Back to Feed
MalwareApr 17, 2026

ZionSiphon Malware Targets ICS in Water Facilities

Darktrace discovers ZionSiphon malware targeting Israeli water treatment and desalination plant ICS systems.

Summary

Researchers at Darktrace have identified a new malware strain called ZionSiphon designed to target water treatment and desalination facilities in Israel. The malware contains OT-specific capabilities targeting industrial control systems, including functionality to tamper with chlorine doses and pressure via Modbus, DNP3, and S7comm protocols. While the malware shows intent to cause disruption, it exhibits incomplete logic and development issues, though it underscores a growing trend of threat actors developing OT-oriented malware for critical infrastructure attacks.

Full text

Researchers at Darktrace have discovered a new malware strain named ZionSiphon, which appears to target water treatment and desalination plants in Israel. ZionSiphon has many capabilities typically seen in commodity malware, but it caught analysts’ attention due to functionality aimed at operational technology (OT), specifically industrial control systems (ICS). Strings in the analyzed malware sample indicate that ZionSiphon has been developed by anti-Israel hackers, and one encoded string decodes to “Poisoning the population of Tel Aviv and Haifa”. There are several other indicators that Israel is the malware’s main target, including strings naming water facilities in the country. In addition, once it verifies that it’s running with admin privileges and establishes persistence, the malware executes a function to fetch the local IP address and determine whether the compromised host is located in Israel. If the IP is associated with Israel, ZionSiphon checks the system for processes and folders typically found in water treatment plants. Specifically, the malware looks for processes linked to reverse osmosis, desalination, chlorine handling, and plant control.Advertisement. Scroll to continue reading. If these conditions are met, the malware looks for local configuration files associated with the aforementioned water treatment processes and attempts to alter them to increase chlorine doses and pressure. It then scans the network for ICS devices that use the Modbus, DNP3, and S7comm protocols. The code indicates that if Modbus devices are found, the malware would attempt to tamper with parameters associated with chlorine doses and pressure. The payload only activates if the country is Israel and the system is associated with a water treatment plant. If these conditions are not met, the malware deletes itself from the device. Researchers also found a mechanism that enables the malware to spread via USB drives. While ZionSiphon seems to have extended capabilities, Darktrace researchers have identified issues in the country validation functionality and incomplete logic for the targeting of DNP3 and S7comm protocols, indicating that the malware is under development. Moreover, the local configuration file tampering and Modbus parameter modifications are unlikely to have an impact in a real-world environment. The code points to the intent to cause disruption, but lacks the sophistication needed to actually change chlorine levels in practice. “Even in its unfinished state, ZionSiphon underscores a growing trend in which threat actors are increasingly experimenting with OT‑oriented malware and applying it to the targeting of critical infrastructure,” Darktrace said. The water sector has been a prime target for hackers. Industrial control systems and other OT systems in this sector are often exposed to the internet and left unprotected, and the potential impact of such attacks can be significant. This makes them an attractive target for many hacktivist groups and state-sponsored threat actors posing as hacktivists. Israel’s water sector in particular is regularly targeted by Iranian hackers. Pro-Israel hackers have also been known to target water facilities in other countries. The emergence of ZionSiphon is not surprising in light of the US-Israel-Iran conflict, which has led to an increase in cyberattacks. Related: Iran-Linked Hackers Disrupt US Critical Infrastructure via PLC Attacks Related: Rockwell Vulnerability Allowing Remote ICS Hacking Exploited in Attacks Related: Ramnit Malware Infections Spike in OT as Evidence Suggests ICS Shift Related: Default ICS Credentials Exploited in Destructive Attack on Polish Energy Facilities Written By Eduard Kovacs Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering. More from Eduard Kovacs Microsoft Paid Out $2.3 Million at Zero Day Quest 2026 Hacking ContestClaude Code, Gemini CLI, GitHub Copilot Agents Vulnerable to Prompt Injection via CommentsExploited Vulnerability Exposes Nginx Servers to Hacking$10 Domain Could Have Handed Hackers 25k Endpoints, Including in OT and Gov NetworksICS Patch Tuesday: 8 Industrial Giants Publish New Security AdvisoriesMicrosoft Patches Exploited SharePoint Zero-Day and 160 Other VulnerabilitiesAdobe Patches 55 Vulnerabilities Across 11 ProductsEurope’s Largest Gym Chain Says Data Breach Impacts 1 Million Members Latest News Recent Apache ActiveMQ Vulnerability Exploited in the WildTwo North Korean IT Worker Scheme Facilitators Jailed in the USCursor AI Vulnerability Exposed Developer Devices53 DDoS Domains Taken Down by Law EnforcementGovernment Can’t Win the Cyber War Without the Private SectorOpenAI Widens Access to Cybersecurity Model After Anthropic’s Mythos RevealData Breach at Tennessee Hospital Affects 337,000Artemis Emerges From Stealth With $70 Million in Funding Trending Daily Briefing Newsletter Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts. Webinar: A Step-by-Step Approach to AI Governance April 28, 2026 With "Shadow AI" usage becoming prevalent in organizations, learn how to balance the need for rapid experimentation with the rigorous controls required for enterprise-grade deployment. Register Virtual Event: Threat Detection and Incident Response Summit May 20, 2026 Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. Register People on the MoveThreatModeler has appointed Kevin Gallagher as Chief Executive Officer.Thomas Bain has been appointed Chief Marketing Officer at Silent Push.The United States Department of War appointed David Vaughn as Technical Advisor for Data Infrastructure.More People On The MoveExpert Insights Government Can’t Win the Cyber War Without the Private Sector Securing national resilience now depends on faster, deeper partnerships with the private sector. (Steve Durbin) The Hidden ROI of Visibility: Better Decisions, Better Behavior, Better Security Beyond monitoring and compliance, visibility acts as a powerful deterrent, shaping user behavior, improving collaboration, and enabling more accurate, data-driven security decisions. (Joshua Goldfarb) The New Rules of Engagement: Matching Agentic Attack Speed The cybersecurity response to AI-enabled nation-state threats cannot be incremental. It must be architectural. (Nadir Izrael) The Next Cybersecurity Crisis Isn’t Breaches—It’s Data You Can’t Trust Data integrity shouldn’t be seen only through the prism of a technical concern but also as a leadership issue. (Steve Durbin) Why Agentic AI Systems Need Better Governance – Lessons from OpenClaw Agentic AI platforms are shifting from passive recommendation tools to autonomous action-takers with real system access, (Etay Maor) Flipboard Reddit Whatsapp Whatsapp Email

Indicators of Compromise

  • malware — ZionSiphon

Entities

Darktrace (vendor)Modbus (technology)DNP3 (technology)S7comm (technology)