On December 29, 2025, Poland experienced one of the most serious cyber incidents targeting critical energy infrastructure to date. Coordinated attacks struck more than 30 wind and solar farms, a combined heat and power (CHP) plant, and a manufacturing company, demonstrating how cyber operations can disrupt both IT and operational technology (OT) environments simultaneously.
CERT Polska just released a new incident analysis of the coordinated 29 December 2025 cyberattack on Poland’s energy sector.
The report shows that attackers did not rely solely on zero-day exploits. Instead, they exploited common industry weaknesses such as:
Internet-facing VPN appliances
Weak authentication practices
Default passwords on industrial equipment
Lack of firmware integrity enforcement
From Radiflow’s perspective, this incident highlights two systemic security gaps in renewable energy and utility environments:
1. Remote Access Remains the Primary Attack Vector
Remote access was the entry point in nearly every compromised site. VPN concentrators exposed to the internet without multi-factor authentication provided attackers with a direct bridge into OT environments.
Radiflow Recommendation: Harden Remote Access Immediately
Renewable operators should implement:
Multi-factor authentication on all VPN and remote access gateways
Zero-trust remote access architectures
Strict role-based access control (RBAC)
Time-limited and just-in-time access for vendors
Network segmentation between IT, DMZ, and OT zones
2. Lack of Early Detection Allowed Deep Intrusions
CERT Polska documented that attackers performed reconnaissance and credential harvesting weeks or months before executing destructive payloads in some environments. In many renewable sites, there was no indication that abnormal activity was detected before devices were wiped or firmware was corrupted.
Radiflow Recommendation: Deploy Industrial Intrusion Detection Systems (IDS)

Radiflow iSID – Visibility and Anomaly Detection
Passive OT-aware IDS solutions are essential for:
Detecting unauthorized remote access attempts
Identifying abnormal industrial protocol behavior
Monitoring firmware upload activity
Spotting lateral movement between substations and control networks
Providing early warning before attackers reach destructive stages
This incident makes one thing clear: Renewable energy facilities are no longer “soft targets” on the edge of critical infrastructure—they’re now front-line assets in geopolitical cyber conflict.
CERT Polska’s report walks through how the attackers turned an IT compromise into operational impact—damaging OT devices, degrading operator visibility, and delaying recovery through configuration sabotage across multiple sites.
While the report focuses on the how, the broader lesson is about readiness and investment. As Radiflow CEO Ilan Barda puts it:
“For years, many mid-size critical infrastructure operators treated OT cybersecurity as optional. Today, the baseline investment is affordable—and it’s no longer optional. It’s becoming mandatory, driven by regulations like NIS2, cyber-insurance expectations, and the real business cost of downtime and reputational damage.”
As renewable energy adoption accelerates globally, cybersecurity maturity must scale alongside it. Wind farms, solar parks, and grid interconnection substations are no longer isolated industrial assets — they are connected digital ecosystems.
Radiflow strongly advises renewable operators to prioritize:
Remote access hardening
Industrial IDS deployment
Continuous OT network monitoring
Vendor access governance
Security-by-design architecture for new sites
For The Full Report>>>Energy Sector Incident Report – 29 December 2025 | CERT Polska

Renewable Energy Cybersecurity Wake-Up Call: How to Protect Wind and Solar Sites From Remote Access Attacks
Hacktivists Are Hijacking Exposed ICS Devices — Here’s What Every Operator Must Know
The JLR Cyber Incident: A Wake-Up Call for Manufacturing Resilience