| Issue |
Security and Safety
Volume 5, 2026
|
|
|---|---|---|
| Article Number | 2026002 | |
| Number of page(s) | 19 | |
| Section | Industrial Control | |
| DOI | https://doi.org/10.1051/sands/2026002 | |
| Published online | 27 January 2026 | |
Research Article
An overview of cyber attacks on critical cyber-physical systems and government infrastructures
1
Department of Computer-Aided Design of Computing Systems, Kharkiv National University of Radio Electronics, Kharkiv, 61166, Ukraine
2
Department of Software Engineering, Blekinge Institute of Technology, Karlskrona, 37179, Sweden
3
NioGuard Security Lab, Kharkiv, 61166, Ukraine
* Corresponding authors (email: This email address is being protected from spambots. You need JavaScript enabled to view it.
)
Received:
30
September
2025
Revised:
5
December
2025
Accepted:
14
January
2026
Abstract
This study aimed to analyze the nature, scale, and consequences of cyberattacks on critical cyber-physical systems in Ukraine over the past decade, using a methodology based on classifying attacks by type, threat actor (including Russian hacking groups Sandworm, Fancy Bear, and Ember Bear responsible for half of the 22 analyzed incidents), target sector, and temporal patterns. It also included comparative analysis of cyber defense strategies. The Chinese group Volt Typhoon also demonstrated high risk through living-off-the-land techniques. While phishing remained the primary attack vector (7 cases), sophisticated supply chain attacks like NotPetya caused significant damage, with the energy sector being most targeted (7 incidents) due to its strategic importance. Six attacks involved manipulation of Industrial Control Systems/Operational Technology protocols, while four employed destructive wiper malwares. The Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege (STRIDE) analysis of digital platforms concluded that modern challenges require innovative solutions like Cybersecurity Mesh Architecture, digital immunity systems, and artificial intelligence, along with international coordination, while addressing barriers such as legacy systems, workforce shortages, and regulatory fragmentation, ultimately providing an evidence base for improving cybersecurity strategies at national and international levels.
Key words: Protection security and privacy protection / Fault tolerance / Invasive software / Cryptographic controls / Access controls
Citation: Tovkun Y, Semerenska V, and Adamov A. An overview of cyber attacks on critical cyber-physical systems and government infrastructures. Security and Safety 2026; 5: 2026002. https://doi.org/10.1051/sands/2026002
© The Author(s) 2026. Published by EDP Sciences and China Science Publishing & Media Ltd.
This is an Open Access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.