Key Takeaways
- ZionSiphon is a newly identified malware specifically engineered to infiltrate Israeli water‑treatment and desalination facilities.
- It combines privilege escalation, persistence, USB‑based propagation, and multi‑protocol OT scanning (Modbus, DNP3, S7comm) with sabotage functions aimed at chlorine dosing and pressure controls.
- The sample, first seen on 29 June 2025, remains unfinished; its geographic and environment‑specific trigger logic is either disabled or mis‑configured, preventing full activation even when IP conditions are met.
- Alongside ZionSiphon, researchers disclosed two other stealthy threats: RoadK1ll, a lightweight Node.js reverse‑tunneling implant, and AngrySpark, a VM‑obfuscated backdoor that uses a three‑stage infection chain to evade detection.
- All three examples illustrate a growing trend of politically motivated, experimentally‑driven attacks targeting critical infrastructure and employing novel persistence, propagation, and concealment techniques.
Overview of ZionSiphon Discovery
Cybersecurity researchers at Darktrace have flagged a new malware strain dubbed ZionSiphon, which appears purpose‑built to target Israeli water treatment and desalination systems. The malware was first observed in the wild on 29 June 2025, shortly after the Twelve‑Day War between Iran and Israel (13‑24 June 2025). Darktrace’s analysis highlights that ZionSiphon integrates privilege escalation, persistence mechanisms, USB‑based propagation, and operational‑technology (OT) scanning capabilities, with a clear intent to sabotage chlorine dosing and pressure controls within critical water infrastructure.
Targeting and IP Ranges
ZionSiphon’s code contains hard‑coded IPv4 address ranges that correspond to Israeli networks, specifically: 2.52.0.0‑2.55.255.255, 79.176.0.0‑79.191.255.255, and 212.150.0.0‑212.150.255.255. The malware checks the victim’s IP against these ranges before proceeding with its payload. This geographic filter suggests a deliberate focus on Israeli facilities, aligning the threat with the recent geopolitical conflict between Iran and Israel.
Political Messaging and Activation Logic
Beyond its technical functions, ZionSiphon embeds political strings that proclaim support for Iran, Palestine, and Yemen. The malware also includes environment‑specific checks that verify the presence of water‑treatment or desalination‑related services on the local subnet. According to Darktrace, the intended logic is that the payload activates only when both a geographic condition (IP within the Israeli ranges) and an environment‑specific condition (desalination/water‑treatment indicators) are satisfied. This dual‑condition design aims to limit collateral damage while maximizing impact on the intended sector.
Technical Capabilities and OT Protocol Probing
Once executed, ZionSiphon scans the local subnet for devices and attempts protocol‑specific communication using Modbus, DNP3, and S7comm—commonly used in industrial control systems. Analysis shows the Modbus‑oriented attack path is the most developed, with the DNP3 and S7comm components containing only partially functional code, indicating the malware is still under development. The malware modifies local configuration files, tampering with parameters that control chlorine dosage and water pressure, thereby creating the potential for process sabotage or public‑health risks.
USB Propagation and Self‑Destruct Mechanism
A notable feature of ZionSiphon is its ability to spread via removable media. When the malware infects a host that does not meet its geographic or environmental criteria, it triggers a self‑destruct routine that deletes itself from the system. This behavior helps the threat avoid detection in non‑target environments while preserving its ability to propagate to potential targets through USB drives, a tactic reminiscent of earlier ICS‑focused campaigns like Stuxnet.
Current Unfinished State and Implications
Despite possessing sabotage, scanning, and propagation functions, the current ZionSiphon sample appears unable to satisfy its own target‑country checking function even when the reported IP falls within the specified ranges. Darktrace suggests this may be due to an intentional disablement, misconfiguration, or simply because the malware is left in an unfinished state. Nevertheless, the overall code structure reveals that the threat actor is experimenting with multi‑protocol OT manipulation, persistence within operational networks, and removable‑media propagation—techniques that could be refined in future iterations.
Introduction of the RoadK1ll Implant
In the same disclosure window, researchers identified a separate threat: RoadK1ll, a Node.js‑based reverse tunneling implant. Unlike traditional remote access trojans, RoadK1ll establishes an outbound WebSocket connection to attacker‑controlled infrastructure and uses that channel to broker TCP traffic on demand. Its minimal command set and lack of an inbound listener on the victim host make it difficult to detect, converting a single compromised machine into a controllable relay point that enables lateral movement to otherwise unreachable internal systems.
Technical Details of RoadK1ll
RoadK1ll operates by initiating an outbound WebSocket connection from the infected host to a server controlled by the attacker. Through this persistent channel, the implant can forward arbitrary TCP traffic, effectively turning the compromised host into a proxy or “access amplifier.” Because it relies solely on outbound connections—which are often permitted by firewalls—and does not open listening ports, RoadK1ll blends with normal web traffic, reducing the likelihood of triggering network‑based alerts. Its lightweight Node.js foundation also facilitates rapid deployment and easy modification by the threat actor.
AngrySpark VM‑Obfuscated Backdoor
Another recently uncovered threat is AngrySpark, a virtual machine (VM)‑obfuscated backdoor observed on a single machine in the United Kingdom between May 2022 and June 2023 before vanishing when its attacker‑controlled infrastructure expired. AngrySpark employs a three‑stage infection chain: a DLL masquerading as a legitimate Windows component is launched via the Task Scheduler, which then decrypts its configuration from the registry and injects position‑independent shellcode into svchost.exe. That shellcode implements a lightweight VM that processes a 25 KB bytecode blob, decoding and assembling the real payload—a beacon that profiles the host, communicates with command‑and‑control (C2) over HTTPS while disguising traffic as PNG image requests, and can receive encrypted shellcode for additional execution.
Persistence and Evasion Techniques of AngrySpark
AngrySpark’s design emphasizes stealth and resistance to analysis. The malware’s portable executable (PE) metadata has been deliberately altered to confuse toolchain fingerprinting, and multiple design choices aim to frustrate clustering, bypass instrumentation, and limit forensic artifacts. By periodically swapping the bytecode blob, the implant can change its behavior without altering the on‑disk binary, thereby evading signature‑based detection. The use of seemingly innocuous HTTPS requests mimicking image traffic further helps the backdoor blend with legitimate web traffic, allowing it to maintain a covert C2 channel for extended periods.
Broader Context and Significance
The emergence of ZionSiphon, RoadK1ll, and AngrySpark underscores a shift toward more sophisticated, politically motivated attacks targeting critical infrastructure and employing novel evasion tactics. ZionSiphon’s focus on water‑treatment OT systems highlights the increasing interest of threat actors in disrupting essential public services, while its unfinished state suggests that we may be witnessing an early prototype of a future, more capable weapon. RoadK1ll demonstrates how lightweight, language‑agnostic implants can achieve reliable persistence and lateral movement with minimal footprint, and AngrySpark shows how virtual‑machine obfuscation can be used to create highly stealthy, long‑lived backdoors. Together, these examples signal that defenders must expand their monitoring to include unusual OT protocol traffic, scrutinize outbound WebSocket and HTTPS connections for abnormal patterns, and invest in behavior‑based detection capable of catching multi‑stage, file‑less, and VM‑based threats. Continued information sharing and rapid analysis of such prototypes will be essential to mitigate the risk of these experimentally driven attacks maturing into fully operational weapons against national critical infrastructure.

