ForumsHelpZionSiphon: Dissecting the OT Threat to Water Infrastructure

ZionSiphon: Dissecting the OT Threat to Water Infrastructure

MasterSlacker 4/20/2026 USER

Hey everyone,

Just caught the Darktrace report on "ZionSiphon," a new strain specifically targeting Israeli water treatment and desalination OT systems. Given the critical nature of these targets, this feels like a significant escalation in ICS-targeted malware.

From the initial analysis, the malware is concerning because it focuses on establishing a foothold and mapping the environment rather than immediate destruction. It appears to leverage standard protocols to blend in.

Key technical observations:

  • Persistence: Uses modified WMI event subscriptions to survive reboots (a classic LoLBins technique).
  • Config Tampering: Targets local ICS configuration files to disrupt operations or hide tracks.
  • Reconnaissance: Actively scans the local subnet for OT-relevant services (likely looking for Modbus or S7Comms).

I've put together a quick Sigma rule to catch the persistence mechanism based on the IOCs floating around:

title: Potential ZionSiphon WMI Persistence
status: experimental
description: Detects WMI Event Filter creation often used by ZionSiphon for persistence
logsource:
    product: windows
    service: security
detection:
    selection:
        EventID: 4688
        NewProcessName|endswith: '\wmiprvse.exe'
        CommandLine|contains: 'ActiveScriptEventConsumer'
    condition: selection
falsepositives:
    - Legitimate administrative scripts
level: high

For those managing OT networks, are you seeing anomaly-based detection (like Darktrace's) as the primary defense here, or are you enforcing strict allow-listing on firewalls to stop this scanning phase entirely?

DN
DNS_Security_Rita4/20/2026

Allow-listing is the only real defense in OT. If you're allowing outbound scanning from your HMI to the local subnet without validation, you're asking for trouble. We rely strictly on the Purdue model. If the HMI doesn't need to talk to the PLC, that port is shut down at the firewall. Stop it at Layer 3/4 before it hits the controller.

DA
DarkWeb_Monitor_Eve4/20/2026

Solid rule. We saw similar behavior in a honeypot last week. You can also detect the network scanning phase using Zeek. Look for non-standard IPs initiating connections to port 102 (S7Comm) or 502 (Modbus). Run this against your conn.logs:

zcat conn.log.gz | zeek-cut id.orig_h id.resp_p service | grep -E '(102|502)'


If you see an Engineering Workstation connecting to multiple IPs on those ports sequentially, investigate immediately.
TA
TabletopEx_Quinn4/20/2026

The config tampering aspect is the most worrying part. If they mess with the set-points silently, that causes physical damage long before the malware is detected. We've started hashing critical config files (like .scf or .db files in the SCADA folder) and monitoring for changes using PowerShell:

Get-ChildItem "C:\SCADA\Config" -Recurse | Get-FileHash | Export-Csv -Path "C:\Logs\baseline.csv"

Run this daily and diff the output to catch tampering early.

SY
SysAdmin_Dave4/21/2026

Solid points on allow-listing. To add to the detection of the mapping phase, specifically watch for rare Modbus function codes. During reconnaissance, malware often queries metadata using Report Slave ID (17) or Diagnostic (8). These are rarely touched by standard HMIs. You can spot this easily with a filter like this:

tshark -Y "mbtcp.func == 8 or mbtcp.func == 17"

Catching that initial handshake is often easier than spotting the payload later on.

MF
MFA_Champion_Sasha4/21/2026

Excellent points on protocol anomalies. Don't forget that the initial foothold often involves local enumeration on the Engineering Workstations. Before hitting the PLCs, malware queries the Windows registry to identify installed SCADA software. You can audit your HMIs for this discovery phase with a quick PowerShell check:

Get-ChildItem 'HKLM:\Software' -Include '*Siemens*','*Schneider*' -Recurse -ErrorAction SilentlyContinue


If you see a service account suddenly accessing these keys without a corresponding update, it’s a red flag.
OS
OSINT_Detective_Liz4/23/2026

Solid thread, everyone. Adding to Sasha's point about Engineering Workstations, don't overlook file system monitoring during the mapping phase. Attackers often export PLC logic to analyze vulnerabilities offline before launching an attack.

If you're running Siemens environments, watch for unexpected creation of project files (like .ap15) in temp directories. Here’s a quick PowerShell snippet to hunt for recent project file exports:

Get-ChildItem -Path C:\ -Filter *.ap15 -Recurse -ErrorAction SilentlyContinue | Where-Object {$_.LastWriteTime -gt (Get-Date).AddHours(-12)}

Catching them at the export stage prevents them from reverse-engineering your logic offline.

SO
SOC_Analyst_Jay4/24/2026

Building on the mapping discussion, don't overlook the use of WMI for persistence on the Historian servers. We've seen OT malware leverage WMI event consumers to maintain access even after initial cleanup. You can hunt for suspicious event consumers with this PowerShell snippet:

Get-WmiObject -Namespace root\subscription -Class __EventFilter


If you see filters pointing to non-standard executables or scripts in temp folders, investigate immediately.
DA
DarkWeb_Monitor_Eve4/25/2026

Building on Sasha's point, the malware often moves to pulling PLC logic for offline analysis immediately after enumeration. Watch for S7Comm "Upload" requests, which are rare in normal ops. You can detect this in Zeek by filtering for the upload function code:

zeek s7comm.rosctr == 1 && s7comm.function == 0x11

This identifies the export phase well before they attempt set-point tampering.

Verified Access Required

To maintain the integrity of our intelligence feeds, only verified partners and security professionals can post replies.

Request Access

Thread Stats

Created4/20/2026
Last Active4/25/2026
Replies8
Views158