Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
OpenClaw Chain Flaws Expose 245 Vulnerabilities Public
May 15, 2026
Gunra Ransomware RaaS Expands After Conti Locker Operations Shifting
May 15, 2026
Shai-Hulud Worm Steals Developer Secrets from GitHub Kubernetes
May 15, 2026
Home/Threats/ZionSiphon Malware Targets Israeli Desal Hackers Desalination
Threats

ZionSiphon Malware Targets Israeli Desal Hackers Desalination

A newly identified piece of malware, dubbed ZionSiphon, has sparked considerable concern over the security of Israel’s critical water infrastructure, particularly its vital desalination plants....

Emy Elsamnoudy
Emy Elsamnoudy
April 17, 2026 4 Min Read
9 0

A newly identified piece of malware, dubbed ZionSiphon, has sparked considerable concern over the security of Israel’s critical water infrastructure, particularly its vital desalination plants. A

ZionSiphon is not a random piece of software. It carries hardcoded Israeli IP address ranges, meaning it is designed to run only on systems located within Israel.

The malware includes geographically restricted execution logic targeting IP blocks tied to Israeli networks, along with politically motivated messages embedded in its code.

One decoded string reads, “In support of our brothers in Iran, Palestine, and Yemen against Zionist aggression. I am 0xICS.”

Another decoded message references “Poisoning the population of Tel Aviv and Haifa,” pointing to a threat actor with clear ideological intent and a desire to cause real physical harm.

Darktrace analysts recently identified and examined the malware sample, which self-identifies as ZionSiphon.

Their investigation revealed that this tool combines several host-based capabilities, including privilege escalation, persistence mechanisms, USB-based propagation, and scanning for Operational Technology (OT)-relevant services on local networks.

The Darktrace team noted that while many of these individual features are found in everyday commodity malware, the combination of politically charged messaging, Israel-specific targeting, and an explicit focus on desalination processes makes ZionSiphon stand out from generic opportunistic attacks.

The malware’s target list includes the names of real Israeli water infrastructure entities.

These include Mekorot, which is Israel’s national water company, along with Sorek, Hadera, Ashdod, and Palmachim, which are four of the country’s major seawater desalination plants.

The Shafdan wastewater treatment facility is also listed. Each of these sites plays a critical role in Israel’s national water supply, and their presence in the malware’s targeting list confirms that the attacker understands the structure of the country’s water sector.

The most alarming part of ZionSiphon is its sabotage logic. When the malware confirms it is running in a valid water treatment environment, it attempts to tamper with local configuration files by injecting values such as “Chlorine_Dose=10,” “Chlorine_Pump=ON,” “Chlorine_Flow=MAX,” “Chlorine_Valve=OPEN,” and “RO_Pressure=80.”

These entries, if successfully written to active system configuration files, could manipulate chlorine dosing and pressure levels in ways that could make water unsafe for human consumption.

Infection Mechanism and OT Protocol Targeting

Once ZionSiphon gains a foothold on a system, it begins a structured process of establishing itself quietly and scanning for industrial control devices.

Its persistence routine copies the malware to a hidden location under the name “svchost.exe,” a legitimate Windows process name, and creates a registry entry called “SystemHealthCheck” pointing to that hidden copy.

This technique helps the malware blend into ordinary Windows system activity and avoid drawing attention from users or basic monitoring tools.

Registry key creation routine (Source - Darktrace)
Registry key creation routine (Source – Darktrace)

After persistence is set, ZionSiphon performs subnet-wide OT scanning, probing for devices listening on port 502 for Modbus, port 20000 for DNP3, and port 102 for S7comm.

These are industrial communication protocols commonly used in water plants and other critical infrastructure environments. For each device that responds, the malware performs a second-stage validation step to confirm the protocol type before attempting to send commands.

The ICS scanning function (Source - Darktrace)
The ICS scanning function (Source – Darktrace)

The most fully developed part of this scanning logic targets Modbus. The malware sends a “Read Holding Registers” request to connected devices and reads back register values.

It then identifies a relevant register, such as one controlling chlorine dose, and issues a write command to change that value.

If it cannot identify a suitable register through dynamic scanning, it falls back to hardcoded Modbus write frames to ensure that a write attempt is made regardless.

This fallback behavior suggests the attacker had only partial knowledge of the target systems but still wanted to guarantee that some form of interference would take place.

The DNP3 and S7comm branches of the malware appear unfinished. Both contain protocol-accurate prefix sequences, indicating the attacker intended to build multi-protocol OT attack capabilities, but the code fragments are too short and incomplete to form valid commands for those protocols.

Darktrace’s analysis suggests the analyzed version is either a development build, a prematurely deployed sample, or one that was intentionally kept limited for testing.

ZionSiphon also includes a USB propagation feature. The malware scans for removable drives, copies itself to each one using the svchost.exe filename with hidden and system file attributes, and creates shortcut files that appear as regular documents. If a user clicks one of these shortcuts, they unknowingly execute the malware.

USB shortcut creation on the removable drive (Source - Darktrace)
USB shortcut creation on the removable drive (Source – Darktrace)

For organizations operating critical infrastructure, especially in the water and utilities sectors, Darktrace’s research underscores the importance of continuous monitoring for anomalous behavior across both IT and OT environments.

Security teams should keep close visibility on industrial control system networks, monitor for unexpected configuration file changes in ICS directories, watch for USB-based propagation attempts, and ensure that Modbus, DNP3, and S7comm traffic is logged and analyzed.

Cross-visibility between IT and OT environments remains essential for catching early-stage threats like ZionSiphon before they can cause real-world harm.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackHackerMalwareSecurityThreat

Share Article

Emy Elsamnoudy

Emy Elsamnoudy

Emy is a cybersecurity analyst and reporter specializing in threat hunting, defense strategies, and industry trends. With expertise in proactive security measures, Emily covers the tools and techniques organizations use to detect and prevent cyber attacks. She is a regular speaker at security conferences and has contributed to industry reports on threat intelligence and security operations. Emily's reporting focuses on helping organizations improve their security posture through practical, actionable insights.

Previous Post

Microsoft Confirms Windows 11 BitLocker Recovery Key

Next Post

Critical One-Click RCE in Azure Windows Admin Center Explo

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
OrBit Rootkit Steals SSH & Sudo Credentials from Hackers Harvest
May 15, 2026
Microsoft Warns: Attackers Use HPE Agent for Malware-
May 15, 2026
Tycoon 2FA Operators Use OAuth Phishing to Bypass Adopt Device
May 15, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us