CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms
Overview
On December 29, 2025, CERT Polska reported that cyber attacks targeted over 30 wind and solar farms, a manufacturing company, and a significant combined heat and power plant in Poland. These attacks are concerning as they impact crucial energy infrastructure, with the CHP plant alone serving nearly half a million customers. The agency has linked these incidents to a coordinated effort, raising alarms about the security of renewable energy sources and essential utilities in the country. The implications of such attacks could be severe, potentially disrupting energy supply and compromising the stability of the grid. As more energy systems move towards digital management, ensuring their security must become a priority for both operators and regulators.
Key Takeaways
- Active Exploitation: This vulnerability is being actively exploited by attackers. Immediate action is recommended.
- Affected Systems: Wind and solar farms, combined heat and power plant (CHP), manufacturing sector
- Timeline: Disclosed on December 29, 2025
Original Article Summary
CERT Polska, the Polish computer emergency response team, revealed that coordinated cyber attacks targeted more than 30 wind and photovoltaic farms, a private company from the manufacturing sector, and a large combined heat and power plant (CHP) supplying heat to almost half a million customers in the country. The incident took place on December 29, 2025. The agency has attributed the attacks to
Impact
Wind and solar farms, combined heat and power plant (CHP), manufacturing sector
Exploitation Status
This vulnerability is confirmed to be actively exploited by attackers in real-world attacks. Organizations should prioritize patching or implementing workarounds immediately.
Timeline
Disclosed on December 29, 2025
Remediation
Not specified
Additional Information
This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.