Russian Hackers Brick Polish Power Grid Systems as Ivanti Zero-Days Exploited; White House Revokes Software Security Rules
1. Executive Summary
This week's intelligence cycle reveals significant escalation in nation-state targeting of critical infrastructure, major policy shifts affecting federal cybersecurity requirements, and continued exploitation of enterprise software vulnerabilities.
Major Developments
- Energy Sector Attack: Russia-linked threat actor Sandworm/Electrum conducted coordinated cyber attacks against Polish energy infrastructure, targeting over 30 wind and solar farms and bricking industrial control system (ICS) devices at multiple sites. This represents a significant escalation in destructive attacks against European energy infrastructure.
- Active Zero-Day Exploitation: Ivanti has released emergency patches for two critical zero-day vulnerabilities (CVSS 9.3+) in Endpoint Manager Mobile (EPMM) that are under active exploitation. One vulnerability has been added to CISA's Known Exploited Vulnerabilities catalog.
- Policy Reversal: The White House has revoked two Biden-era memorandums establishing software security requirements for federal contractors, characterizing them as "burdensome." This shift may impact software supply chain security standards across government systems.
- Expanding Threat Campaigns: Mandiant reports significant expansion of ShinyHunters-style vishing attacks targeting SaaS platforms, with threat actors stealing MFA credentials to breach enterprise environments. Separately, North Korean threat groups have evolved, with Labyrinth Chollima splitting into three distinct operational units.
- Insider Threat Advisory: CISA has issued guidance urging critical infrastructure organizations to take immediate action against insider threats, highlighting growing concerns about internal security risks.
2. Threat Landscape
Nation-State Threat Actor Activities
Russia - Sandworm/Electrum (Energy Sector)
CERT Polska has disclosed coordinated cyber attacks attributed to Russia-linked Sandworm (also tracked as Electrum) targeting Polish critical infrastructure. The campaign affected:
- More than 30 wind and photovoltaic (solar) farms
- Communication and control systems at 30 separate sites
- At least one private manufacturing company
The attacks resulted in ICS devices being "bricked" - rendered permanently inoperable - representing a shift from intelligence collection to destructive operations. This activity aligns with Russia's documented interest in degrading NATO-allied energy infrastructure.
Source: SecurityWeek, The Hacker News
China - UAT-8099 (IT Infrastructure)
Cisco Talos researchers have identified a new campaign by China-linked threat actor UAT-8099 targeting IIS servers across Asia. The campaign, active from late 2025 through early 2026, deploys BadIIS malware for SEO manipulation and potential further compromise. Organizations running Internet Information Services should review server configurations and monitor for indicators of compromise.
Source: The Hacker News
North Korea - Labyrinth Chollima Evolution
CrowdStrike assesses that North Korean threat group Labyrinth Chollima has evolved into three distinct hacking groups, indicating increased operational capacity and specialization. This fragmentation suggests expanded targeting capabilities and potentially more sophisticated tradecraft across different operational objectives.
Source: Infosecurity Magazine
Iran-Targeting Campaign (RedKitten)
A new AI-developed malware campaign dubbed "RedKitten" has been identified targeting individuals seeking information about missing persons or political dissidents in Iran. While not directly targeting U.S. critical infrastructure, this campaign demonstrates the increasing use of AI in malware development and social engineering lure creation.
Source: Infosecurity Magazine
Ransomware and Cybercriminal Developments
ShinyHunters Vishing Campaign Expansion
Mandiant has identified a "significant expansion in threat activity" using tradecraft consistent with the ShinyHunters extortion group. Key characteristics include:
- Voice phishing (vishing) attacks targeting enterprise employees
- MFA credential theft to bypass security controls
- Focus on SaaS platform access for data exfiltration
- Hundreds of organizations currently in crosshairs
The campaign represents an evolution in social engineering tactics, with threat actors calling employees directly to obtain authentication credentials rather than relying solely on email-based phishing.
Source: Mandiant Blog, CSO Online
Cryptocurrency Illicit Flows
Illegal cryptocurrency flows reached a record $158 billion in 2025, reversing a three-year declining trend (from $86B in 2021 to $64B in 2024). This surge indicates increased profitability of cybercriminal operations and highlights the continued challenge of disrupting ransomware payment ecosystems.
Source: Bleeping Computer
Emerging Attack Vectors
AI Platform Abuse
Threat actors are increasingly abusing legitimate AI infrastructure for malicious purposes:
- Hugging Face: Android remote access trojans (RATs) are being distributed via malicious payloads hosted in Hugging Face repositories, exploiting the platform's trusted reputation.
- Ollama Exposure: Researchers identified 175,000 exposed Ollama hosts that could enable LLM abuse, with 23,000 hosts persistently responsible for majority of observed activity over 293 days.
- Chrome Extensions: Malicious browser extensions discovered stealing OpenAI ChatGPT authentication tokens and hijacking affiliate links.
Source: SecurityWeek, CSO Online
Invoice Fraud Warning
The UK National Crime Agency and NatWest have issued a joint warning about cyber fraudsters targeting corporate finance departments through invoice fraud schemes, costing businesses millions annually. Critical infrastructure organizations should review accounts payable procedures and implement verification protocols for payment changes.
Source: Infosecurity Magazine
3. Sector-Specific Analysis
Energy Sector
CRITICAL: Polish Renewable Energy Infrastructure Attack
The coordinated Sandworm/Electrum attack on Polish energy infrastructure represents the most significant publicly disclosed destructive cyber operation against European energy systems in recent months.
Attack Characteristics:
- Targeted renewable energy generation (wind and solar farms)
- Compromised communication and control systems
- Resulted in permanent damage to ICS devices (bricking)
- Affected 30+ separate sites simultaneously
Implications for U.S. Energy Sector:
- Renewable energy facilities may face increased targeting as adversaries seek to disrupt energy transition efforts
- Distributed generation assets (wind/solar farms) present expanded attack surface compared to centralized generation
- Communication systems connecting remote generation sites to control centers represent high-value targets
- ICS device destruction indicates willingness to cause lasting physical damage rather than temporary disruption
Recommended Actions:
- Review network segmentation between IT and OT environments at renewable generation facilities
- Audit remote access mechanisms for distributed energy resources
- Ensure ICS device firmware is current and backup configurations are maintained offline
- Coordinate with sector ISACs for additional threat intelligence
Source: SecurityWeek, The Hacker News
Water & Wastewater Systems
No sector-specific incidents reported this period. However, water utilities should note:
- The Polish energy attack demonstrates Sandworm's continued focus on critical infrastructure supporting essential services
- CISA's insider threat guidance applies to water sector organizations
- Ivanti EPMM vulnerabilities may affect mobile device management in water utility environments
Communications & Information Technology
IIS Server Targeting
The UAT-8099 campaign targeting IIS servers across Asia with BadIIS malware highlights ongoing risks to web infrastructure. Organizations should:
- Audit IIS server configurations and patch levels
- Monitor for SEO manipulation indicators
- Review web server logs for suspicious activity patterns
Mobile Device Management Vulnerabilities
Active exploitation of Ivanti EPMM zero-days poses significant risk to organizations relying on mobile device management for workforce security. Communications sector organizations with mobile workforces should prioritize patching.
NTLM Deprecation
Microsoft announced plans to disable NTLM authentication by default in future Windows releases due to security vulnerabilities. Organizations should begin planning migration to modern authentication protocols.
Source: Bleeping Computer
Transportation Systems
Maritime Sector Updates
- ASAP Portal Launch: The U.S. Coast Guard has debuted a new portal to streamline mariner credentialing processes, potentially improving workforce availability for maritime operations.
- No direct cyber threats to transportation systems reported this period, though sector organizations should monitor for potential spillover from energy sector targeting.
Source: Homeland Security Today
Healthcare & Public Health
No sector-specific incidents reported this period. Healthcare organizations should note:
- ShinyHunters vishing campaigns may target healthcare SaaS platforms containing protected health information
- Ivanti EPMM vulnerabilities affect mobile device management commonly used in healthcare settings
- CISA insider threat guidance particularly relevant given healthcare workforce access to sensitive data
Financial Services
Invoice Fraud Alert
Joint NCA/NatWest warning highlights sophisticated invoice fraud targeting corporate finance departments. Financial services organizations should:
- Implement multi-channel verification for payment changes
- Train accounts payable staff on social engineering tactics
- Review vendor management and payment authorization procedures
Cryptocurrency Enforcement
Record illicit cryptocurrency flows ($158B in 2025) underscore continued challenges in disrupting cybercriminal financial infrastructure. Financial institutions should maintain robust cryptocurrency transaction monitoring.
Government Facilities
Software Security Policy Changes
The White House revocation of Biden-era software security memorandums may affect federal contractor requirements and government system security standards. Government facility operators should monitor for updated guidance on software supply chain security expectations.
Intellectual Property Theft
A former Google engineer was convicted for stealing AI-related trade secrets intended for a China-based startup, highlighting ongoing insider threat risks in technology-adjacent government and contractor environments.
Source: The Hacker News
4. Vulnerability & Mitigation Updates
Critical Vulnerabilities Requiring Immediate Attention
🔴 CRITICAL: Ivanti Endpoint Manager Mobile (EPMM) Zero-Days
| Attribute | Details |
|---|---|
| Severity | Critical (CVSS 9.3+) |
| Status | Actively Exploited in the Wild |
| Impact | Unauthenticated Remote Code Execution |
| CISA KEV | Added to Known Exploited Vulnerabilities catalog |
| Action Required | Apply patches immediately; review MDM logs for compromise indicators |
Analysis: These vulnerabilities allow unauthenticated attackers to execute arbitrary code remotely on affected systems. Given EPMM's role in managing mobile devices across enterprise environments, successful exploitation could provide attackers with access to managed device configurations, credentials, and potentially pivot points into broader network infrastructure.
Affected Organizations: Any organization using Ivanti EPMM for mobile device management, particularly those in critical infrastructure sectors with mobile workforces.
Mitigation Steps:
- Apply Ivanti security updates immediately
- Review EPMM access logs for suspicious authentication attempts
- Audit managed device inventory for unauthorized changes
- Consider temporary network isolation of EPMM servers if patching is delayed
Source: SecurityWeek, The Hacker News, CSO Online
🟠 HIGH: SmarterMail Remote Code Execution
| Attribute | Details |
|---|---|
| Severity | Critical (CVSS 9.3) |
| Status | Patched; No known exploitation |
| Impact | Unauthenticated Arbitrary Code Execution |
| Action Required | Update SmarterMail installations; review email server security |
Analysis: SmarterTools has addressed two security flaws in SmarterMail, including one critical vulnerability enabling arbitrary code execution. Organizations using SmarterMail for email services should prioritize updates.
Source: The Hacker News
Notable Patches and Updates
Microsoft Updates
- Windows 11 KB5074105: Preview cumulative update includes 32 changes, fixing boot, sign-in, and activation issues. Organizations experiencing boot failures after January 2026 updates should review Microsoft's guidance linking issues to failed December 2025 update attempts.
- Outlook Fix: Microsoft resolved a bug preventing access to encrypted emails in classic Outlook following recent updates.
- NTLM Deprecation Notice: Future Windows releases will disable NTLM authentication by default. Begin planning migration to modern authentication protocols.
Source: Bleeping Computer
Defensive Recommendations
Vishing Defense (ShinyHunters Campaign)
Based on Mandiant's guidance for defending against the expanding ShinyHunters vishing campaign:
- Implement strict verification procedures for any phone-based requests for credentials or MFA codes
- Train employees to recognize voice phishing tactics and establish callback verification procedures
- Deploy phishing-resistant MFA (FIDO2/WebAuthn) where possible
- Monitor SaaS platform access logs for anomalous authentication patterns
- Establish clear escalation procedures for suspicious contact attempts
Source: Mandiant Blog
ICS/OT Security (Energy Sector)
In response to the Polish energy infrastructure attacks:
- Audit network segmentation between corporate IT and operational technology environments
- Review and restrict remote access to ICS/SCADA systems
- Maintain offline backups of ICS device configurations
- Implement monitoring for anomalous commands to industrial control systems
- Coordinate with E-ISAC for sector-specific threat intelligence
AI Platform Security
Given abuse of Hugging Face and Ollama platforms:
- Implement application allowlisting to prevent unauthorized AI tool installation
- Monitor for connections to AI model hosting platforms from production environments
- Review browser extension policies and audit installed extensions
- Establish governance policies for AI tool usage in enterprise environments
5. Resilience & Continuity Planning
Lessons from Recent Incidents
Polish Energy Attack Implications
The Sandworm attack on Polish renewable energy infrastructure offers several lessons for resilience planning:
Key Observations:
- Distributed Assets Increase Attack Surface: Renewable energy facilities often involve numerous geographically dispersed assets connected via communication networks, creating multiple potential entry points.
- Destructive Intent: The bricking of ICS devices indicates adversary willingness to cause permanent damage rather than temporary disruption, requiring robust backup and recovery capabilities.
- Coordinated Targeting: Simultaneous attacks on 30+ sites suggest sophisticated operational planning and the need for coordinated sector-wide defense.
Resilience Recommendations:
- Maintain offline spare ICS components for critical systems
- Develop manual operation procedures for essential functions
- Establish communication protocols that don't depend on potentially compromised systems
- Conduct tabletop exercises simulating coordinated attacks on distributed assets
Crisis Communication Best Practices
Security Magazine highlights that trust is lost in minutes during a crisis, emphasizing the importance of clear, human communication. Critical infrastructure organizations should:
- Pre-position crisis communication templates and spokesperson training
- Establish stakeholder notification procedures before incidents occur
- Practice crisis communication as part of incident response exercises
- Maintain relationships with sector regulators and information sharing partners
Source: Security Magazine
Supply Chain Security Developments
Software Security Policy Changes
The White House revocation of Biden-era software security memorandums creates uncertainty around federal software supply chain requirements. Organizations should:
- Continue implementing software bill of materials (SBOM) capabilities regardless of regulatory requirements
- Maintain vendor security assessment programs
- Monitor for updated federal guidance on software security expectations
- Consider industry frameworks (NIST SSDF, SLSA) as baseline standards
Shadow AI Risks
Research indicates roughly half of employees are using unsanctioned AI tools, with enterprise leaders among major culprits. This creates supply chain and data security risks that organizations should address through:
- Clear AI acceptable use policies
- Approved AI tool catalogs with security vetting
- Technical controls to detect unauthorized AI platform usage
- Training on data handling risks associated with AI tools
Source: CSO Online
Cross-Sector Dependencies
This week's developments highlight several cross-sector dependencies:
- Energy → All Sectors: Attacks on energy generation affect all sectors dependent on reliable power
- IT → All Sectors: Ivanti EPMM vulnerabilities affect mobile device management across all sectors
- Communications → Energy: Polish attacks targeted communication systems connecting distributed energy assets
- Financial → All Sectors: Cryptocurrency flows enabling ransomware affect all sectors
Emergency Response Coordination
FEMA has deployed debris teams to Mississippi and Tennessee following recent severe weather, demonstrating ongoing federal support for infrastructure restoration. Critical infrastructure organizations should maintain current emergency contact information and coordination procedures with relevant federal, state, and local emergency management agencies.
Source: Homeland Security Today
6. Regulatory & Policy Developments
Federal Policy Changes
Software Security Memorandums Revoked
The White House has revoked two Biden-era memorandums establishing software security requirements for federal contractors, characterizing them as "burdensome." Key implications:
What Changed:
- Memorandums requiring software security attestations from federal contractors have been rescinded
- Some resources provided by the memorandums may still be available for voluntary use
- Regulatory uncertainty for organizations that had begun compliance efforts
Recommended Approach:
- Continue software security best practices regardless of regulatory requirements
- Maintain SBOM capabilities as industry standard practice
- Monitor for replacement guidance or alternative requirements
- Document security practices for potential future compliance needs
Source: SecurityWeek
CISA Developments
- Insider Threat Guidance: CISA has issued guidance urging critical infrastructure organizations to take action against insider threats, emphasizing the need for comprehensive insider threat programs.
- RSA Conference Withdrawal: Reports indicate CISA has withdrawn from the RSA Conference, though implications for public-private engagement remain unclear.
- CISA Authorization Concerns: Security Magazine analysis suggests stop-and-go authorizations undermine real-time threat sharing, raising questions about confidence for cyber threat reporters.
Source: Homeland Security Today, Security Magazine
Law Enforcement Actions
Piracy Infrastructure Takedowns
- DOJ Domain Seizures: The Department of Justice seized three U.S.-registered domains distributing copyrighted content that received tens of millions of visits annually.
- Operation Switch Off: International law enforcement dismantled major pirate TV streaming services, seizing three industrial-scale illegal IPTV operations.
While not directly related to critical infrastructure, these actions demonstrate continued law enforcement focus on disrupting criminal infrastructure.
Source: CyberScoop, Bleeping Computer
Malicious Network Disruption
Google has taken action to disrupt IPIDEA proxy infrastructure, removing millions of devices from a malicious network. While the effort impaired some infrastructure, not all was affected, underscoring the ongoing challenge of dismantling cybercriminal operations.
Source: CyberScoop
International Developments
NIS2 Supply Chain Considerations
European NIS2 directive implementation continues to emphasize supply chain as a risk factor. U.S. organizations with European operations or customers should monitor NIS2 compliance requirements and their potential impact on transatlantic business relationships.
Source: CSO Online
Intellectual Property Protection
The conviction of a former Google engineer for stealing AI trade secrets for a China-based startup reinforces the importance of insider threat programs and intellectual property protection measures, particularly for organizations involved in AI development or critical technology sectors.
Source: The Hacker News
7. Training & Resource Spotlight
New Tools and Frameworks
Vulnerability Management Innovation
Aisy Platform Launch: Aisy has emerged from stealth with $2.3 million in seed funding for an AI-assisted vulnerability management platform. Organizations struggling with vulnerability prioritization may benefit from evaluating emerging AI-powered solutions.
Source: SecurityWeek
Linux Security Development
Amutable: Startup Amutable is developing Linux security enhancements to counter hacking threats. Organizations with significant Linux infrastructure should monitor developments in this space.
Source: CSO Online
Human Risk Management
CSO Online highlights the evolution from traditional security awareness training to comprehensive human risk management approaches. Key considerations:
- Move beyond compliance-focused training to behavior-change programs
- Implement continuous assessment rather than annual training cycles
- Tailor training to role-specific risks and threat scenarios
- Measure security behavior changes rather than training completion rates
Source: CSO Online
Threat Intelligence Resources
Mandiant ShinyHunters Guidance
Mandiant has published detailed guidance for proactive defense against ShinyHunters-branded data theft targeting SaaS platforms. Security teams should review this resource for:
- Indicators of compromise
- Detection strategies
- Defensive recommendations
- Incident response considerations
Source: Mandiant Blog
Law Enforcement Insights
The Hacker News has published analysis on law enforcement approaches to cybercriminals, examining what brings threat actors to justice and their roles in the criminal ecosystem. This resource may be valuable for understanding adversary motivations and vulnerabilities.
Source: The Hacker News
Security Conference Guide
CSO Online has published an updated guide to top security conferences for 2026. Security professionals should review upcoming opportunities for training, networking, and threat intelligence sharing.
Source: CSO Online
Platform Security Guidance
Apple has updated its platform security guide, providing comprehensive documentation on security features across Apple devices. Organizations with Apple device deployments should review updated guidance for security configuration recommendations.
Source: SecurityWeek
8. Looking Ahead: Upcoming Events
Conferences and Training
DRONERESPONDERS National Public Safety UAS Conference
- Dates: March 10-11, 2026
- Focus: Public safety unmanned aerial systems operations and policy
- Relevance: Critical infrastructure organizations using or considering UAS
This briefing is generated using AI analysis of public news sources. Always verify critical information through authoritative sources before taking action.