstations/servers, Linux systems, VMware ESXi hypervisors
  • Exfiltration: Pre-encryption data theft for double extortion leverage

Poland Activity:

  • 07 JAN 2026: Wamtechnik (Polish manufacturing company) - data encrypted and exfiltrated (DeXpose)

European Energy Sector Targeting:

  • 26 DEC 2025: Oltenia Energy Complex (Romania) - major energy infrastructure victim (BleepingComputer)

Victim Profile (63+ total):

  • Manufacturing, energy, healthcare, professional services
  • Geographic distribution: Europe, North America, Asia-Pacific
  • Average ransom demands: Undisclosed (negotiated per victim)

Assessment: THE GENTLEMEN represents a sophisticated, likely Russia-based ransomware operation. The CIS restriction, combined with targeting patterns focused on NATO countries and Ukraine allies, suggests alignment with Russian strategic interests. The group’s rapid victim accumulation (63+ in ~6 months) indicates effective operations and affiliate recruitment.

Source: Ransomware.live, Cybereason, Baysec CTI


Threat Actor Details

Sandworm (GRU Unit 74455) - APT44

AttributeDetails
TypeState-Sponsored APT
Also Known AsAPT44, Seashell Blizzard, IRIDIUM, Voodoo Bear, Telebots
Active Since2009
State NexusConfirmed - GRU Unit 74455 (Main Centre for Special Technologies)
Primary TTPsWiper malware, ICS attacks, supply chain attacks
Notable OperationsBlackEnergy (2015 Ukraine grid), NotPetya (2017), Industroyer (2016, 2022)

Background:

Sandworm is Russia’s most destructive cyber threat actor, operated by GRU Unit 74455. The group has conducted numerous attacks against critical infrastructure, most notably the 2015 and 2016 Ukrainian power grid attacks and the NotPetya global wiper attack in 2017.

December 2025 Poland Attack:

On December 29-30, 2025, Sandworm deployed DynoWiper (Win32/KillFiles.NMO) against Polish energy infrastructure:

TargetDetails
Two CHP plantsCombined heat and power facilities
Renewable energy systemsWind turbine and photovoltaic farm coordination infrastructure

DynoWiper Malware:

AttributeDetails
Detection NameWin32/KillFiles.NMO
TypeWiper (destructive)
CapabilitiesFile erasure, Shadow Copy deletion, recovery mechanism disabling
SHA-14EC3C90846AF6B79EE1A5188EEFA3FD21F6D4CF6

Attack Outcome: The attack was unsuccessful with no confirmed service disruption. However, the attack represents the most significant cyber operation against Polish critical infrastructure in recent years.

Attribution Basis (ESET):

  • Medium confidence attribution based on “strong overlap with numerous previous Sandworm wiper activity”
  • Attack timing on 10th anniversary of 2015 Ukrainian power grid attack
  • Consistent with Sandworm’s documented pattern of energy sector targeting

Assessment: Sandworm’s targeting of Polish energy infrastructure demonstrates Russia’s willingness to conduct destructive operations against NATO member states. While this specific attack failed, it confirms Poland as a priority target for Russian state-sponsored destructive cyber operations.

Sources: ESET Research, The Hacker News

NoName057(16)

AttributeDetails
TypeHacktivist Collective
Active SinceMarch 2022
State NexusConfirmed - Russian state-sanctioned project (DOJ December 2025)
Primary ToolDDoSia botnet (proprietary)
ChannelTelegram
AffiliationCISM (Center for Study and Network Monitoring of Youth Environment) - established by order of President of Russia (October 2018)

NoName057(16) is a state-sanctioned project whose membership includes employees of CISM (Center for Study and Network Monitoring of Youth Environment / Центр изучения и сетевого мониторинга молодёжной среды), an IT organization established by presidential order in 2018. US Department of Justice identified following facts:

  • Russian government provided financial support
  • DDoSia infrastructure created by CISM employees
  • Cryptocurrency payments to volunteer attackers
  • Targeted government agencies, financial institutions, railways, and ports
  • Victoria Eduardovna Dubranova (Ukrainian national) indicted; extradited to US; trial scheduled February 2026

Rewards: US State Department offers up to $10 million for information on NoName members.

January 2026 Poland Activity Timeline:

DateTargetAttack
06 JANMPK Poznań (public transit)DDoS
13 JANDEZAMET S.A., Gamrat S.A., ELTA, MPK PoznańDDoS
14 JANPolski Holding Obronny, Cenzin, ZM Tarnów, OBRUM, Koleje MazowieckieDDoS
15+ JANRegional government websites (15+ targets)DDoS

Summary: 30+ attacks on Polish targets with concentrated 48-hour defense sector campaign (13-14 JAN)

DDoSia Operational Model:

NoName057(16) operates a crowdsourced DDoS platform where volunteers install client software to participate in attacks:

  1. Recruitment: Volunteers join via Telegram channels
  2. Registration: Users register with the bot and receive a unique ID
  3. Client Installation: Volunteers download and install the DDoSia client (Windows, Linux, macOS, Android versions available)
  4. Target Distribution: The C2 server pushes target lists to installed clients automatically
  5. Attack Execution: Clients generate Layer 7 HTTP floods against assigned targets
  6. Payment: Participants earn cryptocurrency (USDT, BTC) based on attack contribution - tracked via unique ID
  7. Verification: Attacks verified via check-host.net; results posted to Telegram

DDoSia Client Technical Details:

  • Written in Go (cross-platform)
  • Connects to C2 infrastructure for target lists
  • Generates HTTP/HTTPS requests with randomized headers
  • Supports proxy configuration for anonymization
  • Leaderboards track top contributors (gamification)

Payment Structure:

  • Volunteers paid in cryptocurrency based on “attack units” contributed
  • Top performers receive bonuses

TTPs:

  • Layer 7 HTTP flood attacks via volunteer botnet
  • Cryptocurrency payments to DDoSia participants (~$10-50/month per active participant)
  • Telegram-based target coordination and recruitment
  • check-host.net for public attack verification
  • GitHub used for client distribution (repositories frequently removed)

Law Enforcement:

  • Europol Operation Eastwood (July 2025):
    • 2 arrests (France, Spain)
    • 8 arrest warrants issued
    • 100+ servers disrupted across 8 countries (Poland, Ukraine, Germany, France, Netherlands, UK, USA, Switzerland)
    • Source: Eurojust
  • Group rebuilt infrastructure within months - operational by September 2025
  • December 2025 DOJ indictments confirmed state funding and CISM employee involvement

Assessment:

AspectRatingNotes
Technical SophisticationLOWSimple HTTP floods; relies on volunteer volume, not advanced techniques
Organizational CapabilityHIGHEffective recruitment, payment systems, rapid infrastructure rebuild
Impact PotentialMODERATETemporary service disruption; no data theft or persistent access
Threat LevelELEVATEDState backing provides resilience; nuisance-level attacks at scale

NoName057(16) is not technically sophisticated. Their model depends on recruiting volunteers to install a simple DDoS client. The attacks are basic Layer 7 HTTP floods - no exploitation, no malware, no persistence. Any organization with proper DDoS mitigation (CDN, rate limiting, WAF) can defend against these attacks.

Their actual capability is organizational, not technical:

  • Effective propaganda and recruitment via Telegram
  • Gamified payment system that incentivizes participation
  • Rapid infrastructure rebuild after law enforcement takedowns
  • State backing provides funding and coordination

DDoSia Project - ICS Access Claims

NoName057(16)’s DDoSia Project has expanded beyond DDoS to ICS access claims, coordinating with Z-PENTEST ALLIANCE.

January 2026 ICS Claims:

DateTargetRisk
14 JANTechnoAlpin Snow ProductionHigh - Ammonia hazard
16 JAN850kW Industrial Boiler (Czech)High
16 JANClairion Clean Air Technology (France)High - Toxic gas

DDoSia - TechnoAlpin Snow Production ICS Access Russian-language Telegram post from DDoSia Project (forwarded from NoName057(16)) claiming access to Polish TechnoAlpin snow production system. Text states volunteers control compressors, water supply, temperature/humidity, and highlights ammonia refrigerant as critical element. Interface shows Polish-language HMI with real-time sensor data.

DDoSia - Industrial Boiler Access (Czech) Russian-language Telegram post from DDoSia Project (forwarded from NoName057(16)) announcing collaboration with Z-Pentest Alliance on Czech 850kW industrial boiler. Text claims full control over fuel supply, augers, pumps, ventilation, and temperature/pressure monitoring.

DDoSia - Clairion Gas Control System Access Russian-language Telegram post from DDoSia Project (forwarded from NoName057(16)) claiming access to Clairion Clean Air Technology ICS in France. System handles hydrogen sulfide and hydrogen peroxide - toxic/hazardous gases. Interface shows industrial process control data.

Assessment: ICS access claims show capability development. Systems with hazardous materials present safety risks if manipulated.

Source: SOCRadar, Picus Security, Baysec CTI

Z-PENTEST ALLIANCE (CARR) - GRU-Directed ICS Threat Actor

AttributeDetails
TypeState-Sponsored ICS-focused group
Also Known AsCyber Army of Russia Reborn (CARR)
State NexusConfirmed GRU - founded, funded, and directed by GRU (DOJ December 2025)
Primary TTPsVNC exploitation, default credentials, HMI access, ICS manipulation
CoordinationWorks with DDoSia Project, Nullsec Philippines

CARR/Z-PENTEST ALLIANCE was founded, funded, and directed by the GRU (Russian military intelligence). U.S. Department of Justice identified that:

  • GRU officer (“Cyber_1ce_Killer”) instructed CARR leadership on targeting
  • GRU financed access to DDoS-for-hire services
  • 100+ members including juveniles; 75,000+ Telegram followers
  • US Critical Infrastructure attacks: Public water systems (multiple states), meat processing facility (Los Angeles - ammonia leak, meat spoilage), US election infrastructure
  • Victoria Eduardovna Dubranova indicted; faces up to 27 years federal prison

U.S. Office of Foreign Assets Control Sanctions (July 2024):

  • Yuliya Pankratova (leader) and Denis Degtyarenko (primary hacker) sanctioned
  • Treasury confirmed: “In January 2024, CARR claimed responsibility for the overflow of water storage tanks in Abernathy and Muleshoe, Texas”
  • Attacks on US critical infrastructure including water systems in multiple states

Rewards for Justice: US State Department offers up to $2 million for information on CARR/Z-PENTEST members.

January 2026 Poland Activity:

  • Industrial boiler house access claim (ELTA - Zakład Automatyki Przemysłowej)
  • Wastewater treatment CCTV access (12 JAN)
  • Industrial dosing equipment access (19 JAN)

Observed Capabilities (from Telegram posts):

  • Temperature, pressure, fuel supply control
  • Auger and pump operation
  • Ventilation and alarm systems
  • Contact information exfiltration

Z-PENTEST ALLIANCE - ELTA Industrial Boiler Access Claim Russian-language Telegram post from Z-Pentest Alliance (forwarded via Nullsec Philippines) claiming full access to ELTA (Zakład Automatyki Przemysłowej) industrial boiler house in Poland. Text states: “We have gained full access to the equipment developer” and claims control over temperature, pressure, fuel supply, augers, pumps, ventilation, and alarm systems. Post includes developer contact information. Interface shows Polish-language HMI displaying real-time boiler parameters (553°C, O₂ levels, fuel status).

CISA Warning: AA25-343a (December 2025) specifically warned of Z-PENTEST ALLIANCE and affiliated groups targeting water, energy, and food/agriculture sectors via internet-exposed ICS.

Source: Telegram, Baysec CTI

Sector16 - Z-Pentest Affiliate ICS Group

AttributeDetails
TypePro-Russian Hacktivist / ICS-focused
FormedJanuary 2025
State NexusPossible indirect Russian government support (CISA AA25-343A)
AffiliationCollaboration with Z-Pentest Alliance
Primary TTPsT1078 Valid Accounts, VNC exploitation, HMI access
Target CountriesItaly, Portugal, Spain, Czech Republic, United States

Background:

Per CISA AA25-343A, Sector16 is a novice pro-Russia hacktivist group that emerged through collaboration with Z-Pentest in January 2025. The group maintains a public Telegram channel where they share videos, statements, and claims of compromising critical infrastructure.

Key Intelligence:

  • Members may have received indirect support from the Russian government in exchange for conducting specific cyber operations that further Russian strategic goals
  • Aligns with broader Russian cyber strategies that involve leveraging non-state threat actors for certain cyber activities, adding a layer of deniability
  • Communications often align with pro-Russia narratives and reflect self-proclaimed support for Russian geopolitical objectives
  • Jointly claimed US system intrusion with Z-Pentest; subsequently began posting additional intrusions claiming sole responsibility

Observed Targets:

  • US energy infrastructure (claimed)
  • European ICS/SCADA systems (Italy, Portugal, Spain, Czech Republic)
  • HMI and web-based SCADA interfaces

TTPs (per CISA):

  • Uses same methodology as Z-Pentest: VNC exploitation, default credentials
  • Targets internet-exposed HMI devices
  • Likely received TTP training/sharing from Z-Pentest partnership

Assessment: Sector16 represents the propagation model described in CISA AA25-343A - hacktivist groups working together, amplifying each other’s posts, and sharing TTPs. The group’s emergence from Z-Pentest collaboration demonstrates how pro-Russian ICS targeting capabilities spread across the hacktivist ecosystem.

Source: CISA AA25-343A, Baysec CTI

Dark Storm Team

AttributeDetails
TypePro-Palestinian/Pro-Russian Hacktivist
EmergedSeptember 2023 (Cyble)
Primary TTPsDDoS, defacement
ChannelTelegram
Notable ActivityMarch 2025 X (Twitter) platform attack claimed (Check Point)
AllianceCoordinates with Server Killers in 7-group Lithuania campaign (CyberPress)

Profile:

Dark Storm Team emerged in September 2023 with dual Pro-Palestinian and Pro-Russian alignment. The group gained prominence after claiming responsibility for the March 2025 attack on X (Twitter). Per Cyble threat profile, the group operates across multiple Telegram channels and coordinates attacks with other pro-Russian groups.

January 2026 Poland Activity Timeline:

DateTargetAttack
08 JANGovernment (gov.pl)DDoS
08 JANPolish Gas Distribution CompanyDDoS
08 JANrozklad-pkp.pl (Rail schedules)DDoS
08 JANKRUS (Agricultural Insurance)DDoS
15 JANOlsztyn-Mazury AirportDDoS
MultipleKRUS (Agricultural Insurance)DDoS (repeated)

Summary: 10+ attacks. Peak activity 08 JAN (5 targets in single day). Active same days as Server Killers and NoName057(16).

Source: Wikipedia, Baysec CTI

Server Killers

AttributeDetails
TypePro-Russian Hacktivist
Primary TTPsLayer 7 DDoS
Stated MotivationOpposition to Ukraine military support
Activity Scale200+ attack reports (Dec 2025 - Jan 2026)
Target CountriesPoland, Czech Republic, Denmark, Belgium, Finland, UK, Germany, Norway, Spain, Italy, Kosovo
AlliancePart of 7-group anti-Lithuania alliance (CyberPress)

January 2026 Poland Activity:

DateTargets
15 JANGovernment and Military websites
06 JANPKP Intercity, Polish State Railways, Warsaw Modlin Airport, Polish Gas Company

European Coordination (January 2026):

DateCountryTargets
21 JANCzech RepublicMilitary Intelligence, National Security Agency, Czech Trade Inspection
20 JANCzech RepublicSecurity Information Service (BIS), National Security Office
19 JANCzech RepublicMultiple universities (Masaryk, Brno, Prague Economics)

Server Killers operates as part of a broader pro-Russian hacktivist coalition targeting NATO member states.

Server Killers - Poland Government Targeting Telegram post from Server Killers announcing DDoS attacks on Polish government websites. Text states: “We attacked Poland again because of they are supporting Ukraine with military equipment.” Lists targets with check-host.net verification links: msw.gov.pl (Ministry of Interior - mislabeled as “Justice”), edowod.gov.pl (e-Services/Digital Identity). Russian flag emoji and Kremlin imagery indicate pro-Russian alignment.

Timing: 15 JAN surge coincided with PM Tusk’s public attribution of December energy attack to Russia.

Source: Baysec CTI

BD Anonymous

AttributeDetails
TypePro-Russian Hacktivist
Primary TTPsDDoS

January 2026 Poland Activity:

  • Ministry of Interior - multiple attacks
  • BLIK (Polish payment system) - 17 JAN
  • rozklad-pkp.pl - 11 JAN
  • Electronic Documents Archive

Coordination: Attacks on same targets as Dark Storm Team and Server Killers within 24-48 hours.

Source: Baysec CTI

QuietSec

AttributeDetails
TypePro-Russian Hacktivist
Primary TTPsDDoS, ICS access, data exfiltration
State NexusUnconfirmed (behavior suggests state support)
CapabilitiesMulti-vector: DDoS, ICS/SCADA, data breaches
Target CountriesUkraine, Poland, Denmark, France

Full Activity Timeline (December 2025 - January 2026):

DateTargetCountryAttack Type
22 JANrozkład-pkp.plPolandDDoS
22 JANe-podróżnik.plPolandDDoS
20 JANUkrexim BankUkraineDDoS
20 JANOschadbankUkraineDDoS
20 JANUkrgasbankUkraineDDoS
19 JANPolish Power Grids (PSE)PolandDDoS
19 JANEnergy Regulatory Office (URE)PolandDDoS
19 JANAgencja Rynku Energii (ARE)PolandDDoS
17 JANMTK-ACMO Heating ControllersPolandICS access
09 JANdush.com.uaUkraineData breach
04 JANUkrainian Government Data PortalUkraineDDoS
02 JANCharitable Foundation International Unity MovementUkraineData breach
31 DECFinancial records of Ukraine support fundsUkraineData leak
29 DECAll-Ukrainian Association “Patriot”UkraineDDoS
29 DECSupport Ukrainian DefendersUkraineDDoS
29 DECUnite with UkraineUkraineDDoS
27 DECCome Back AliveUkraineDDoS
27 DECStandWithUkraineUkraineDDoS
27 DECDirect InitiativeUkraineDDoS
24 DECRennes, Toulouse, StrasbourgFranceDDoS
21-23 DECDanish Police, Courts, Telecom, MunicipalitiesDenmarkDDoS

Ukraine Targeting: QuietSec systematically targeted Ukrainian banks (Ukrexim, Oschadbank, Ukrgasbank), Ukraine support organizations (Come Back Alive, StandWithUkraine, Support Ukrainian Defenders), and conducted data breaches against Ukrainian entities (dush.com.ua, Charitable Foundation International Unity Movement, financial records of Ukraine support funds). Targets indicate anti-Ukraine motivation with intelligence collection capability.

Poland Targeting:

  • Energy sector campaign (19 JAN): URE, PSE, ARE
  • ICS access claim (17 JAN): MTK-ACMO heating controllers
  • Transportation/travel portals (22 JAN): rozkład-pkp.pl, e-podróżnik.pl

Targeting Pattern: QuietSec follows a geographic rotation - Denmark (21-23 DEC) → France (24 DEC) → Ukraine support orgs (27-29 DEC) → Ukraine data breaches (31 DEC - 09 JAN) → Ukraine government/banks (04-20 JAN) → Poland energy/ICS (17-22 JAN). This systematic targeting of NATO countries and Ukraine suggests coordination.

Assessment: QuietSec demonstrates multi-vector capabilities (DDoS, ICS claims, data exfiltration) that distinguish it from typical single-vector hacktivists. The combination of Ukrainian banking sector targeting and systematic NATO country rotation indicates clear pro-Russian alignment. However, no government attribution exists linking QuietSec to Russian state agencies. State nexus remains unconfirmed, behavioral patterns are consistent with pro-Russian ideology but could represent independent hacktivist activity.

Source: Baysec CTI


Campaign Analysis

Coordination Evidence

The January 2026 campaign shows indicators of coordination rather than independent hacktivism:

1. Sequential Sector Targeting:

  • Week 1 (01-07 JAN): Government services
  • Week 2 (08-14 JAN): Defense industrial base + ransomware
  • Week 3 (15-20 JAN): Energy sector + ICS probing

2. Multi-Group Same-Day Operations:

  • 08 JAN: Dark Storm Team - 5 targets
  • 12 JAN: 4 groups, 7+ targets
  • 15 JAN: Server Killers + Dark Storm - 9+ targets

3. Geopolitical Correlation:

DateEventCyber Activity
12-13 JANPolish Consulate Odessa struckDDoS surge
15 JANTusk attributes energy attack to RussiaServer Killers 7-target campaign
17 JANMiG-29 transfer confirmedQuietSec ICS claims

DDoS Campaign Assessment

Attack Volume by Actor (January 2026):

ActorClaimed AttacksPrimary TargetsPeak Activity
NoName057(16)30+Defense, Regional Gov13-14 JAN
Dark Storm Team10+Government, Transport08 JAN
Server Killers7Government Services15 JAN
BD Anonymous6Government, Financial11, 17 JAN
QuietSec6Energy, ICS17, 19 JAN

Attack Verification:

  • Actors use check-host.net for public verification
  • Some claims are exaggerated or unverifiable
  • Actual downtime varies from minutes to hours

Pattern Analysis: Threat Actor Coordination

Evidence of Coordination:

PatternObservationAssessment
Temporal clusteringMultiple groups attack same day (08, 12, 15 JAN)Coordinated campaign timing
Target overlapMinistry of Interior hit by 3 groupsShared targeting intelligence
Sector rotationGov → Defense → Energy sequencePlanned campaign phases
Telegram cross-postingDDoSia forwards Z-PENTEST claimsOperational relationship
Capability layeringDDoS groups + ICS groups + ransomwareMulti-vector coordination

Communication Patterns:

  • NoName057(16) and Z-PENTEST ALLIANCE share content via Telegram
  • DDoSia Project forwards ICS access claims from affiliated groups
  • Attack announcements often appear within hours of each other

Assessment: The campaign structure suggests central coordination rather than independent hacktivist activity.


Threat Landscape: December 2025 → January 2026

IndicatorDecember 2025January 2026
NoName057(16)Focused on France, Belgium, Denmark30+ attacks on Poland
ICS/SCADA ClaimsNot significant10+ access claims
Defense IndustryNo coordinated targeting7 PGZ subsidiaries in 48 hours
Total Threat Actors~15 targeting Poland40+ targeting Poland

Source: Baysec CTI


Dark Web Activity Summary

Polish credential data is actively traded across multiple dark web forums and marketplaces. Activity levels observed in January 2026:

Forum TypeActivity LevelContent
TelegramVERY HIGHBreach posts, credential dumps, combolist sharing
Russian clearnet forumsVERY HIGHBreach posts, credential dumps
Breach forumsHIGHCombolist sharing
Credential forumsHIGHUnique combo posts
Dark marketsMODERATEFresh access sales
Carding forumsMODERATEAdmin access sales
Leak repositoriesLOW-MODERATEDatabase leaks

Source: Baysec CTI dark web monitoring


MITRE ATT&CK Mapping

Enterprise Techniques

Technique IDNameThreat Actors
T1498Network Denial of ServiceNoName057(16), Dark Storm, Server Killers, QuietSec
T1499Endpoint Denial of ServiceNoName057(16), Dark Storm
T1078Valid AccountsQuietSec, Sector16, Z-PENTEST ALLIANCE
T1213Data from Information RepositoriesQuietSec, aiyewumi
T1567Exfiltration Over Web Servicethelastwhitehat, aiyewumi
T1486Data Encrypted for ImpactTHE GENTLEMEN, payoutsking
T1583.003Acquire Infrastructure: VPSZ-PENTEST ALLIANCE, Sector16
T1595.002Active Scanning: Vulnerability ScanningZ-PENTEST ALLIANCE, Sector16, NoName057(16)
T1021.005Remote Services: VNCZ-PENTEST ALLIANCE, Sector16, QuietSec
T1110.003Brute Force: Password SprayingZ-PENTEST ALLIANCE, Sector16
T1591Gather Victim Org InformationZ-PENTEST ALLIANCE, Sector16

ICS/OT Techniques (per CISA AA25-343A)

Technique IDNameThreat ActorsUse
T0883Internet Accessible DeviceZ-PENTEST ALLIANCE, Sector16, QuietSecGain access through internet-exposed HMI devices
T0812Default CredentialsZ-PENTEST ALLIANCE, Sector16Build libraries of known default passwords for control devices
T0859Valid AccountsZ-PENTEST ALLIANCE, Sector16, QuietSecUse password guessing tools to access legitimate accounts
T0886Remote ServicesZ-PENTEST ALLIANCE, Sector16, QuietSecLeverage VNC services to access system HMI devices
T0823Graphical User InterfaceZ-PENTEST ALLIANCE, Sector16, QuietSec, NoName057(16)Interact with HMI devices via GUIs to modify control devices
T0816Device Restart/ShutdownZ-PENTEST ALLIANCE, NoName057(16)Turn off HMIs during intrusion
T0878Alarm SuppressionZ-PENTEST ALLIANCE, NoName057(16)Use HMI interfaces to clear alarms caused by activity
T0892Change CredentialZ-PENTEST ALLIANCE, Sector16, QuietSecChange HMI usernames/passwords for operator lockout
T0836Modify ParameterZ-PENTEST ALLIANCE, NoName057(16)Change operational device limits from HMI
T0855Unauthorized Command MessageZ-PENTEST ALLIANCESend unauthorized commands to control system assets
T0828Loss of Productivity and RevenueZ-PENTEST ALLIANCE, Sector16, QuietSec, NoName057(16)Purposefully impact productivity and create costs
T0829Loss of ViewZ-PENTEST ALLIANCE, QuietSecChange credentials preventing remote process modification
T0831Manipulation of ControlZ-PENTEST ALLIANCE, NoName057(16)Change setpoints impacting process efficiency

Sources and References

Government & Law Enforcement

SourceDescriptionURL
CISA AA25-343APro-Russia Hacktivists Conduct Opportunistic Attacks Against US and Global Critical Infrastructurecisa.gov
DOJ December 2025Justice Department Actions Against Russian State-Sponsored Cyber Criminalsjustice.gov
Europol Operation EastwoodGlobal Operation Targets NoName057(16) Pro-Russian Cybercrime Networkeuropol.europa.eu
CERT-PLPolish national CERT advisories and incident reportscert.pl

Think Tanks & Research

SourceDescriptionURL
GLOBSECHow Russia’s Hybrid Warfare Will Escalate in 2026globsec.org
IISSThe Scale of Russian Sabotage Operationsiiss.org
Cyble 2025 Threat LandscapeCritical Infrastructure Attacks Became Routine for Hacktivists in 2025cyble.com

News & Investigative Journalism

SourceDescriptionURL
ReutersPM Tusk Attributes Energy Attack to Russiareuters.com
Notes From PolandPoland Confirms Russia Behind Marywilska Firenotesfrompoland.com
OCCRPTelegram Sabotage Recruitment Investigationoccrp.org
BBCPoland Railway Sabotage (FSB Attribution)bbc.com
EuronewsPoland Accuses Russia of Marywilska Arsoneuronews.com
Kyiv PostPolish Consulate Odessa Strikekyivpost.com

Threat Intelligence

SourceDescriptionURL
Baysec CTIPrimary threat intelligence platformInternal
ESET ResearchSandworm DynoWiper Attack on Poland Power Gridwelivesecurity.com
The Hacker NewsDynoWiper Malware Analysisthehackernews.com
Security Bez TabuDynoWiper - Sandworm Poland Energy Sector Attacksecuritybeztabu.pl
Ransomware.liveTHE GENTLEMEN Group Profileransomware.live
CybereasonTHE GENTLEMEN Ransomware Analysiscybereason.com
SOCRadarNoName057(16) and DDoSia Analysissocradar.io
Picus SecurityHow NoName057(16) Uses DDoSiapicussecurity.com

Confidence Levels:

  • CONFIRMED: Multiple independent sources, government attribution
  • ASSESSED: Technical indicators align with known patterns
  • CLAIMED: Threat actor statement only, unverified