On February 12, 2026, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued a critical alert to the U.S. energy sector, prompted by a destructive cyberattack on energy facilities in Poland in late December 2025. The attackers successfully damaged industrial control systems (ICS), including remote terminal units (RTUs) and human-machine interfaces (HMIs). CISA's warning emphasizes the escalating threat of nation-state or sophisticated criminal actors targeting operational technology (OT) to cause physical disruption. The alert calls for immediate implementation of heightened security postures, focusing on securing internet-facing devices, segmenting OT and IT networks, and developing robust incident response plans for OT environments.
The advisory stems from a real-world incident where threat actors demonstrated both the capability and intent to cause physical damage to critical energy infrastructure. The attack on Polish energy facilities serves as a blueprint for future attacks on similar infrastructure globally. The initial access vector was identified as insecure, internet-facing devices, a common but critical vulnerability in many OT environments. After gaining a foothold, the attackers moved laterally to the OT network and deployed destructive payloads specifically designed to interfere with industrial processes. The malware was used to wipe data from HMI controls, effectively blinding operators, and to issue malicious commands to RTUs, causing physical damage to field equipment. This represents a significant escalation from data theft or ransomware to purely destructive attacks aimed at disrupting essential services.
The attack chain highlights several key tactics, techniques, and procedures (TTPs). While the specific malware is not named, its functionality points to a sophisticated understanding of ICS protocols and equipment.
T1190 - Exploit Public-Facing Application or T1133 - External Remote Services to compromise internet-exposed devices, which could include VPNs, remote desktop gateways, or misconfigured firewalls.T1059.001 - PowerShell or native OS tools to establish persistence and move laterally.T1489 - Service Stop to disable safety or monitoring services, and T1485 - Data Destruction to wipe HMI and engineering workstation data. The damage to RTUs points to T0832 - Manipulation of Control within the ICS-specific ATT&CK matrix, where attackers send malicious commands to physical controllers.CISA's alert stresses that the future of conflict may begin not with conventional military force, but with algorithmic attacks on the vital systems that underpin modern society.
A successful destructive attack on an energy grid can have catastrophic consequences. The immediate impact includes power outages affecting residential, commercial, and government facilities. This can lead to significant economic losses, disruption of other critical services that depend on electricity (e.g., water, healthcare, communications), and potential threats to public safety. The recovery from such an attack is complex and costly, often requiring the physical replacement of specialized hardware like RTUs, which may have long lead times. The psychological impact on a population and the erosion of trust in public utilities are also significant long-term consequences.
Security teams should hunt for the following activities:
| Type | Value | Description |
|---|---|---|
| Network Traffic Pattern | Anomalous connections to or from RTUs/PLCs | Look for traffic from non-standard IP ranges, especially from the IT network or internet. |
| Log Source | VPN / Remote Access Logs | Monitor for logins from unusual geographic locations or at odd hours to internet-facing devices. |
| File Path | C:\Windows\System32\* on HMIs |
Monitor for the creation of new executables or scripts on HMI or Engineering Workstations. |
| Process Name | Unusual processes on HMIs | Look for processes not part of the standard HMI software baseline, such as powershell.exe or cmd.exe. |
Detecting such threats requires a defense-in-depth approach that bridges IT and OT security.
CISA recommends immediate action to harden defenses.
UK NCSC issues 'severe' threat warning to Critical National Infrastructure operators, prompted by recent destructive attacks, including the Poland energy incident.
Implement robust segmentation between IT and OT networks to prevent attackers from moving laterally from a less secure environment to the critical control systems network.
Enforce MFA for all remote access to the OT network and for privileged access to critical systems like HMIs and engineering workstations.
Regularly patch internet-facing devices and other systems to close known vulnerabilities that could be used for initial access.
Use firewalls to filter network traffic between IT and OT segments, allowing only necessary communication and blocking all other ports and protocols.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats