Karlskrona, Sweden – October 3, 2025
A cogeneration plant outside Karlskrona has become the latest Swedish energy asset targeted in a cyber-attack, underscoring ongoing vulnerabilities across the nation’s critical infrastructure. Police confirmed on Friday evening that the Mältan combined heat and power (CHP) plant, operated by municipal utility Affärsverken, had been subjected to a digital intrusion.
According to the official police statement, there is no danger to the public and customers have not been affected at this stage. Plant operations reportedly remain normal, and the matter has now been referred to police cybercrime investigators in cooperation with Affärsverken’s security teams.
Limited Impact – But Strategic Risks
While the attack has not disrupted electricity or district heating services in Karlskrona, analysts caution that even a contained incident at such a site should be taken seriously. CHP plants are dual-role facilities, providing both electricity and heating—making them high-value targets for malicious actors.
Industry experts note that the intrusion may have been restricted to corporate IT systems rather than operational control systems. However, even attempted breaches can yield valuable reconnaissance for attackers, including access to engineering diagrams, remote-access channels, and vendor credentials. Such data could facilitate future, more damaging operations.

Economic and Operational Implications
The immediate economic impact is likely modest, limited to incident response costs, forensic investigation, and strengthened monitoring. For a mid-sized municipal utility, these expenses can run into hundreds of thousands of euros, covering specialist consultants, audits, and potential regulatory reporting.
The longer-term risks, however, are more significant:
- Ransomware or extortion attempts if attackers exfiltrated sensitive data.
- Supply-chain remediation costs, particularly if the breach originated via third-party vendors.
- Regulatory scrutiny under GDPR if personal or operational data were compromised.
- Insurance repercussions, with premiums and compliance obligations expected to tighten.
Beyond economics, the attack introduces reputational damage and raises public anxiety around energy resilience, particularly with colder months ahead when district heating demand is high.
A Broader Pattern of Swedish Exposure
The Karlskrona incident comes just weeks after Sweden grappled with the large-scale Miljödata supplier breach, which affected nearly 200 municipalities and exposed sensitive data across the public sector. That episode highlighted systemic vulnerabilities in third-party IT providers, a recurring weak link in national cyber defences.
Taken together, the latest events suggest that Swedish organisations—particularly regional utilities and municipalities—remain highly exposed to persistent and well-resourced cyber adversaries. While resilience measures have improved, the frequency of incidents points to a continuing gap between threat sophistication and defensive maturity.
Looking Ahead
Authorities are now working to determine how the intruders gained access to Affärsverken’s systems and whether data was stolen. The outcome of this investigation will shape sector-wide security directives and could influence future policy from Sweden’s Civil Contingencies Agency (MSB).
For utilities, the lesson is clear: IT and OT segregation, tighter vendor controls, and rehearsed crisis protocols are essential to maintaining both resilience and public confidence.
Though the Karlskrona attack did not escalate into a service outage, it serves as a stark reminder: Sweden’s critical infrastructure is a target—and every probe, successful or not, must be treated as a warning shot in an ongoing campaign.
