Satine Sentinel: January 23, 2026

Nation-state operators and ransomware affiliates converged on critical infrastructure this week, targeting utilities, enterprise management platforms, and network edge devices with tactics that exploit trusted authentication mechanisms and kernel-level access.

Russia’s Sandworm deployed a new data-wiping malware against Poland’s power grid on the 10th anniversary of their Ukraine blackout operation. Fortinet confirmed that CVE-2025-59718 exploitation continues even on fully patched firewalls, suggesting bypass techniques or incomplete patches. A new ransomware family called Osiris leveraged BYOVD techniques with the POORTRY driver to disable EDR at kernel level, and CISA added a year-old VMware vCenter RCE to KEV after confirming active exploitation.

The pattern: adversaries aren’t chasing new vulnerabilities. They’re systematically dismantling platform-level trust mechanisms (SSO authentication, signed drivers, hypervisor management) that defenders assume are hardened by default.

Sandworm DynoWiper Attack on Poland’s Power Infrastructure

What happened: Russian GRU-linked threat group Sandworm attempted destructive wiper attacks against Poland’s energy sector on December 29-30, 2025, targeting two combined heat-and-power plants and renewable energy management systems. ESET attributed the attack with medium confidence based on TTP overlaps and timing. The operation executed precisely 10 years after Sandworm’s 2015 Ukraine power grid attack that caused the first malware-facilitated blackout. Polish Energy Minister Milosz Motyka called it the strongest attack on Poland’s energy infrastructure in years, stating it could have disrupted power and heat to 500,000 people if successful. The attack was unsuccessful, but deployment of DynoWiper malware confirms destructive intent.

Technical details that matter:

Why you should care: Critical infrastructure wiper attacks represent the apex threat for utilities and industrial operators. Unlike ransomware (which needs operational systems to extort payment), wipers exist purely for destruction or geopolitical signaling. Sandworm’s targeting of Poland, a NATO member and Ukraine supporter, demonstrates willingness to conduct destructive operations against allied nations’ infrastructure.

The renewable energy management focus shows attackers understand modern grid dependencies. These systems weren’t designed with adversarial nation-state threat models in mind, yet they’re now single points of failure for grid stability. The 10-year timing pattern suggests Sandworm maintains institutional memory and deliberately times operations for strategic effect, not just opportunistic access.

Key sources:


Fortinet FortiCloud SSO Bypass: Exploitation Continues on Patched Systems

What happened: Fortinet confirmed on January 23 that CVE-2025-59718 exploitation continues against fully patched FortiGate firewalls, over a month after releasing fixes in early December. Arctic Wolf observed a new wave of automated attacks beginning January 15, creating generic admin accounts with VPN access and exfiltrating firewall configurations within seconds.

Attacks mirror December’s malicious SSO login campaign but now succeed against devices running the latest patched versions, forcing Fortinet to admit “the issue is applicable to all SAML SSO implementations” and promise an additional fix. Nearly 11,000 Fortinet devices with FortiCloud SSO enabled remain exposed online. CISA added CVE-2025-59718 to KEV on December 16 with a one-week federal remediation deadline.

Technical details that matter:

Why you should care: This represents authentication system compromise at scale, not just another CVE. Network edge devices (firewalls, VPN concentrators) are the institutional trust boundary, and Fortinet gear protects thousands of enterprises and critical infrastructure organizations. The patch bypass confirms attackers either found additional exploitation vectors or the cryptographic signature verification fix was incomplete, meaning patched organizations remained vulnerable for 6+ weeks while believing they were protected.

Automated attacks extracting firewall configs suggest credential harvesting for broader campaign phases. Configuration files contain VPN settings, internal network topology, authentication databases (even if hashed), and policy rules. The “default-unsafe” behavior (SSO enabled on registration unless manually disabled) means many organizations are exposed without explicitly choosing to enable the feature. For institutions operating edge infrastructure, this is a supply chain trust failure. You can’t defend against SAML authentication bypass at the network perimeter if the perimeter device itself is compromised.

Key sources:


Osiris Ransomware: BYOVD Attacks with POORTRY Driver Target Enterprise

What happened: Security researchers disclosed a new ransomware family called Osiris that targeted a major food service franchisee operator in Southeast Asia in November 2025. Attackers leveraged Bring Your Own Vulnerable Driver (BYOVD) techniques using the POORTRY malicious driver to disable security software at kernel level before deploying encryption. Symantec Threat Hunter Team identified operational overlaps with INC ransomware operators, including identical Mimikatz variants (same filename “kaz.exe”), data exfiltration to Wasabi cloud buckets, and use of modified RustDesk for remote access. Osiris appears to be wielded by experienced attackers who understand EDR evasion through kernel-mode driver abuse rather than typical ransomware affiliate tactics.

Technical details that matter:

Why you should care: BYOVD is now the dominant defense evasion technique for ransomware operators targeting enterprise environments. Osiris demonstrates the evolution from commodity ransomware to sophisticated adversary operations that neutralize endpoint security at the kernel level before encryption. POORTRY’s signed status (even if malicious) means it loads in environments with driver signature enforcement, bypassing a key Windows security control. For defenders, this creates a detection gap. Your EDR cannot detect its own termination if the attacker achieves kernel-mode execution first.

The food service franchisee targeting shows these techniques aren’t limited to critical infrastructure or government. Any enterprise with valuable data and modern endpoint protection is a candidate for BYOVD-enabled attacks. The operational links to INC ransomware suggest experienced operators are either launching new brands or affiliates are sharing advanced toolsets across ransomware families, raising the baseline capability level industry-wide.

Key sources:


The Pattern This Week

Infrastructure trust mechanisms are the new vulnerability class. Sandworm targeted renewable energy management systems that utilities assume are isolated from adversary reach. Fortinet’s SSO bypass exploits SAML authentication, the federated identity protocol enterprises adopted specifically to improve security. Osiris deploys signed drivers with kernel privileges, subverting Windows driver signature enforcement designed to prevent exactly this attack.

The defender’s gap isn’t detection capability. It’s architectural: these platforms (edge devices, hypervisors, kernel drivers, SSO providers) exist at trust boundaries where security controls either don’t apply or can’t function once compromised. You can’t patch FortiGate from behind FortiGate if authentication is already bypassed. You can’t use EDR to detect EDR’s termination at kernel level.

When the platform itself is the attack surface, your security stack is looking in the wrong place.

See you next week.

Final CTA Section
GET STARTED

Ready to Strengthen Your Defenses?

Whether you need to test your security posture, respond to an active incident, or prepare your team for the worst: we’re ready to help.

📍 Based in Atlanta | Serving Nationwide

Discover more from Satine Technologies

Subscribe now to keep reading and get access to the full archive.

Continue reading