Poland's National Centre for Nuclear Research (NCBJ), a major scientific institute and home to the country's only nuclear research reactor, successfully thwarted a cyberattack on its IT systems. The institute's security defenses detected and blocked the intrusion attempt before any systems were compromised or data was breached. The MARIA research reactor's operations were unaffected. Polish officials have noted that initial forensic evidence points to Iran, but they are treating this lead with caution, openly suggesting the possibility of a false flag operation intended to mask the true perpetrator. This consideration is heightened by Poland's geopolitical position and a history of being targeted by Russian state-sponsored actors.
On or before March 16, 2026, an unknown threat actor launched a cyberattack against the internal IT infrastructure of the NCBJ in Świerk, Poland. The attack was detected and neutralized by the institute's internal security team. According to the NCBJ, security protocols functioned as designed, and no operational or research processes were disrupted. The target is highly sensitive, as the NCBJ operates the MARIA nuclear research reactor, which is used for scientific purposes and the production of medical isotopes. The incident is now under investigation in collaboration with national cybersecurity authorities to determine the origin and intent of the attack.
Specific technical details about the attack vector and the tools used have not been publicly disclosed. However, Poland's Minister for Digital Affairs, Krzysztof Gawkowski, mentioned that the "first identifications of the entry vectors... are related to Iran." This suggests that initial forensic analysis of network logs, malware, or infrastructure revealed indicators associated with known Iranian threat groups.
However, the immediate and public warning about a potential false flag operation is significant. This indicates that the attackers may have deliberately used tools, infrastructure, or TTPs associated with Iranian actors to mislead investigators. Given that Poland has been a primary target for Russian-linked groups like APT44 (Sandworm), it is plausible that such an actor would attempt to misdirect attribution. Attacks on critical infrastructure often involve common TTPs such as:
T1566 - Phishing or exploiting public-facing applications.T1059.003 - Windows Command Shell for command execution.Due to the successful defense, there was no direct operational, safety, or data-related impact. The MARIA reactor continued to operate safely at full power. The primary impact is geopolitical and strategic. The attempted attack on a nuclear research facility, regardless of its success, represents a significant escalation and highlights the willingness of threat actors to target highly sensitive critical infrastructure. The public discussion of a false flag operation also serves as a strategic communication, signaling to adversaries that Poland is aware of such deceptive tactics. For the NCBJ, the incident necessitates a resource-intensive investigation and likely a comprehensive review and hardening of its security posture.
The NCBJ's internal security systems and personnel were key to the successful outcome. The early detection and rapid response prevented the incident from escalating. Key elements of their response likely included:
This incident serves as a case study for the importance of a mature detection and response capability within critical infrastructure organizations.
Protecting critical infrastructure like a nuclear research facility requires a defense-in-depth strategy.
Implement robust network segmentation to isolate critical OT systems from the corporate IT network, preventing lateral movement from a compromised IT environment.
Enforce strong authentication, such as MFA, for all user accounts, especially those with access to sensitive systems or remote access capabilities.
The most critical defense for an organization like NCBJ is the strict isolation of its Operational Technology (OT) network, which controls the MARIA reactor, from its corporate IT network. This should be implemented using a combination of firewalls, data diodes, and a demilitarized zone (DMZ). All traffic between the IT and OT zones must be explicitly denied by default and only specific, necessary, and monitored communications should be permitted. This countermeasure directly prevents attackers who gain a foothold in the less-secure IT environment from pivoting to the high-consequence OT environment. Given the nature of the target, this is a non-negotiable architectural control.
To prevent initial access, NCBJ must implement rigorous inbound traffic filtering at its network perimeter. This involves more than just standard port blocking. It requires deep packet inspection to identify and block malicious payloads, geo-blocking of traffic from countries not relevant to NCBJ's operations (while being mindful of false flag attempts), and rate-limiting to prevent denial-of-service attacks. For any public-facing applications, a Web Application Firewall (WAF) should be deployed to filter for common attack patterns like SQL injection and cross-site scripting. This hardens the perimeter and reduces the attack surface available to external adversaries.
Given the high likelihood of being targeted by sophisticated state actors who may use false flags, deploying a decoy environment (honeynet) can be a powerful defensive tool. This environment should mimic the real NCBJ network, including fake OT systems and data, to lure attackers. It provides a safe space to observe attacker TTPs without risk to real systems. Alerts from the decoy environment are high-fidelity indicators of compromise. This allows the security team to gather valuable intelligence on the adversary's tools and objectives, which can be used to strengthen defenses on the actual network and aid in accurate attribution.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats