CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership Apr 17, 2026

ZionSiphon Malware Targets ICS in Water Facilities

Security Week Archived Apr 17, 2026 ✓ Full text saved

The malware is configured to operate on systems associated with Israeli water treatment and desalination plants. The post ZionSiphon Malware Targets ICS in Water Facilities appeared first on SecurityWeek .

Full text archived locally
✦ AI Summary · Claude Sonnet


    Researchers at Darktrace have discovered a new malware strain named ZionSiphon, which appears to target water treatment and desalination plants in Israel.  ZionSiphon has many capabilities typically seen in commodity malware, but it caught analysts’ attention due to functionality aimed at operational technology (OT), specifically industrial control systems (ICS). Strings in the analyzed malware sample indicate that ZionSiphon has been developed by anti-Israel hackers, and one encoded string decodes to “Poisoning the population of Tel Aviv and Haifa”. There are several other indicators that Israel is the malware’s main target, including strings naming water facilities in the country. In addition, once it verifies that it’s running with admin privileges and establishes persistence, the malware executes a function to fetch the local IP address and determine whether the compromised host is located in Israel. If the IP is associated with Israel, ZionSiphon checks the system for processes and folders typically found in water treatment plants. Specifically, the malware looks for processes linked to reverse osmosis, desalination, chlorine handling, and plant control. If these conditions are met, the malware looks for local configuration files associated with the aforementioned water treatment processes and attempts to alter them to increase chlorine doses and pressure. It then scans the network for ICS devices that use the Modbus, DNP3, and S7comm protocols. The code indicates that if Modbus devices are found, the malware would attempt to tamper with parameters associated with chlorine doses and pressure. The payload only activates if the country is Israel and the system is associated with a water treatment plant. If these conditions are not met, the malware deletes itself from the device. Researchers also found a mechanism that enables the malware to spread via USB drives. While ZionSiphon seems to have extended capabilities, Darktrace researchers have identified issues in the country validation functionality and incomplete logic for the targeting of DNP3 and S7comm protocols, indicating that the malware is under development. Moreover, the local configuration file tampering and Modbus parameter modifications are unlikely to have an impact in a real-world environment. The code points to the intent to cause disruption, but lacks the sophistication needed to actually change chlorine levels in practice. “Even in its unfinished state, ZionSiphon underscores a growing trend in which threat actors are increasingly experimenting with OT‑oriented malware and applying it to the targeting of critical infrastructure,” Darktrace said. The water sector has been a prime target for hackers. Industrial control systems and other OT systems in this sector are often exposed to the internet and left unprotected, and the potential impact of such attacks can be significant. This makes them an attractive target for many hacktivist groups and state-sponsored threat actors posing as hacktivists.  Israel’s water sector in particular is regularly targeted by Iranian hackers. Pro-Israel hackers have also been known to target water facilities in other countries.  The emergence of ZionSiphon is not surprising in light of the US-Israel-Iran conflict, which has led to an increase in cyberattacks.  Related: Iran-Linked Hackers Disrupt US Critical Infrastructure via PLC Attacks Related: Rockwell Vulnerability Allowing Remote ICS Hacking Exploited in Attacks Related: Ramnit Malware Infections Spike in OT as Evidence Suggests ICS Shift Related: Default ICS Credentials Exploited in Destructive Attack on Polish Energy Facilities WRITTEN BY Eduard Kovacs Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering. More from Eduard Kovacs OpenAI Widens Access to Cybersecurity Model After Anthropic’s Mythos Reveal Data Breach at Tennessee Hospital Affects 337,000 Microsoft Paid Out $2.3 Million at Zero Day Quest 2026 Hacking Contest Claude Code, Gemini CLI, GitHub Copilot Agents Vulnerable to Prompt Injection via Comments Exploited Vulnerability Exposes Nginx Servers to Hacking $10 Domain Could Have Handed Hackers 25k Endpoints, Including in OT and Gov Networks ICS Patch Tuesday: 8 Industrial Giants Publish New Security Advisories Microsoft Patches Exploited SharePoint Zero-Day and 160 Other Vulnerabilities Latest News In Other News: Satellite Cybersecurity Act, $90K Chrome Flaw, Teen Hacker Arrested Another DraftKings Hacker Sentenced to Prison Lawmakers Gathered Quietly to Talk About AI. Angst and Fears of ‘Destruction’ Followed Recent Apache ActiveMQ Vulnerability Exploited in the Wild Two North Korean IT Worker Scheme Facilitators Jailed in the US Cursor AI Vulnerability Exposed Developer Devices 53 DDoS Domains Taken Down by Law Enforcement Government Can’t Win the Cyber War Without the Private Sector Trending Webinar: A Step-By-Step Approach To AI Governance April 28, 2026 With "Shadow AI" usage becoming prevalent in organizations, learn how to balance the need for rapid experimentation with the rigorous controls required for enterprise-grade deployment. Register Virtual Event: Threat Detection And Incident Response Summit May 20, 2026 Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. Register People on the Move ThreatModeler has appointed Kevin Gallagher as Chief Executive Officer. Thomas Bain has been appointed Chief Marketing Officer at Silent Push. The United States Department of War appointed David Vaughn as Technical Advisor for Data Infrastructure. More People On The Move Expert Insights Government Can’t Win The Cyber War Without The Private Sector Securing national resilience now depends on faster, deeper partnerships with the private sector. (Steve Durbin) The Hidden ROI Of Visibility: Better Decisions, Better Behavior, Better Security Beyond monitoring and compliance, visibility acts as a powerful deterrent, shaping user behavior, improving collaboration, and enabling more accurate, data-driven security decisions. (Joshua Goldfarb) The New Rules Of Engagement: Matching Agentic Attack Speed The cybersecurity response to AI-enabled nation-state threats cannot be incremental. It must be architectural. (Nadir Izrael) The Next Cybersecurity Crisis Isn’t Breaches—It’s Data You Can’t Trust Data integrity shouldn’t be seen only through the prism of a technical concern but also as a leadership issue. (Steve Durbin) Why Agentic AI Systems Need Better Governance – Lessons From OpenClaw Agentic AI platforms are shifting from passive recommendation tools to autonomous action-takers with real system access, (Etay Maor) Flipboard Reddit Whatsapp Email
    💬 Team Notes
    Article Info
    Source
    Security Week
    Category
    ◇ Industry News & Leadership
    Published
    Apr 17, 2026
    Archived
    Apr 17, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗