Poland has recently taken significant action to counter a series of cyberattacks from Russian and Belarusian security agencies, highlighting a heightened state of cyber warfare. According to Polish Deputy Prime Minister Krzysztof Gawkowski, these attacks, which intensified in August 2024, aimed to incapacitate governmental functions and steal sensitive information. Gawkowski stated that Polish cyber defenders, including both civilian and military units, successfully mitigated these threats, preventing a major disruption of government operations.
The cyberattacks targeted various institutions, including the Polish Anti-Doping Agency and the Polish Press Agency, reflecting a broader strategy by Russia and Belarus to undermine Poland’s national security. These efforts are part of a larger pattern of cyber-espionage and disinformation campaigns designed to coerce individuals and institutions. The attacks come against the backdrop of Poland’s strong support for Ukraine, including military aid and logistical support, which has positioned Poland as a significant player in the ongoing conflict with Russia.
Experts, including Eugenio Benincasa from ETH Zurich, suggest that Russia’s cyber operations against Poland are aimed at destabilizing key NATO and EU member states. By employing these sophisticated cyber tactics, Russia seeks to influence public opinion and disrupt Poland’s critical support for Ukraine. The focus on Poland’s institutions is a strategic move to weaken the country’s ability to contribute effectively to the defense of Ukraine and to challenge Russia’s geopolitical adversaries.
The Polish government has not disclosed detailed information about the specific Russian and Belarusian cyber actors involved. However, previous incidents have been linked to known Russian cyber units, including APT28 (Fancy Bear) and Sandworm. As Poland continues to bolster its cyber defenses, the situation underscores the broader implications of cyber warfare in contemporary geopolitical conflicts, emphasizing the need for robust and adaptive cybersecurity measures.
Reference: