Pull to refresh
Logo
Daily Brief
Following
Why Ranks Sign Up
Russia's Sandworm unit wages five-year shadow war on Western energy grid

Russia's Sandworm unit wages five-year shadow war on Western energy grid

Force in Play

GRU's elite cyber unit shifted from headline-grabbing zero-days to patient, methodical infiltration of misconfigured systems

December 15th, 2025: Amazon Exposes Five-Year Campaign

Overview

From 2021 to 2025, Amazon exposed that Sandworm (GRU Unit 74455)—the team behind NotPetya and Ukraine's grid attacks—had shifted to infiltrating misconfigured devices at Western utilities, energy companies, and security providers. They compromised edge devices, harvested credentials, and penetrated networks across North America and Europe.

This wasn't a smash-and-grab raid—it was patient reconnaissance at scale. Amazon Threat Intelligence tracked Sandworm's campaign for years, watching it pivot from explosive headline-grabbing attacks to infiltration designed to map critical systems. The unit that left 230,000 Ukrainians without power in 2015 and unleashed $10 billion in NotPetya damages is now inside Western energy infrastructure, and the full scope of what they've accessed remains unknown.

Play on this story Voices Debate Predict

Key Indicators

5 years
Campaign Duration
Sustained targeting from 2021 through 2025, representing one of the longest-running critical infrastructure campaigns
10+
Victim Organizations
Amazon identified more than 10 affected organizations across energy and critical infrastructure sectors
$10B+
Prior NotPetya Damages
Economic damage from Sandworm's 2017 NotPetya attack, establishing destructive capability
230K
Ukraine Blackout Victims
People left without power in Sandworm's 2015 Ukraine grid attack, proving kinetic impact

Voices

Curated perspectives — historical figures and your fellow readers.

Ever wondered what historical figures would say about today's headlines?

Sign up to generate historical perspectives on this story.

Play

Exploring all sides of a story is often best achieved with Play.

Log in to play. Track your picks, climb the leaderboards. Log in Sign Up
Predict 4 ways this could play out. Contrarian picks score more — points lock when the scenario resolves. Log in to play
Timeline Five events from this story — drag them oldest to newest. Log in to play
Connections Sixteen names from the news. Find the four hidden groups of four. Log in to play

People Involved

Organizations Involved

Timeline

December 2015 December 2025

12 events Latest: December 15th, 2025 · 5 months ago Showing 8 of 12
Tap a bar to jump to that date
  1. Amazon Exposes Five-Year Campaign

    Latest Intelligence Disclosure

    Amazon Threat Intelligence publicly disclosed Sandworm's sustained 2021-2025 campaign targeting Western energy infrastructure. Amazon identified 10+ victim organizations, notified customers, remediated compromised systems, and shared intelligence with partners.

  2. CISA Advisory on Pro-Russia Hacktivists

    Government Advisory

    CISA, FBI, NSA, DOE, and EPA issued joint advisory detailing pro-Russia hacktivist groups exploiting VNC connections to attack water, agriculture, and energy sectors—lower sophistication than APT44 but demonstrating sustained focus.

  3. FBI Warns of FSB Targeting Network Devices

    Government Advisory

    FBI issued warning that Russian FSB cyber actors were exploiting SNMP protocols and end-of-life networking devices to broadly target U.S. and global entities, complementing GRU's infrastructure campaign.

  4. Mandiant Upgrades to APT44 Designation

    Intelligence Assessment

    Google's Mandiant threat intelligence graduated Sandworm to APT44, recognizing the unit's full-spectrum capabilities across espionage, attack, and influence operations and its threat to governments and critical infrastructure globally.

  5. Tactical Shift to Misconfiguration Targeting

    Operational Evolution

    Sandworm reduced investment in zero-day exploitation, pivoting to sustained targeting of misconfigured network edge devices—VPNs, routers, firewalls—with exposed management interfaces. Campaign targeted energy utilities and MSSPs.

  6. Industroyer2 Attack Thwarted in Ukraine

    Attempted Cyberattack

    Sandworm deployed Industroyer2 targeting a Ukrainian energy supplier, scheduled to cut power for a region affecting 2 million people. CERT-UA and ESET researchers identified and stopped the attack before execution.

  7. Western Infrastructure Campaign Begins

    Cyber Espionage

    Sandworm launched sustained targeting of Western critical infrastructure, initially exploiting zero-day and N-day vulnerabilities in WatchGuard, Confluence, and other network edge devices across North America and Europe.

  8. Olympic Destroyer Disrupts Winter Games

    Destructive Cyberattack

    Sandworm deployed Olympic Destroyer malware during the 2018 Winter Olympics opening ceremony in Pyeongchang, compromising thousands of computers in retaliation for Russia's doping ban from the games.

  9. NotPetya Unleashed Globally

    Destructive Cyberattack

    Unit 74455 deployed NotPetya via compromised Ukrainian accounting software M.E.Doc. Disguised as ransomware, it was actually a wiper causing over $10 billion in global damages across thousands of organizations.

  10. Ukraine Grid Hit with Industroyer

    Destructive Cyberattack

    Sandworm deployed Industroyer, the first malware specifically designed to attack electrical grids, targeting Kyiv's 330 kilowatt electrical substation and cutting one-fifth of the city's nighttime power consumption.

  11. Sandworm's First Power Grid Attack

    Destructive Cyberattack

    GRU Unit 74455 executed the first successful cyberattack on a power grid, targeting three Ukrainian energy companies with BlackEnergy malware. Attackers opened breakers at 30 substations, leaving 230,000 residents without power for up to six hours.

Historical Context

3 moments from history that rhyme with this story — and how they unfolded.

December 23, 2015

2015 Ukraine Power Grid Attack (BlackEnergy)

GRU Unit 74455 executed the first successful cyberattack on a power grid, targeting three Ukrainian energy distribution companies. Attackers delivered BlackEnergy malware via spearphishing eight months before the attack, conducted extensive reconnaissance of OT networks, then remotely opened breakers at 30 substations. The attack lasted minutes but left 230,000 residents without power for up to six hours. KillDisk malware wiped systems and corrupted master boot records, rendering them inoperable.

Then

Six-hour blackout affecting 230,000 people; attackers demonstrated ability to translate cyber operations into kinetic effects on critical infrastructure.

Now

Established blueprint for industrial control system attacks; prompted global critical infrastructure cybersecurity investments; led to Ukraine developing world-class defensive capabilities through necessity.

Why this matters now

The 2021-2025 Western campaign follows the same unit's playbook: patient reconnaissance, credential harvesting, and pre-positioning for potential destructive attacks. The difference is scale—Western grids serve millions, not thousands.

June 27, 2017

2017 NotPetya Attack ($10B Damages)

Sandworm compromised the update mechanism of M.E.Doc, Ukrainian accounting software used by thousands of organizations. On June 27, they pushed NotPetya—malware disguised as ransomware but actually a wiper designed to destroy data. The attack spread globally within hours, crippling Maersk shipping, pharmaceutical giant Merck, FedEx subsidiary TNT, and thousands of other organizations. Total damages exceeded $10 billion, making it the most costly cyberattack in history.

Then

Global business disruption; Maersk reinstalled 4,000 servers and 45,000 PCs; Merck's vaccine production halted; hundreds of organizations suffered permanent data loss.

Now

Demonstrated that cyber operations could achieve strategic economic impact comparable to conventional military action; prompted insurance industry to reconsider cyber coverage; established precedent for nation-state malware causing collateral damage far beyond intended targets.

Why this matters now

NotPetya proved Unit 74455 is willing to cause massive economic damage even when collateral impact extends globally. The current campaign's targeting of Western energy infrastructure carries similar—or greater—destructive potential.

March 2020 - December 2020

2020 SolarWinds Supply Chain Compromise

Russian SVR intelligence (not GRU, but demonstrating Russian doctrine) compromised SolarWinds Orion software, used by 18,000 organizations including U.S. government agencies and Fortune 500 companies. Attackers inserted malicious code into legitimate software updates, turning SolarWinds into an unwitting distribution mechanism for espionage malware. The campaign remained undetected for nine months until FireEye discovered they'd been breached.

Then

Massive incident response effort across U.S. government and private sector; multiple agencies confirmed compromised; extensive forensic investigation required.

Now

Fundamentally shifted understanding of supply chain risk; prompted Executive Order 14028 on cybersecurity; established that software supply chain is a viable strategic attack vector for espionage at scale.

Why this matters now

Sandworm's targeting of managed security service providers in the current campaign follows similar logic—compromise one provider to access many clients. The combination of Russia's SolarWinds-proven supply chain methodology with Unit 74455's destructive track record is especially concerning.

Sources

(10)