Sweden thwarts pro-Russian cyberattack on thermal power plant

Sweden's government has successfully thwarted a pro-Russian cyberattack aimed at a thermal power plant, linked to Russian intelligence. Civil Defence Minister Carl-Oskar Bohlin confirmed there were no serious consequences, highlighting increased cyber threats against Swedish infrastructure since Russia's invasion of Ukraine.

Unknown Author

4 min read
0

/

Sweden thwarts pro-Russian cyberattack on thermal power plant

Sweden thwarts pro-Russian cyberattack on thermal power plant

Cyberattack thwarted
Sweden successfully countered a pro-Russian cyberattack on a thermal power plant in mid-2025, which was linked to Russian intelligence services.
Increased Threat Level
Cyber threats targeting Swedish infrastructure have intensified since Russia’s full-scale invasion of Ukraine, indicating a shift towards more sophisticated and potentially disruptive tactics.
Government Stance
“This points to a changed, more risk-prone and more reckless behaviour from Russia,” said Civil Defence Minister Carl-Oskar Bohlin, emphasising the seriousness of the situation.

Key developments

Sweden’s Civil Defence Minister Carl-Oskar Bohlin confirmed that a pro-Russian cyberattack targeting a thermal power plant was thwarted in mid-2025, linked to Russian intelligence.

Bohlin indicated that cyber threats against Swedish interests have escalated since Russia’s invasion of Ukraine, highlighting a significant shift in Moscow’s approach towards more reckless operations.

Sweden foiled pro-Russian cyberattack on thermal power plant in 2025, minister says

Published on

Sweden thwarted a pro-Russian cyberattack on a thermal power plant in mid-2025, the government said on Wednesday, saying the group behind it was linked to Russian intelligence.

There were no serious consequences, Civil Defence Minister Carl-Oskar Bohlin said.

“The Swedish Security Service handled the case and was able to identify the actor behind it, which has ties to Russian intelligence and security services,” Bohlin told reporters.

Bohlin told the AFP news agency that the attack failed “because the security systems in place worked.”

Without going into detail, he said the aim of the operation was to disrupt the functioning of a facility that supplies heating.

The minister added that the attack “illustrates that we are dealing with an antagonist who does not hesitate to create physical disruptions that can be likened to sabotage of our physical infrastructure.”

The plant was located in western Sweden, he said.

Bohlin said cyber threats against Swedish interests had increased since Russia’s full-scale invasion of Ukraine in February 2022, as Moscow targeted countries supporting Ukraine.

“This points to a changed, more risk-prone and more reckless behaviour from Russia, which could lead to potentially very harmful effects on society,” he said, adding that the Swedish government was taking the development “very seriously.”

“Our support for Ukraine remains steadfast,” he stressed.

More sophisticated

Bohlin also said that attackers were no longer just relying on direct denial of service (DDoS) attacks, which overload systems by sending massive amounts of traffic, against IT systems, but were now also targeting so called operational technology (OT) that control the infrastructure.

“That is, control systems which often control physical functions in various operations and attempt to destroy, compromise, or disrupt them,” Bohlin told AFP.

Pontus Johnson, a professor at the KTH Royal Institute of Technology, explained that while DDoS attacks were relatively simple attacks, attacking OT systems required a higher level of sophistication.

“You don’t just send traffic their way, but you are trying to find vulnerabilities to enter the systems to then be able to affect them,” Johnson said.

“It requires a much more competent attacker,” he said, and added that the rise of the use of AI had also made these types of attacks easier for hackers.

Johnson also said the targeting of OT systems was also more serious because unlike the targeting of for instance a website, these systems actually control things in the “physical world.”

This opens the door to potential disruptions of things like the power grid or railways, he explained.

Bohlin said it was important for Sweden to publicise the threats it was facing to send a signal “to threat-actors and let them know that we see what you are doing.”

“We are also doing it to continually raise awareness in society, in order to develop our cybersecurity and collective resilience, and so that we can act in solidarity with our allies and partners.”

Additional sources • AFP

Responses

    Sarah Mitchell·

    Great article! This really puts things into perspective. I appreciate the thorough research and balanced viewpoint.

    James Anderson·

    Interesting read, though I think there are some points that could have been explored further. Would love to see a follow-up on this topic.

    Emma Thompson·

    Thanks for sharing this! I had no idea about some of these details. Definitely bookmarking this for future reference.

    Michael Chen·

    Well written and informative. The examples provided really help illustrate the main points effectively.

    Olivia Rodriguez·

    This is exactly what I was looking for! Clear, concise, and very helpful. Keep up the excellent work!

Stay Updated

Get the latest posts delivered right to your inbox.

No spam, unsubscribe at any time.