In May 2023, Denmark’s energy infrastructure became the focus of a highly orchestrated cyber offensive that raised alarms about the escalating threats facing critical sectors. This attack, described as unprecedented, demonstrated a level of sophistication and planning that caught the attention of cybersecurity professionals around the globe.
The scale of the assault was staggering, affecting 22 key companies within the Danish energy sector. “The complexities of this cyber operation were not just in execution but in using specific vulnerabilities to create pathways for attacks on secure systems,” said David Kasabji, Principal Threat Intelligence Analyst. His insights highlight the multi-layered strategy that attackers employed.
The attackers used several methods to penetrate the systems of the targeted companies. “We saw an intricate use of lateral movement, where the intruders navigated silently through the network, escalating privileges along the way,” explained Kasabji. They utilized spear phishing and social engineering as their first entry points, particularly tailored to bypass traditional security measures.

One of the most significant components of their strategy was the exploitation of zero-day vulnerabilities. “These attackers demonstrated advanced technical knowledge and resources by leveraging undisclosed vulnerabilities, an approach that can be both effective and difficult to counter,” Kasabji noted.
The attackers also utilized efficient malware and ransomware that propagated through the network, severely crippling operational capabilities. This came in tandem with efforts to compromise third-party vendors, further broadening the assault. Kasabji emphasized the relevance of this tactic by stating, “Compromising supply chains has become a prevalent approach for targeting well-defended networks, and this attack was no exception.”
Career Journey
From the perspective of the cyber kill chain, the incident exemplified a comprehensive execution of attack stages. “The attackers clearly had objectives they wanted to achieve,” said Kasabji, who explained that this included successfully commanding and controlling operations. “Their methodology of reconnaissance and tailored exploitation indicated extensive pre-attack research.”
Given the attack's complexity and resource demands, it is reasonable to consider that an Advanced Persistent Threat (APT) group was behind it. “It’s highly suggestive of state-sponsored attackers who often have long-term strategies aimed at disruption or espionage,” Kasabji assessed. The focus on critical infrastructure suggests potential geopolitical motivations underlining the threat.

The unfolding of events began on April 25, 2023, when a crucial vulnerability (CVE-2023-28771) was revealed in Zyxel firewalls. This vulnerability, scored 9.8 out of 10 for severity, allowed cybercriminals a deceptive entryway, threatening critical infrastructure. “These firewalls protected industrial control systems, and the exposure drove significant concerns about wider implications,” Kasabji stated.
Following this announcement, SektorCERT promptly alerted organizations to address the vulnerabilities in their Zyxel firewalls. “Despite the warnings, many companies misjudged the threat level, either underestimating the risk or presuming their systems were secure,” said Kasabji, reflecting on the challenges organizations faced.
On May 11, the coordinated assault began, targeting 16 energy companies and exploiting the initial vulnerability. “The attackers swiftly compromised 11 companies by taking control of their firewalls, leading to potentially embarrassing and damaging breaches of critical operations,” noted Kasabji.
In light of the alarming developments, SektorCERT immediately established an incident response team, working tirelessly to identify affected organizations and communicate effectively with authorities and stakeholders. “Their response was crucial in mitigating damage and helping companies regain control,” Kasabji reported.
Looking Ahead
As cybersecurity threats continue to evolve, this incident underscores the urgent need for robust defense mechanisms and timely updates regarding emerging vulnerabilities. Organizations within critical sectors like energy must remain vigilant and proactive in their cybersecurity measures to guard against future attacks. The lessons drawn from this unprecedented incident will prove vital in shaping the future of cybersecurity in Denmark and beyond.


