You know that feeling when you read about a new malware, and your stomach drops? This is one of those moments.
Security researchers have uncovered a new strain of malware called ZionSiphon. It's not your average ransomware or info‑stealer. This one is specifically designed to sabotage water treatment and desalination plants – the kind of facilities that keep drinking water safe and flowing to millions of people.
The malware can manipulate chlorine levels and hydraulic pressure, potentially causing equipment damage or public health risks. While the current sample is non‑functional due to a coding error, its architecture provides a chilling blueprint for future attacks.
What is ZionSiphon?
Darktrace, an AI‑powered cybersecurity company, recently analyzed a malware sample that identifies itself as ZionSiphon. The malware combines several familiar host‑based capabilities – privilege escalation, persistence, and USB propagation – with targeting logic specifically themed around water treatment and desalination environments.
What makes ZionSiphon different is its intent. This isn't about stealing data or demanding ransom. This is about causing physical harm. The malware is designed to:
- Increase chlorine levels to dangerous thresholds in drinking water
- Manipulate hydraulic pressure in reverse osmosis systems
- Scan for industrial control protocols like Modbus, DNP3, and S7comm
- Spread via USB drives to reach air‑gapped systems
As Darktrace's VP of Security & AI Strategy, Nathaniel Jones, noted: "ZionSiphon shows a shift in the OT threat landscape: malware capable of targeting industrial processes is no longer exclusive to highly resourced nation‑state programs like Stuxnet or Industroyer."
How It Works (The Technical Side)
ZionSiphon's code reveals several alarming capabilities, even if some aren't fully implemented yet.
Targeted Environmental Checks
Before executing any payload, the malware checks whether it's running in the right environment. It scans the host's IP address against hardcoded Israeli ranges – including 2.52.0.0-2.55.255.255, 79.176.0.0-79.191.255.255, and 212.150.0.0-212.150.255.255. It also looks for water‑related software and configuration files to ensure it's inside a water treatment or desalination facility.
This level of targeting suggests the attacker wants to avoid collateral damage and focus specifically on Israeli water infrastructure.
The Chlorine Sabotage Function
The most alarming function is named IncreaseChlorineLevel(). When triggered, it appends malicious instructions to existing configuration files. Here is what the attacker‑intended configuration looks like:
Chlorine_Dose=10
Chlorine_Pump=ON
Chlorine_Flow=MAX
Chlorine_Valve=OPEN
RO_Pressure=80
These settings would push chlorine levels to the maximum physically supported by the plant's mechanical systems – potentially making water unsafe for consumption and damaging equipment.
ICS Protocol Scanning
ZionSiphon also scans local subnets for industrial control protocols, including Modbus, DNP3, and S7comm – the backbone of global industrial infrastructure. While only Modbus has partially functional code, the inclusion of these protocols shows clear intent to interact directly with programmable logic controllers (PLCs).
USB Propagation for Air‑Gapped Systems
Like Stuxnet before it, ZionSiphon includes USB propagation mechanisms. It copies itself to removable drives as a hidden svchost.exe process and creates malicious shortcut files. This is crucial for reaching air‑gapped systems – those not connected to the internet – which are common in critical infrastructure environments.
As Darktrace notes, "USB propagation is key in critical infrastructure systems, where computers that manage security‑critical functions are often 'air‑gapped,' meaning they are not directly connected to the internet."
The One Thing Saving Us (For Now)
Here's the good news: ZionSiphon doesn't actually work. Not yet, anyway.
Darktrace discovered a critical flaw in the malware's encryption logic – an XOR mismatch in the country verification mechanism. Instead of executing its payload, the broken validation triggers a self‑destruct sequence, rendering the malware harmless in its current form.
But here's the bad news: all it takes to unlock ZionSiphon's destructive potential is fixing that minor verification error. One small code change, and this blueprint becomes a weapon.
As one researcher put it, "While ZionSiphon isn't operational in its current version, its intent and potential for damage are concerning, and all that's needed to unlock both is to fix a minor verification error."
Political Motivations: The Ideological Driver
The malware's political messaging leaves little doubt about its intended target and motivation.
Embedded in the binary are two Base64‑encoded strings. The first decodes to: "In support of our brothers in Iran, Palestine, and Yemen against Zionist aggression. I am '0xICS'."
The second is even more chilling: "Poisoning the population of Tel Aviv and Haifa."
The malware also includes hardcoded references to Israeli water infrastructure components – Mekorot (Israel's national water company), Sorek, Hadera, Ashdod, Palmachim, and Shafdan. Sorek, Hadera, Ashdod, and Palmachim are four of Israel's five major seawater desalination plants.
While these strings don't serve any operational purpose, they offer a clear indication of the attacker's motivations. This isn't financially motivated crime – this is ideologically driven sabotage.
This follows a pattern of escalating cyber skirmishes between Iran and Israel. In April 2026, an Iran‑based hacking group attempted to breach an Israeli water supply system, intending to raise chlorine levels. Israeli water installation plants faced minor disruptions between April 24 and 25, according to Ynet news service.
Why This Matters Beyond Israel
ZionSiphon specifically targets Israeli infrastructure, but the implications are global. The protocols it scans – Modbus, DNP3, and S7comm – are the backbone of industrial control systems worldwide. A tool developed for one region can be easily adapted for another.
As Darktrace's Nathaniel Jones warned: "This shows that OT attack concepts are now within reach of much smaller threat actors and hacktivists. ZionSiphon is an example of how ideologically motivated actors with relatively modest resources are beginning to experiment with direct interaction with industrial systems."
According to a recent Securin Cyber Threat Intelligence Report, the water sector has shifted from a "soft target to an active battlefield." The report identified 1,807 vulnerabilities affecting water and wastewater systems, with a 15% year‑over‑year growth in CVEs – many linked to nation‑state actors and ransomware operations.
And it's not just Israel. In early April 2026, CISA issued an urgent advisory warning that Iranian‑affiliated APT actors are actively exploiting internet‑facing programmable logic controllers (PLCs) across US critical infrastructure sectors, including water, energy, and government services. These actors have caused operational disruptions and financial losses through malicious interactions with PLCs and manipulation of SCADA displays.
If you're responsible for OT security anywhere in the world, ZionSiphon is a wake‑up call. The attackers are experimenting. They're learning. And eventually, they'll get it right.
What You Can Do Right Now
ZionSiphon isn't functional yet, but that's no excuse to wait. Here's what OT security teams and critical infrastructure operators should do immediately.
🔴 Immediate Actions (Today)
- Review USB policies – Restrict or disable autorun for removable media on all OT workstations. Air‑gapped systems are only safe if you control what goes in and out.
- Update antivirus signatures – Ensure your AV/EDR solutions have the latest signatures capable of detecting ZionSiphon indicators.
- Check for suspicious processes – Look for unexpected
svchost.exeprocesses running from non‑standard locations (e.g., USB drives or temporary folders).
🟠 This Week
- Audit OT network traffic – Monitor for unusual Modbus, DNP3, or S7comm traffic on your industrial networks, especially from unexpected sources.
- Review configuration files – Check for unauthorized modifications to water treatment configuration files, particularly those controlling chlorine dosing and pressure settings.
- Segment OT networks – If your IT and OT networks aren't already separated, make this a priority. The CISA guidance on OT security emphasizes that segmenting critical systems reduces the potential impact of cyber threats.
- Remove OT devices from public internet – CISA strongly recommends removing OT connections to the public internet. OT devices lack modern authentication methods and are easily discovered through simple port scanning.
🟢 Long‑Term
- Implement Zero Trust for OT – Assume compromise. Implement continuous verification for all access to industrial control systems.
- Deploy OT‑specific monitoring – Consider solutions that monitor industrial protocols and can detect anomalies in process behavior.
- Practice manual operations – Ensure your team can operate critical systems manually if automated controls are compromised. Test your ability to revert to manual controls regularly.
- Change default passwords – Recent analysis indicates that targeted systems often use default or easily guessable passwords. This is especially critical for internet‑facing OT devices.
External Resources
- Darktrace's full analysis of ZionSiphon
- CISA advisory on Iranian‑affiliated OT exploitation (AA26-097A)
- CISA Primary Mitigations for OT Cyber Threats
- Secure Connectivity Principles for OT (CISA/NCSC/FBI)
Related Reading on ThreatAft
- Ransomware Hits Dutch Hospitals: Healthcare IT Under Siege
- Critical Windows IKE RCE (CVE-2026-33824) – Patch Your VPN Servers Now
The Bottom Line
ZionSiphon is a warning shot. It's not fully functional, but it reveals where attackers are heading. The convergence of IT and OT networks, combined with increasing geopolitical tensions, means that attacks on critical infrastructure are no longer theoretical – they're being actively developed.
Don't wait for the next version that actually works. Review your OT security posture today. Test your offline backups. Segment your networks. And for goodness' sake, change those default passwords.
Stay vigilant. And maybe keep a manual override handy.
Written by: ThreatAft Security Team – Specialising in OT/ICS threat intelligence and critical infrastructure security.
