A newly identified malware, ZionSiphon, has heightened fears regarding the security of Israel’s essential water infrastructure. This malware is engineered specifically to penetrate and potentially disrupt water treatment and desalination facilities, which supply clean water to Israel’s populace.
ZionSiphon is not a random creation; it is embedded with predefined Israeli IP address ranges, ensuring it operates exclusively on systems within the country. Moreover, the malware contains messages with political undertones, reflecting a specific ideological motive.
Targeted Attack on Israeli Systems
The malware’s code includes messages supporting Iran, Palestine, and Yemen, indicating a politically driven attacker. It explicitly threatens to harm the populations of Tel Aviv and Haifa, revealing the attacker’s intent to inflict physical damage.
Security experts at Darktrace have been analyzing this malware, which self-identifies as ZionSiphon. Their findings show that it incorporates various host-based capabilities, such as privilege escalation and persistence, along with scanning for Operational Technology (OT) services.
What distinguishes ZionSiphon from commonplace malware is its Israel-centric targeting and its particular focus on desalination processes, suggesting a deliberate attempt to disrupt Israel’s water supply.
Potential Impact on Critical Facilities
The malware aims at specific Israeli water entities, including Mekorot, the national water company, and major desalination plants like Sorek and Hadera. It also targets the Shafdan wastewater treatment facility, highlighting the attacker’s understanding of Israel’s water sector framework.
Most concerning is the sabotage element within ZionSiphon. Upon confirming its operation in a water treatment setting, it attempts to alter local configuration files, potentially compromising the safety of the water supply by manipulating chlorine levels and pressure.
Infection Mechanism and Mitigation
ZionSiphon establishes itself on a system by copying to a hidden location under the name “svchost.exe” and creating a registry entry for persistence. This allows it to blend into ordinary system operations, evading detection.
Once embedded, the malware scans for OT devices communicating over industrial protocols like Modbus. It attempts to alter control settings, though its DNP3 and S7comm components remain underdeveloped, suggesting it might be a test version.
Additionally, ZionSiphon propagates via USB drives, copying itself under a disguised filename to spread further if users inadvertently execute it.
For organizations managing critical infrastructure, especially in the water sector, it is vital to monitor both IT and OT environments for anomalies. Enhanced visibility can help detect early threats like ZionSiphon, preventing potential real-world damage.
