Sandworm Strikes Polish Power Grid with DynoWiper as Fortinet Auth Bypass Remains Unpatched on Enterprise Firewalls
Critical Infrastructure Intelligence Briefing
Report Date: Saturday, January 24, 2026
Reporting Period: January 17-24, 2026
1. Executive Summary
Major Developments
- CRITICAL - Nation-State Attack on Power Infrastructure: Russia's Sandworm APT group executed what Polish authorities describe as the "largest cyber attack" targeting Poland's power system in late December 2025, deploying new destructive malware dubbed "DynoWiper." This represents a significant escalation in nation-state targeting of European energy infrastructure.
- CRITICAL - Fortinet Authentication Bypass Under Active Exploitation: Fortinet has confirmed that a critical FortiCloud SSO authentication bypass vulnerability is being actively exploited against fully patched FortiGate firewalls. The company acknowledges the flaw is not yet fully remediated, leaving enterprise networks exposed.
- HIGH - Energy Sector Phishing Campaign: Microsoft has disclosed a sophisticated multi-stage adversary-in-the-middle (AitM) phishing and business email compromise (BEC) campaign specifically targeting energy sector organizations, abusing SharePoint for payload delivery.
- HIGH - CISA KEV Catalog Updates: CISA added five vulnerabilities to its Known Exploited Vulnerabilities catalog this week, including critical flaws in VMware vCenter Server, Zimbra Collaboration, Versa enterprise software, and the Vite frontend tool.
- MODERATE - Mass Credential Exposure: Security researchers discovered 149 million credentials exposed in a 96GB data cache, including credentials for government systems, Facebook, Instagram, and various enterprise platforms.
Cross-Sector Concerns
- The Fortinet vulnerability affects network security appliances deployed across all critical infrastructure sectors
- Energy sector faces coordinated targeting from both nation-state actors and sophisticated phishing campaigns
- Transportation sector impacted by ransomware attack on German transit authority (Verkehrsgesellschaft Main-Tauber)
- Pwn2Own Automotive 2026 disclosed 76 zero-day vulnerabilities in automotive systems, including EV chargers and infotainment systems
2. Threat Landscape
Nation-State Threat Actor Activities
Sandworm (Russia) - CRITICAL PRIORITY
The Russian GRU-affiliated threat group Sandworm has been attributed to a major cyber attack against Poland's power infrastructure occurring in late December 2025. Key details include:
- New Malware: Deployment of previously unseen destructive malware designated "DynoWiper"
- Target: Polish power grid systems
- Assessment: This attack represents continued Russian targeting of NATO member energy infrastructure and demonstrates Sandworm's ongoing development of destructive capabilities
- Historical Context: Sandworm has previously conducted destructive attacks against Ukrainian power infrastructure (2015, 2016, 2022) and deployed NotPetya globally (2017)
Source: The Hacker News
AI-Enhanced Cyber Capabilities
Anthropic has published research indicating that current AI models are demonstrating improved capabilities in finding and exploiting internet vulnerabilities. This development has implications for both defensive and offensive cyber operations, potentially lowering the barrier for sophisticated attacks.
Source: Schneier on Security
Ransomware and Cybercriminal Developments
WorldLeaks Extortion Group
The WorldLeaks cybercrime group claims responsibility for a potential breach of Nike's systems, threatening to leak stolen data. While Nike is a consumer goods company rather than critical infrastructure, this demonstrates continued aggressive activity by extortion groups.
Source: SecurityWeek
ShinyHunters SSO Targeting Campaign
The ShinyHunters extortion gang has claimed responsibility for ongoing voice phishing (vishing) attacks targeting single sign-on (SSO) accounts at major identity providers including Okta, Microsoft, and Google. This campaign poses significant risk to organizations relying on these platforms for authentication.
Source: Bleeping Computer
Ransomware Gang Operational Security Failure
A ransomware gang's operational security mistake enabled data recovery for 12 U.S. firms, demonstrating that threat actor errors can sometimes provide recovery opportunities for victims.
Source: CSO Online
Physical Security Threats
Transit Terrorism Threat - Canada
A Montreal man who allegedly threatened to bomb public transit systems is now facing additional terrorism charges. This case underscores ongoing physical security concerns for mass transit infrastructure.
Source: Homeland Security Today
Emerging Attack Vectors
Dual-Vector Credential Theft Campaign
Security researchers have disclosed a new campaign combining stolen credentials with deployment of legitimate Remote Monitoring and Management (RMM) software (LogMeIn) for persistent access. This technique abuses trusted tools to evade detection.
Source: The Hacker News
Malicious VSCode Extensions
Two malicious extensions in Microsoft's Visual Studio Code Marketplace, with combined installations of 1.5 million, have been discovered exfiltrating developer data to China-based servers. This supply chain attack vector threatens software development environments across sectors.
Source: Bleeping Computer
GNU InetUtils Telnetd Exploitation
A coordinated campaign is targeting a critical-severity authentication bypass vulnerability in the GNU InetUtils telnetd server that has existed for 11 years. Successful exploitation grants root access to affected systems.
Source: Bleeping Computer
3. Sector-Specific Analysis
Energy Sector - ELEVATED THREAT LEVEL
Sandworm Attack on Polish Power Grid
Threat Level: CRITICAL
The Sandworm attack on Poland's power infrastructure represents the most significant nation-state cyber operation against Western energy infrastructure in recent months. Energy sector operators should:
- Review and enhance monitoring of operational technology (OT) networks
- Ensure network segmentation between IT and OT environments
- Verify incident response plans account for destructive malware scenarios
- Coordinate with sector ISACs for additional threat intelligence
AitM Phishing Campaign Targeting Energy Organizations
Threat Level: HIGH
Microsoft has warned of a sophisticated multi-stage attack campaign specifically targeting energy sector organizations:
- Initial Access: SharePoint-based phishing for credential harvesting
- Technique: Adversary-in-the-middle (AitM) attacks to bypass MFA
- Objective: Business email compromise (BEC) for financial fraud
- Recommendation: Implement phishing-resistant MFA (FIDO2/WebAuthn), enhance email security controls, and conduct targeted awareness training
Sources: The Hacker News, SecurityWeek
Transportation Systems
German Transit Authority Ransomware Attack
Verkehrsgesellschaft Main-Tauber, a German transportation authority, has been impacted by a ransomware attack. Details on operational impacts remain limited, but the incident highlights continued targeting of transit systems by ransomware operators.
Source: CSO Online
Automotive Sector Vulnerabilities
Pwn2Own Automotive 2026 concluded with researchers earning over $1 million for demonstrating 76 zero-day vulnerabilities in automotive systems, including:
- Electric vehicle charging infrastructure
- In-vehicle infotainment systems
- Connected vehicle components
These vulnerabilities have implications for EV charging infrastructure security and connected vehicle fleets.
Source: SecurityWeek, Bleeping Computer
Coast Guard Maritime Operations
The U.S. Coast Guard has launched the RAPTOR (Rapid Prototyping and Technology Operations Response) program to accelerate deployment of new maritime security technologies. This initiative aims to improve response capabilities and technology adoption for maritime security operations.
Source: Homeland Security Today
Communications & Information Technology
Fortinet FortiCloud SSO Bypass - CRITICAL
Fortinet has confirmed that a critical authentication bypass vulnerability affecting FortiCloud single sign-on is being actively exploited against fully patched FortiGate firewalls. Key concerns:
- Patches released to date do not fully address the vulnerability
- Exploitation bypasses authentication controls
- Affects enterprise network security infrastructure across all sectors
- Fortinet states it is working to fully remediate the issue
Immediate Actions:
- Monitor Fortinet advisories for complete patch availability
- Implement additional access controls and monitoring for FortiGate management interfaces
- Consider restricting FortiCloud SSO functionality until fully patched
- Review logs for indicators of compromise
Sources: SecurityWeek, The Hacker News, CSO Online, Bleeping Computer
TikTok U.S. Operations Update
TikTok has announced formation of a joint venture (TikTok USDS) to continue U.S. operations under the 2025 Executive Order. This development has implications for data security and communications infrastructure policy.
Source: The Hacker News
Healthcare & Public Health
NHS Supply Chain Security Initiative
NHS technology leaders have issued an open letter demanding improved cybersecurity standards from suppliers, outlining plans to identify and address risks to software supply chain security across the UK health and social care system. This initiative may serve as a model for healthcare supply chain security improvements in other jurisdictions.
Source: Infosecurity Magazine
Financial Services
ATM Jackpotting Convictions
Two Venezuelan nationals have been convicted in the U.S. for using malware to conduct ATM jackpotting attacks, stealing hundreds of thousands of dollars from U.S. banks. The individuals will be deported following sentencing. This case is part of broader enforcement actions against dozens of Venezuelan nationals involved in similar schemes.
Sources: SecurityWeek, Bleeping Computer
Government Facilities
Dresden State Art Collections Cyber Breach
Digital infrastructure supporting the Dresden State Art Collections in Germany has been targeted in a cyber breach. While primarily a cultural institution, this incident demonstrates continued targeting of government-affiliated facilities.
Source: Security Magazine
4. Vulnerability & Mitigation Updates
CISA Known Exploited Vulnerabilities (KEV) Additions
CISA added the following vulnerabilities to the KEV catalog this week, indicating confirmed active exploitation:
| CVE | Product | Severity | Description |
|---|---|---|---|
| CVE-2024-37079 | VMware vCenter Server | Critical | Heap-overflow vulnerability (patched June 2024, now confirmed exploited) |
| Multiple | Zimbra Collaboration | High | Authentication/access control vulnerabilities |
| Multiple | Versa Enterprise Software | High | Enterprise software vulnerabilities |
| TBD | Vite Frontend Tool | High | Development tool vulnerability |
Federal Civilian Agencies: Must remediate per BOD 22-01 timelines
All Organizations: Strongly encouraged to prioritize patching of KEV-listed vulnerabilities
Sources: The Hacker News, Bleeping Computer
Critical Vulnerabilities Requiring Immediate Attention
Fortinet FortiCloud SSO Authentication Bypass
- Status: Actively exploited; patch incomplete
- Impact: Authentication bypass on FortiGate firewalls
- Action: Monitor for updated patches; implement compensating controls
SmarterMail Authentication Bypass
- Status: Exploitation began within 48 hours of patch release
- Impact: Administrative access to mail servers
- Action: Apply patches immediately; review for compromise indicators
Source: SecurityWeek
GNU InetUtils Telnetd Authentication Bypass
- Status: Actively exploited in coordinated campaign
- Impact: Root access to affected systems
- Vulnerability Age: 11 years
- Action: Disable telnetd where possible; apply patches; migrate to SSH
Source: Bleeping Computer
Industrial Control Systems Advisories
Rockwell Automation Security Notice
A security notice has been issued for Rockwell Automation products. Organizations using Rockwell ICS/SCADA systems should review the advisory and apply recommended mitigations.
Source: SecurityWeek
Recommended Defensive Measures
- Network Security Appliances: Audit Fortinet deployments; implement additional monitoring; restrict management interface access
- Email Security: Deploy phishing-resistant MFA; enhance SharePoint security controls; implement email authentication (DMARC/DKIM/SPF)
- Development Environments: Audit VSCode extensions; implement extension allowlisting; monitor for data exfiltration
- Legacy Protocols: Identify and eliminate telnet usage; enforce SSH for remote administration
- Identity Security: Implement additional controls around SSO platforms; monitor for vishing attempts targeting IT staff
5. Resilience & Continuity Planning
Lessons Learned
Ransomware Recovery Opportunity
The recovery of data for 12 U.S. firms following a ransomware gang's operational security failure highlights the importance of:
- Maintaining communication with law enforcement during incidents
- Preserving forensic evidence that may enable recovery
- Not immediately paying ransoms, as alternative recovery paths may emerge
AI-Generated Code Security Risks
Analysis of an AI-written honeypot revealed that AI-generated code can introduce subtle security vulnerabilities when teams over-trust automated output. Organizations should:
- Implement mandatory security review for AI-generated code
- Maintain human oversight of automated development processes
- Test AI-generated components in isolated environments before production deployment
Source: Bleeping Computer
Supply Chain Security
Cloud Environment Exploitation
Research indicates that customer-managed business cloud environments are being actively exploited, affecting security vendors and Fortune 500 companies. Organizations should:
- Audit cloud security configurations against CIS benchmarks
- Implement cloud security posture management (CSPM) tools
- Review third-party access to cloud environments
Source: Security Magazine
NHS Supply Chain Initiative
The NHS open letter on supplier cybersecurity standards provides a framework that critical infrastructure operators may consider adapting:
- Establishing minimum security requirements for suppliers
- Conducting supply chain risk assessments
- Requiring security certifications and attestations
Emergency Preparedness
FEMA Winter Preparedness
FEMA has released winter preparedness guidance as severe weather threatens much of the U.S. Critical infrastructure operators should:
- Review cold weather operational procedures
- Verify backup power and heating systems
- Coordinate with local emergency management
- Update business continuity plans for winter weather scenarios
Source: Homeland Security Today
6. Regulatory & Policy Developments
Compliance Landscape Analysis
Cyber Insights 2026: Regulatory Complexity
SecurityWeek's Cyber Insights 2026 report highlights the increasingly complex regulatory environment facing organizations, where "politics meets business." Key observations:
- Compliance requirements continue to multiply across jurisdictions
- Organizations face challenges harmonizing overlapping regulatory frameworks
- Political considerations increasingly influence cybersecurity regulation
Source: SecurityWeek
GDPR Enforcement
€1.2 billion in GDPR fines were reported this period, demonstrating continued aggressive enforcement of data protection requirements in Europe. U.S. organizations with European operations or customers should ensure GDPR compliance programs remain current.
Source: SecurityWeek
Federal Developments
DHS Science and Technology Leadership
Pedro Allende has been confirmed as the new Under Secretary of Science and Technology at DHS. This appointment may influence technology priorities and research initiatives relevant to critical infrastructure protection.
Source: Homeland Security Today
DHS SBIR Program Clarification
DHS has clarified the Small Business Innovation Research (SBIR) Phase III process as the federal innovation program remains in administrative limbo. Organizations engaged in SBIR contracts should monitor for additional guidance.
Source: Homeland Security Today
Standards Development
NIST Hardware Security Standards
NIST has announced the "SUSHI@NIST" initiative focused on rolling next-generation secure hardware into standards. This effort aims to enhance hardware security for national defense and emerging technologies, with potential implications for critical infrastructure supply chain security.
Source: NIST
7. Training & Resource Spotlight
Tools and Frameworks
Net-NTLMv1 Rainbow Tables
New Net-NTLMv1 rainbow tables have been released, which security teams can use to assess the risk of legacy authentication protocols in their environments. Organizations still using NTLMv1 should prioritize migration to more secure authentication methods.
Source: SecurityWeek
Network Detection and Response
NETSCOUT has been recognized for leadership in network detection and response (NDR) capabilities. Organizations evaluating NDR solutions for critical infrastructure environments may consider this recognition in vendor assessments.
Source: CSO Online
Industry Recognition
Ed Chandler Security Innovation Award
The inaugural Ed Chandler Security Innovation Award was presented to ADRM at CONSULT 2025, recognizing innovation in security solutions.
Source: Security Magazine
Research and Analysis
AI Agent Security Considerations
The Hacker News has published analysis on rethinking access, accountability, and risk in the age of AI agents. As AI agents increasingly perform autonomous actions in enterprise environments, security teams should consider:
- Access control frameworks for AI agents
- Audit and accountability mechanisms
- Risk assessment methodologies for autonomous systems
Source: The Hacker News
Awareness Resources
Insider Threat Management
CSO Online has published guidance on taking insider threats seriously, emphasizing that this risk category remains underestimated by many organizations. Security teams should review insider threat programs and ensure appropriate controls are in place.
Source: CSO Online
8. Looking Ahead: Upcoming Events & Considerations
Threat Periods Requiring Heightened Awareness
Winter Weather Operations
With severe winter weather threatening much of the U.S., critical infrastructure operators should maintain heightened awareness for:
- Physical impacts to infrastructure from ice, snow, and cold
- Increased demand on energy systems
- Potential for cyber attacks timed to coincide with weather-related stress
- Supply chain disruptions affecting maintenance and operations
Continued Nation-State Activity
Following the Sandworm attack on Polish power infrastructure, European and NATO-aligned energy sector operators should maintain elevated vigilance for:
- Reconnaissance activity against energy systems
- Spear-phishing campaigns targeting energy sector personnel
- Potential for additional destructive attacks
Anticipated Developments
Fortinet Patch Completion
Organizations should monitor for Fortinet's complete remediation of the FortiCloud SSO authentication bypass vulnerability. Expect additional advisories and patches in the coming days to weeks.
Pwn2Own Vulnerability Disclosures
Following Pwn2Own Automotive 2026, expect coordinated disclosure of the 76 zero-day vulnerabilities demonstrated during the event. Automotive and EV charging infrastructure operators should monitor for patches from affected vendors.
Upcoming Industry Events
Homeland Security Today National Border Security Awards
Homeland Security Today has launched the National Border Security Awards program. Nominations and event details are forthcoming.
Source: Homeland Security Today
Seasonal Security Considerations
- Q1 2026 Budget Cycles: Many organizations are finalizing security budgets; ensure critical infrastructure protection investments are prioritized
- Tax Season Phishing: Anticipate increased phishing activity leveraging tax-related themes
- Winter Storm Response: Maintain coordination with emergency management partners for potential weather-related incidents
Contact and Coordination
Critical infrastructure owners and operators are encouraged to:
- Report suspicious activity to CISA
- Participate in sector-specific Information Sharing and Analysis Centers (ISACs)
- Engage with local Fusion Centers for regional threat awareness
- Coordinate with sector-specific agencies for specialized guidance
This briefing is derived from open-source reporting and is intended to support critical infrastructure protection efforts. Information should be verified through official channels before operational implementation.
This briefing is generated using AI analysis of public news sources. Always verify critical information through authoritative sources before taking action.