Poland Blocks Cyberattack on Nuclear Research Centre; Suspects Iran-Linked False Flag

Poland's National Centre for Nuclear Research (NCBJ) Thwarts Cyberattack, Cites Possible Iranian False Flag Operation

HIGH
March 17, 2026
4m read
CyberattackIndustrial Control SystemsThreat Actor

Related Entities

Threat Actors

APT44

Organizations

National Centre for Nuclear Research (NCBJ)

Other

PolandIran

Full Report

Executive Summary

Poland's National Centre for Nuclear Research (NCBJ), a major scientific institute and home to the country's only nuclear research reactor, successfully thwarted a cyberattack on its IT systems. The institute's security defenses detected and blocked the intrusion attempt before any systems were compromised or data was breached. The MARIA research reactor's operations were unaffected. Polish officials have noted that initial forensic evidence points to Iran, but they are treating this lead with caution, openly suggesting the possibility of a false flag operation intended to mask the true perpetrator. This consideration is heightened by Poland's geopolitical position and a history of being targeted by Russian state-sponsored actors.


Threat Overview

On or before March 16, 2026, an unknown threat actor launched a cyberattack against the internal IT infrastructure of the NCBJ in Świerk, Poland. The attack was detected and neutralized by the institute's internal security team. According to the NCBJ, security protocols functioned as designed, and no operational or research processes were disrupted. The target is highly sensitive, as the NCBJ operates the MARIA nuclear research reactor, which is used for scientific purposes and the production of medical isotopes. The incident is now under investigation in collaboration with national cybersecurity authorities to determine the origin and intent of the attack.

Technical Analysis

Specific technical details about the attack vector and the tools used have not been publicly disclosed. However, Poland's Minister for Digital Affairs, Krzysztof Gawkowski, mentioned that the "first identifications of the entry vectors... are related to Iran." This suggests that initial forensic analysis of network logs, malware, or infrastructure revealed indicators associated with known Iranian threat groups.

However, the immediate and public warning about a potential false flag operation is significant. This indicates that the attackers may have deliberately used tools, infrastructure, or TTPs associated with Iranian actors to mislead investigators. Given that Poland has been a primary target for Russian-linked groups like APT44 (Sandworm), it is plausible that such an actor would attempt to misdirect attribution. Attacks on critical infrastructure often involve common TTPs such as:

  • Initial Access: T1566 - Phishing or exploiting public-facing applications.
  • Execution: Use of T1059.003 - Windows Command Shell for command execution.
  • Discovery: Probing the internal network to identify high-value targets like systems related to the MARIA reactor.

Impact Assessment

Due to the successful defense, there was no direct operational, safety, or data-related impact. The MARIA reactor continued to operate safely at full power. The primary impact is geopolitical and strategic. The attempted attack on a nuclear research facility, regardless of its success, represents a significant escalation and highlights the willingness of threat actors to target highly sensitive critical infrastructure. The public discussion of a false flag operation also serves as a strategic communication, signaling to adversaries that Poland is aware of such deceptive tactics. For the NCBJ, the incident necessitates a resource-intensive investigation and likely a comprehensive review and hardening of its security posture.

Detection & Response

The NCBJ's internal security systems and personnel were key to the successful outcome. The early detection and rapid response prevented the incident from escalating. Key elements of their response likely included:

  • Detection: Automated alerts from security monitoring tools (e.g., NIDS, SIEM) flagged the anomalous activity.
  • Analysis: Security analysts quickly triaged the alerts to confirm a malicious intrusion attempt.
  • Containment: The security team blocked the attack vectors, such as by blacklisting source IPs or isolating targeted systems.
  • Collaboration: The NCBJ promptly engaged with national cybersecurity authorities for deeper analysis and intelligence sharing.

This incident serves as a case study for the importance of a mature detection and response capability within critical infrastructure organizations.


Mitigation

Protecting critical infrastructure like a nuclear research facility requires a defense-in-depth strategy.

Strategic Recommendations

  • Network Segmentation (D3-NI: Network Isolation): Enforce strict network segmentation between the IT network and the Operational Technology (OT) network that controls the reactor. There should be no direct path from the internet or the corporate IT environment to critical control systems.
  • Threat Intelligence Integration: Actively consume and integrate threat intelligence feeds related to actors known to target critical infrastructure and ICS environments (e.g., APT44, Iranian state actors) into security controls.
  • Assume Breach Mentality: Operate under the assumption that the perimeter will be breached. Focus on internal segmentation, monitoring for lateral movement, and implementing deception technologies to detect and slow down intruders.
  • Regular Drills and Exercises: Conduct regular cybersecurity drills, including tabletop exercises and red team assessments, that simulate attacks on critical systems to test and refine response plans.
  • Multi-Factor Authentication (MFA): Enforce MFA for all remote access and for access to sensitive internal systems to protect against credential compromise.

Timeline of Events

1
January 1, 2026
A cyberattack, attributed to Russian actors, targets Poland's power grid.
2
March 16, 2026
The NCBJ announces it has thwarted a cyberattack on its infrastructure.
3
March 17, 2026
This article was published

MITRE ATT&CK Mitigations

Implement robust network segmentation to isolate critical OT systems from the corporate IT network, preventing lateral movement from a compromised IT environment.

Enforce strong authentication, such as MFA, for all user accounts, especially those with access to sensitive systems or remote access capabilities.

Continuously monitor and audit logs from both IT and OT environments to detect anomalous activity indicative of an intrusion.

D3FEND Defensive Countermeasures

The most critical defense for an organization like NCBJ is the strict isolation of its Operational Technology (OT) network, which controls the MARIA reactor, from its corporate IT network. This should be implemented using a combination of firewalls, data diodes, and a demilitarized zone (DMZ). All traffic between the IT and OT zones must be explicitly denied by default and only specific, necessary, and monitored communications should be permitted. This countermeasure directly prevents attackers who gain a foothold in the less-secure IT environment from pivoting to the high-consequence OT environment. Given the nature of the target, this is a non-negotiable architectural control.

To prevent initial access, NCBJ must implement rigorous inbound traffic filtering at its network perimeter. This involves more than just standard port blocking. It requires deep packet inspection to identify and block malicious payloads, geo-blocking of traffic from countries not relevant to NCBJ's operations (while being mindful of false flag attempts), and rate-limiting to prevent denial-of-service attacks. For any public-facing applications, a Web Application Firewall (WAF) should be deployed to filter for common attack patterns like SQL injection and cross-site scripting. This hardens the perimeter and reduces the attack surface available to external adversaries.

Given the high likelihood of being targeted by sophisticated state actors who may use false flags, deploying a decoy environment (honeynet) can be a powerful defensive tool. This environment should mimic the real NCBJ network, including fake OT systems and data, to lure attackers. It provides a safe space to observe attacker TTPs without risk to real systems. Alerts from the decoy environment are high-fidelity indicators of compromise. This allows the security team to gather valuable intelligence on the adversary's tools and objectives, which can be used to strengthen defenses on the actual network and aid in accurate attribution.

Sources & References

Hackers tried to breach Poland's nuclear research centre
Help Net Security (helpnetsecurity.com) March 16, 2026
Poland blocks cyberattack that targeted nuclear research facility
TechRadar Pro (techradar.com) March 16, 2026
Cyberattack Targets Poland’s Nuclear Research Center, Investigation Underway
GBHackers on Security (gbhackers.com) March 16, 2026
Poland Nuclear Research Centre Cyberattack Blocked
Safestate (safestate.com) March 17, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Nuclear SecurityICSSCADAFalse FlagGeopoliticsAPT44SandwormCritical Infrastructure

📢 Share This Article

Help others stay informed about cybersecurity threats