Are Destructive Cyberattacks the New Norm?

With a deep background in artificial intelligence and industrial systems, Dominic Jainy has become a leading voice on the convergence of advanced technology and critical infrastructure security. His work focuses on anticipating how sophisticated threat actors leverage technology to target foundational services, making his insights particularly relevant following the recent coordinated cyberattacks on Poland’s energy sector. We sat down with him to dissect this incident, exploring the attackers’ calculated timing and destructive goals, the vulnerabilities within industrial control systems, and the defensive technologies that made a critical difference. Our conversation delves into the anatomy of this prolonged infiltration, the tactical shift from cyber espionage to physical destruction, and what this escalation means for the future security of our energy grids.

The attack on Polish energy facilities occurred during severe winter storms with purely destructive intent. How does such timing amplify the potential impact, and what does the choice to destroy infrastructure, rather than steal data, reveal about an attacker’s ultimate goals?

The timing was anything but coincidental; it was a masterclass in psychological warfare. Launching an attack during severe winter weather, with dropping temperatures and snowstorms, is designed to maximize societal panic and pressure. When people are most reliant on energy for heat and safety, the threat of an outage becomes terrifying. It’s a direct assault on the nation’s stability. This choice to destroy, rather than steal, is a very loud and clear signal. It tells us the attackers aren’t motivated by money or corporate secrets. Their goal is destabilization and causing physical, tangible harm. This isn’t about espionage; it’s about demonstrating power and the capability to cripple a country’s essential services at its most vulnerable moment.

Attackers targeted specific industrial automation devices like remote terminal units and protection relays. Could you walk us through how compromising these components can lead to physical damage and explain why they are considered such high-value targets in an energy grid?

Think of these devices as the nervous system of the power grid. Remote terminal units are the hands and ears, managing telecontrol operations and sending back vital information. Protection relays are the safety reflexes, designed to prevent catastrophic electrical damage by tripping circuits during a fault. When an attacker compromises these, they seize direct control over physical processes. They can send false commands, causing equipment to operate outside of safe parameters, or disable the very safety systems meant to prevent a meltdown. It’s like cutting the brakes on a car and flooring the accelerator. This is why they are such high-value targets; compromising them is the most direct path from a keyboard to causing blackouts, equipment fires, and widespread physical destruction.

The operation involved weeks of covert reconnaissance before deploying custom wiper malware. What are the typical stages of such a prolonged infiltration, and what subtle indicators might suggest a sophisticated actor is already inside a network preparing for an attack?

An operation this sophisticated is a slow, methodical burn. It begins with establishing an initial foothold, often through something as simple as compromised accounts. From there, the attackers move like ghosts through the network. For weeks, their primary job is to listen and learn. They map the entire environment, identifying the critical industrial devices, understanding the communication channels, and stealing operational information to plan their final move. The indicators are incredibly subtle—a user logging in from an unusual location, slight deviations in network traffic patterns, or access to sensitive control system files that have no business reason to be touched. The attackers are patient, building a complete picture before preparing their partially automated attack sequences, ready to be unleashed all at once for maximum impact.

An endpoint detection and response (EDR) system successfully blocked the malware at one power plant. What specific capabilities allow EDR to stop custom wipers when other defenses might fail, and what other security layers are essential for protecting these industrial environments?

This is a crucial point because it shows that these attacks are preventable. Traditional antivirus often relies on known signatures, which a custom-built wiper won’t have. An EDR system, however, focuses on behavior. It saw the malware attempting to perform actions that are inherently destructive and malicious—like rapidly overwriting critical system files—and shut it down, not because it recognized the malware, but because it recognized the hostile behavior. It’s like a security guard stopping someone based on suspicious actions, not just their face. But EDR can’t be the only line of defense. A layered approach is essential: strong access controls to prevent the initial breach, network segmentation to contain intruders if they get in, and constant monitoring to detect those subtle signs of reconnaissance I mentioned earlier.

This incident was attributed to a known threat group, but it represented their first publicly documented destructive campaign. What does this tactical shift from espionage to destruction signal for the energy sector, and how should organizations adjust their defensive strategies in response?

This is a game-changer. We’ve known this threat group—whether you call them Static Tundra or Dragonfly—for their focus on espionage within the energy sector. They were collectors of information. This attack marks their public debut as destroyers. That shift from spying to sabotage is a massive escalation and puts the entire European energy sector on high alert. It signals that adversaries who historically just watched are now willing to burn the house down. In response, organizations can no longer operate with a mindset of just preventing data theft. Their threat models must now fully embrace the potential for destructive, physically damaging attacks. This means re-evaluating everything from incident response plans to the physical security of substations and ensuring that defenses, like EDR, are deployed not just in corporate IT environments but deep within the operational technology networks as well.

What is your forecast for the security of critical energy infrastructure?

I believe we are entering a new, more volatile era. The line between cyber espionage and cyber warfare will continue to blur, and critical infrastructure will remain the primary battleground. We will see attackers become more brazen, leveraging AI to automate their reconnaissance and create more sophisticated, evasive malware. However, our defensive capabilities are also evolving. The future of security will lie in proactive, intelligence-driven defense—using AI and machine learning not just to react to threats, but to predict them. The successful EDR deployment in Poland is a hopeful sign. It shows that with the right technology and a defense-in-depth strategy, we can build resilient systems capable of withstanding even the most sophisticated destructive campaigns. The forecast is stormy, but not without a clear path to safer shores.

Explore more

Why Corporate Wellness Programs Fail to Fix Workplace Stress

The modern professional often finds that for every dollar spent on a meditation app by their employer, nearly one hundred and fifty dollars are drained from the global economy due to systemic burnout and disengagement. This economic disparity highlights a growing tension between the wellness industry, which has grown into a juggernaut worth sixty billion dollars, and the eight point

How to Fix the Workplace Communication and Feedback Crisis

The silent erosion of professional morale often begins not with a grand failure of strategy but with the subtle, persistent friction caused by poorly articulated managerial guidance. This disconnect between managerial intent and employee performance represents a significant hurdle for modern organizations, as traditional critique methods frequently lead to burnout rather than improvement. Addressing the central challenge of workplace communication

How Can You Close the Feedback Gap to Retain Top Talent?

When elite professionals choose to resign, the departure frequently stems from a prolonged absence of meaningful dialogue regarding their trajectory within the organization and the specific expectations surrounding their professional contributions. This silence creates a vacuum where uncertainty flourishes, eventually pushing high achievers toward the exit. Research indicates that nearly half of all employees who voluntarily leave their roles cite

Can AI Infrastructure Redefine Wealth Management?

The once-revolutionary promise of digital wealth management has hit a ceiling where simply layering more software atop crumbling legacy systems no longer yields a competitive edge for modern firms. This realization has sparked a fundamental shift in how the industry approaches technology. Instead of pursuing cosmetic updates, firms are now looking at the very bones of their operations to find

Family Office Models Reshape Korean Wealth Management

The skyline of Seoul no longer just represents industrial might but also signals a historic accumulation of private capital that is forcing the nation’s most prestigious financial institutions to rewrite their playbooks entirely. The traditional private banking model, once centered on the 1-billion-won investor, is undergoing a radical metamorphosis. As of 2026, a burgeoning class of ultra-wealthy households has redefined