Poland's ABW Agency Confirms Russian State-Backed Actors Breached Water Treatment Facilities, Aiming for Physical Disruption

Poland Sounds Alarm as Russian Hackers Target Water Supply Systems for Physical Disruption

CRITICAL
May 11, 2026
5m read
Industrial Control SystemsCyberattackThreat Actor

Related Entities

Organizations

Poland Internal Security Agency (ABW)Russian Federation

Other

Poland

Full Report

Executive Summary

Poland's Internal Security Agency (ABW) has released a report detailing a sustained campaign of cyberattacks against the nation's critical infrastructure, with a specific focus on water treatment facilities. The report, the agency's first public summary in over a decade, confirms that attackers successfully breached the Industrial Control Systems (ICS) of at least five separate municipalities. The ABW attributes the campaign to the 'special services of the Russian Federation' and states the objective has shifted from espionage towards causing tangible, physical disruption to essential services. In some cases, attackers gained the ability to alter water treatment processes, posing a direct threat to public health and safety.

Threat Overview

This campaign highlights the escalating threat of cyberattacks against critical national infrastructure (CNI) and the potential for cyber operations to have real-world kinetic effects.

  • Threat Actor: Attributed by the Polish ABW to state-backed actors from the Russian Federation.
  • Targets: Critical infrastructure in Poland, with a confirmed focus on municipal water treatment facilities. The named municipalities are Jabłonna Lacka, Szczytno, Małdyty, Tolkmicko, and Sierakowo.
  • Attack Vectors: The report indicates the use of unsophisticated methods, primarily exploiting weak password policies and ICS/SCADA systems that were left exposed to the public internet.
  • Attacker Objective: The primary goal was to gain control of operational technology (OT) systems to disrupt or sabotage the public water supply. This is a significant departure from typical espionage or data theft motives and aligns with a broader strategy of destabilization.

Technical Analysis

The attackers demonstrated the capability to move from the IT network into the sensitive OT environment where physical processes are controlled.

  1. Initial Access: Attackers likely scanned the internet for exposed ICS devices. They then exploited weak or default credentials to gain initial access to the network. This aligns with T0866 - Exploitation of Vulnerability and T0886 - Remote Services.
  2. Lateral Movement: Once inside the network, the attackers moved from the initial entry point to the core operational systems that manage water treatment.
  3. Impact on Control Systems: The report confirms attackers gained access to systems controlling water treatment parameters. This implies they could have altered chemical dosages, changed pressure levels, or shut down pumps, creating a 'direct risk' to the water supply. One attack in August 2025 nearly succeeded in cutting off a city's water.

This campaign underscores a critical security gap in many ICS environments: the lack of segmentation between IT and OT networks and poor security hygiene for internet-facing OT assets.

MITRE ATT&CK for ICS Techniques

Impact Assessment

The potential impact of such attacks is severe and goes beyond financial or data loss.

  • Public Health and Safety: Altering water treatment processes could lead to contaminated water being distributed to the public, causing widespread illness.
  • Service Disruption: Shutting down water supplies can have cascading effects on a city's population, healthcare facilities, and firefighting capabilities.
  • Economic Impact: Disruption to industrial processes that rely on water can cause significant economic damage.
  • Psychological Impact: Attacks on essential services like water are designed to erode public trust in the government and create a sense of chaos and instability.

Detection & Response

  • Network Monitoring: Implement robust monitoring on the boundary between IT and OT networks. All traffic entering the OT zone should be inspected. This is a core tenet of D3FEND Network Traffic Analysis (D3-NTA).
  • Asset Inventory: Maintain a complete and up-to-date inventory of all internet-facing devices. Regularly scan for exposed ICS ports and protocols.
  • Log Analysis: Collect and analyze logs from PLCs, HMIs, and other control system devices. Look for unauthorized login attempts, configuration changes, or commands issued outside of normal operational hours.
  • Baseline Normal Operations: Establish a baseline of normal process values (e.g., pressure, flow rates, chemical levels). Set up alerts for any deviations that are not part of a planned operational change.

Mitigation

  1. Remove Internet Exposure: The most critical step is to remove all direct internet connections to ICS and OT systems. Access should be provided through secure, multi-factor authenticated VPNs and jump boxes.
  2. Network Segmentation: Implement strict network segmentation between IT and OT environments using firewalls and demilitarized zones (DMZs). Follow the Purdue Model for ICS security architecture. This is a form of D3FEND Broadcast Domain Isolation (D3-BDI).
  3. Strong Password Policies: Enforce strong, unique passwords for all ICS devices and accounts. Eliminate all default or shared credentials.
  4. Patch Management: Implement a risk-based patch management program for the OT environment. While challenging, it is essential to address known vulnerabilities in a timely manner.
  5. Incident Response Plan: Develop and practice an incident response plan specifically for OT environments, which may require different procedures (e.g., safety considerations) than a standard IT response.

Timeline of Events

1
August 1, 2025
An attack nearly caused a Polish city to lose its water supply before authorities intervened.
2
May 7, 2026
Poland's ABW publishes a report detailing the escalation of cyberattacks against its industrial control systems.
3
May 11, 2026
This article was published

MITRE ATT&CK Mitigations

Isolating the OT network from the IT network and the internet is the most critical defense for ICS environments.

Enforcing strong, unique passwords and eliminating default credentials on all ICS/OT devices.

Continuously monitoring logs from ICS devices for unauthorized access or anomalous configuration changes.

Using firewalls to strictly control traffic between IT and OT networks, and blocking all unnecessary inbound and outbound traffic.

Timeline of Events

1
August 1, 2025

An attack nearly caused a Polish city to lose its water supply before authorities intervened.

2
May 7, 2026

Poland's ABW publishes a report detailing the escalation of cyberattacks against its industrial control systems.

Sources & References

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

PolandRussiaCritical InfrastructureICSOT SecurityWater UtilitiesCyberattackSabotageABW

📢 Share This Article

Help others stay informed about cybersecurity threats

🎯 MITRE ATT&CK Mapped

Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.

🧠 Enriched & Analyzed

Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.

🛡️ Actionable Guidance

Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.

🔗 STIX Visualizer

Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.

Sigma Generator

Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.