ZionSiphon Malware Threatens Israeli Water Systems, Attempting to Sabotage Chlorine Levels and Pressure

Published
Written by:
Lore Apostol
Lore Apostol
Cybersecurity Writer
Key Takeaways
  • Targeted infrastructure: ZionSiphon malware specifically seeks out Israeli water systems, focusing on desalination plants and wastewater treatment facilities.
  • Sabotage capabilities: The OT malware attempts to manipulate critical programmable logic controllers, explicitly targeting chlorine levels and pressure controls.
  • Incomplete execution: Despite including USB propagation and ICS scanning tools, the analysis reveals flawed deployment logic and incomplete protocol implementations.

ZionSiphon, a threat engineered to compromise infrastructure networks, was identified in a recent operational technology (OT) malware analysis by Darktrace and is actively targeting national utility grids, specifically Israeli water systems. 

The geographical and operational targeting of this malware is highly specific. The binary code actively searches for directories and processes related to national desalination plants and wastewater facilities. 

Analyzing ZionSiphon's OT Capabilities

ZionSiphon integrates multiple host-based techniques, including privilege escalation, system persistence, and removable-media propagation (via USB). However, its primary danger lies in its specialized OT focus. 

Strings in the target list, all related to Israel and water treatment | Source: Darktrace
Strings in the target list, all related to Israel and water treatment | Source: Darktrace

Darktrace researchers uncovered hardcoded commands designed to alter critical mechanical parameters for Israeli facilities, such as maximizing chlorine dosages, opening containment valves, and manipulating reverse osmosis pressure levels.

Main target validation function | Source: Darktrace
Main target validation function | Source: Darktrace

Once executed, the ZionSiphon malware initiates ICS scanning across local subnets, probing for Modbus, DNP3, and S7comm protocols. However, the Modbus-oriented path is the most developed OT-specific logic, while the DNP3 and S7comm branches appear much less complete.

The creation of the shortcut on the USB device | Source: Darktrace
The creation of the shortcut on the USB device | Source: Darktrace

If the malicious code successfully identifies a valid industrial control system, it attempts to modify configuration files to sabotage physical operations. 

Critical Infrastructure Cybersecurity Risks

Despite these aggressive sabotage capabilities, the OT malware analysis indicates that ZionSiphon contains several developmental flaws. Malfunctioning IP validation logic and incomplete protocol scripts suggest the malware might be a premature deployment or an experimental testing build. 

ZionSiphon represents a notable, though incomplete, attempt to build malware capable of malicious interaction with OT systems targeting water treatment and desalination environments,” the report concluded.

This month, a suspected Iran-nexus password spray attack targeted Microsoft 365 users in the UAE and Israel, and Iranian threat actor MuddyWater targeted networks and critical infrastructure in Israel, the U.S., and Canada.

In March, a RedAlert Trojan campaign disseminated a fake emergency app targeting Israel via SMS spoofing, stealing contacts and GPS data.


For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: