ZionSiphon Malware Targets Israeli Water Treatment Systems
Darktrace researchers expose ZionSiphon, OT malware designed to sabotage chlorine levels and pressure controls at Israeli desalination plants. A coding error currently prevents activation.
Security researchers at Darktrace have identified malware specifically engineered to sabotage water treatment and desalination facilities. ZionSiphon combines USB propagation, ICS protocol scanning, and sabotage capabilities targeting chlorine dosing and pressure controls—though a critical coding error currently prevents the weapon from activating.
The malware's target list includes Mekorot (Israel's national water company) and four major desalination plants: Sorek, Hadera, Ashdod, and Palmachim. Together, these facilities provide a significant portion of Israel's freshwater supply.
How ZionSiphon Works
ZionSiphon employs a multi-stage approach designed for air-gapped industrial environments:
USB Propagation — The malware copies itself to removable drives as a hidden svchost.exe process and creates malicious shortcut files that execute the payload when clicked. This propagation mechanism targets the USB drives commonly used to transfer data between corporate networks and isolated OT systems.
Geofencing — Before executing its payload, ZionSiphon checks whether the host IP address falls within Israeli network ranges and scans for configuration files associated with water treatment software, reverse osmosis systems, and chlorine control equipment.
ICS Protocol Scanning — The malware searches for Modbus, DNP3, and S7comm protocols—the communication standards used by industrial control systems. Finding these protocols indicates proximity to operational technology worth targeting.
Sabotage Functions — ZionSiphon includes functions named IncreaseChlorineLevel() and pressure manipulation routines. The chlorine function appends configuration blocks setting dose to maximum, pumps to on, flow to max, and valves to open. Pressure manipulation targets reverse osmosis systems with dangerous settings.
The Critical Flaw
Analysis revealed an XOR mismatch in ZionSiphon's country verification logic—a coding error that breaks the targeting mechanism and causes the malware to self-destruct rather than execute. The mistake appears to be a simple implementation error, not an intentional kill switch.
"While ZionSiphon isn't operational in its current version, its intent and potential for damage are concerning," Darktrace researchers noted. "All that's needed to unlock both is to fix a minor verification error."
The malware's Modbus implementation also shows incomplete code, with placeholder functions for other protocols. This suggests ZionSiphon remains under active development, with the current version representing an early capability rather than a finished weapon.
Water Sector Targeting
Attacks against water infrastructure have intensified globally. CISA has repeatedly warned about nation-state actors targeting water and wastewater facilities, with Iranian groups specifically called out for attacks on programmable logic controllers.
Water treatment facilities present attractive targets: they serve large populations, often run legacy equipment, and face resource constraints that limit security investments. The consequences of successful attacks range from service disruption to public health emergencies.
Israel's water infrastructure has faced previous cyber incidents. The country's reliance on desalination—providing roughly 80% of domestic water supply—makes these facilities strategically significant targets.
Attribution Uncertainty
Darktrace has not attributed ZionSiphon to a specific threat actor. The malware's focus on Israeli infrastructure and ICS sabotage capabilities align with threat actors previously linked to Iran, though the incomplete development state complicates attribution.
The ongoing pattern of Iran-linked attacks against Israeli targets provides context, but the coding errors suggest this may be a less sophisticated actor or an early-stage capability from an established group.
Why This Matters
ZionSiphon represents a concerning evolution in OT-targeted malware. Its design specifically accounts for air-gapped environments through USB propagation, includes geofencing to limit collateral damage, and targets physical processes rather than just IT systems.
The coding error that currently disables the weapon offers a temporary reprieve, not a permanent defense. Operators can fix the XOR mismatch in minutes. The existence of ZionSiphon signals ongoing investment in water sector attack capabilities.
For water utilities globally, this serves as a reminder that OT security guidance must address removable media risks. USB drives remain a primary vector for reaching isolated systems.
Recommendations
Water treatment and desalination facilities should:
- Restrict USB usage - Implement strict policies on removable media in OT environments with dedicated scanning stations
- Monitor for .LNK files - Watch for shortcut file creation on removable drives
- Segment ICS networks - Ensure Modbus, DNP3, and S7comm traffic cannot reach internet-connected systems
- Audit chlorine and pressure controls - Review configuration files for unexpected modifications
Organizations running similar infrastructure should assume threat actors are developing analogous capabilities for their regions. The techniques demonstrated in ZionSiphon are reusable across water facilities worldwide.
Related Articles
Inside DynoWiper: Mersenne Twister PRNG and File Destruction
SANS ISC analyzes DynoWiper's internals revealing Mersenne Twister seeding, 16-byte overwrite buffers, and directory exclusions. Technical breakdown of Sandworm's latest wiper.
Feb 19, 2026Qilin Ransomware Hits Romania's Oil Pipeline Operator
Conpet, operator of 3,800km of Romanian oil pipelines, confirms cyberattack. Qilin claims 1TB of stolen data including financial records and passports.
Feb 7, 2026Qilin Ransomware Breaches Tulsa International Airport
Russian-linked gang dumps executive emails, employee IDs, and banking communications in first airline sector attack of 2026.
Feb 3, 2026NWHStealer Spreads via Fake Proton VPN Sites and Gaming Mods
Multiple campaigns distribute NWHStealer infostealer through counterfeit Proton VPN installers, gaming modifications, and YouTube-promoted downloads. Targets browser data and 25+ crypto wallets.
Apr 16, 2026