AUTO-UPDATED

Inside ZionSiphon: politically driven malware aims at Israeli water systems

Cybersecurity firm Darktrace has identified ZionSiphon, a new, politically motivated malware strain designed to sabotage Israeli water treatment and desalination infrastructure by manipulating critical operational technology systems.

Key Points

  • ZionSiphon targets Israeli water facilities by scanning for specific IP ranges and operational technology protocols like Modbus, DNP3, and S7.
  • The malware aims to disrupt operations by altering hydraulic pressure and increasing chlorine levels to unsafe thresholds.
  • It employs stealth techniques, including privilege escalation via PowerShell, registry persistence, and propagation through removable USB drives.
  • The code contains explicit political messaging targeting cities such as Tel Aviv and Haifa, indicating ideological motives behind the development.
  • Current samples are functionally incomplete, as a flawed targeting check causes the malware to self-destruct before executing its primary sabotage payload.

Why it Matters

This discovery highlights a concerning trend of threat actors actively developing specialized malware to target critical infrastructure and industrial control systems. While the current version is non-functional, it serves as a warning that early-stage cyber threats require proactive monitoring and robust security integration between IT and operational environments.
Securityaffairs.com Published by Pierluigi Paganini
Read original