Poland's Internal Security Agency (ABW) has released a report detailing a sustained campaign of cyberattacks against the nation's critical infrastructure, with a specific focus on water treatment facilities. The report, the agency's first public summary in over a decade, confirms that attackers successfully breached the Industrial Control Systems (ICS) of at least five separate municipalities. The ABW attributes the campaign to the 'special services of the Russian Federation' and states the objective has shifted from espionage towards causing tangible, physical disruption to essential services. In some cases, attackers gained the ability to alter water treatment processes, posing a direct threat to public health and safety.
This campaign highlights the escalating threat of cyberattacks against critical national infrastructure (CNI) and the potential for cyber operations to have real-world kinetic effects.
The attackers demonstrated the capability to move from the IT network into the sensitive OT environment where physical processes are controlled.
T0866 - Exploitation of Vulnerability and T0886 - Remote Services.This campaign underscores a critical security gap in many ICS environments: the lack of segmentation between IT and OT networks and poor security hygiene for internet-facing OT assets.
T0886 - Remote Services: Gaining access to systems through exposed remote services like RDP or VNC.T0819 - Drive-by Compromise: Exploiting weak credentials on internet-facing web panels for ICS devices.T0854 - Program Download: Attackers could have downloaded malicious logic to PLCs or other controllers.T0831 - Manipulation of Control: The ultimate goal, gaining the ability to alter the state of the control system.T0829 - Loss of Control: By manipulating the system, attackers could cause a loss of control for the legitimate operators.The potential impact of such attacks is severe and goes beyond financial or data loss.
Isolating the OT network from the IT network and the internet is the most critical defense for ICS environments.
Enforcing strong, unique passwords and eliminating default credentials on all ICS/OT devices.
Continuously monitoring logs from ICS devices for unauthorized access or anomalous configuration changes.
Using firewalls to strictly control traffic between IT and OT networks, and blocking all unnecessary inbound and outbound traffic.
An attack nearly caused a Polish city to lose its water supply before authorities intervened.
Poland's ABW publishes a report detailing the escalation of cyberattacks against its industrial control systems.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.