January 2026 was characterised by precise operations against critical infrastructure and the exposure of sensitive aerospace data. These activities occurred alongside ongoing ransomware threats, weaponization of developer tools, new malware frameworks, and critical vulnerabilities. Key incidents during the month included the coordinated sabotage of renewable energy assets in Poland and a significant breach of the European Space Agency’s collaborative environments.
The defining incident of the period was a sophisticated, multi-stage attack targeting Poland’s distributed energy resources and industrial infrastructure, which reached its destructive phase on December 29, 2025, and dominated recovery efforts throughout January.
The ESA faced two significant, distinct data breaches in quick succession, resulting in the theft of massive technical and development datasets.
The sabotage in Poland proves that corporate IT vulnerabilities are now the primary gateway for reaching industrial control systems.
The MaliciousCorgi campaign proves that IDE extensions are a viable and high-impact vector for industrial espionage and credential theft.
Threat actors are increasingly favoring “encryptionless extortion,” focusing on data exfiltration and public pressure rather than just locking systems.
Organizations should prioritize:
January 2026 proved that IT vulnerabilities are now the primary gateway to critical infrastructure, while developer tools have become high-value attack vectors – requiring organizations to shift from reactive scanning to continuous monitoring and strict policies.