2301 stories
·
0 followers

Cyberattack Targets Israeli Desalination Plants With Sabotage Malware

1 Share

A newly discovered malware strain is raising concerns in the cybersecurity community after researchers identified its potential to target critical water infrastructure.

The malware, named ZionSiphon, appears designed to infiltrate systems linked to desalination plants and water treatment facilities, particularly those associated with Israel’s national infrastructure.

Security analysts found that the malware combines traditional cyberattack techniques with specialized targeting logic aimed at industrial environments.

Its design suggests an attempt to move beyond data theft or disruption, focusing instead on manipulating real-world processes.

Targeted Infrastructure and Political Signals

One of the most notable aspects of ZionSiphon is its clear geographic and sector-specific targeting.

The malware includes hardcoded IP address ranges associated with Israeli networks, ensuring it activates only within a defined region.

This level of targeting indicates a deliberate and focused campaign rather than a widespread opportunistic attack.

Function “ZionSiphon()” used by the malware author (Source: darktrace)
Function “ZionSiphon()” used by the malware author (Source: darktrace)

Further analysis reveals embedded references to key components of Israel’s water system, including major desalination plants and water management organizations.

These elements suggest the attackers aimed to disrupt essential services tied to drinking water production and wastewater treatment.

In addition to technical indicators, the malware also contains politically charged messages hidden within its code.

These messages point toward ideological motivations behind the campaign, highlighting how cyberattacks are increasingly being used as tools for geopolitical signaling.

The malware obfuscates the IP ranges by encoding them in Base64 (Source: darktrace)
The malware obfuscates the IP ranges by encoding them in Base64 (Source: darktrace)

Sabotage Capabilities and Technical Limitations

ZionSiphon is built with multiple capabilities commonly seen in advanced malware. It can escalate privileges, establish persistence on infected systems, and spread through removable media such as USB drives.

Once active, it checks whether the infected system matches both geographic and environmental conditions before executing its payload.

Strings in the target list, all related to Israel and water treatment (Source: darktrace)
Strings in the target list, all related to Israel and water treatment (Source: darktrace)

If these conditions are met, the malware attempts to tamper with configuration files used in desalination and water treatment systems.

For example, it modifies settings for chlorine levels and pressure controls, actions that could disrupt water safety and operational stability.

The malware also includes functions to scan local networks for industrial control systems using protocols such as Modbus.

This indicates an intent to interact directly with operational technology, which manages physical processes in industrial environments.

However darktrace, despite its concerning design, the current version of ZionSiphon appears incomplete. Researchers observed flaws in its targeting logic that prevent it from properly identifying intended systems.

Some communication modules for industrial protocols are also only partially developed, limiting their effectiveness.

Even so, experts warn that the malware represents an important evolution in cyber threats. It highlights a growing trend of attackers experimenting with tools that can impact critical infrastructure, particularly in sectors such as water and energy.

Follow us on Google News , LinkedIn and X to Get More Instant UpdatesSet Cyberpress as a Preferred Source in Google.

The post Cyberattack Targets Israeli Desalination Plants With Sabotage Malware appeared first on Cyber Security News.



Read the whole story
NerdsToGo
7 minutes ago
reply
Share this story
Delete

Locked-out iPhone user tells The Reg that Apple is scrambling to fix character flaw passcode bug

1 Share

University student says he plans to move to Android, but concedes iOS engineers acting fast

Apple is finally working on a fix for a bug that has locked some users out of their iPhones for months, The Register understands.…

Read the whole story
NerdsToGo
8 minutes ago
reply
Share this story
Delete

Researcher drops two more Microsoft Defender zero-days, all three now exploited in the wild

1 Share

The security researcher who earlier this month published a proof-of-concept (PoC) exploit for a zero-day privilege escalation vulnerability in Microsoft Defender is back with two more. The first, dubbed “RedSun,” is another privilege escalation flaw in the same platform. The second, “UnDefend,” allows a standard user to block Microsoft Defender from receiving signature updates or disable it entirely (if Microsoft pushes a major Defender update). And, according to Huntress researchers, all three exploitation techniques have … More

The post Researcher drops two more Microsoft Defender zero-days, all three now exploited in the wild appeared first on Help Net Security.

Read the whole story
NerdsToGo
9 minutes ago
reply
Share this story
Delete

75,000 DDoS-for-Hire Users Reprimanded as Authorities Seize Dozens of Domains

1 Share

DDoS-for-Hire, Operation PowerOFF, Europol, U.S. Department of Justice

Law enforcement agencies across Europe, the United States, and other partner nations cracked down on the commercial DDoS-for-hire ecosystem, targeting both operators and customers of services used to knock websites offline.

The coordinated effort led to the seizure of 53 domains, four arrests, 25 search warrants, and warning notices sent to more than 75,000 people suspected of using so-called “booter” or “stresser” platforms.

A Crackdown on DDoS-for-Hire

DDoS-for-hire platforms allow customers to pay relatively small fees to launch distributed denial-of-service attacks against websites, gaming services, businesses, and public infrastructure. In fact, AI-driven threat intelligence company Cyble, in a new research report released today said, DDoS was the primary mode of attack during the ongoing Iran-Israel and U.S. conflict. Cyble recorded a 140% increase in DDoS attacks targeting Israeli entities after September 2025, and at the height of the conflict, saw 40 DDoS attacks per day.

These DDoS-for-hire services often market themselves as legitimate stress-testing tools, but authorities say they are widely abused for harassment, extortion, and disruption.

The latest enforcement wave is part of the long-running international initiative known as "Operation PowerOFF," which has previously dismantled multiple booter services and disrupted related infrastructure.

Read: DDoS-for-Hire Empire Dismantled as Poland Arrests Four, U.S. Seizes Nine Domains

U.S. Authorities Seize Key Infrastructure

The U.S. Department of Justice said investigators in Alaska seized infrastructure linked to eight DDoS-for-hire domains, including services branded as Vac Stresser and Mythical Stress, both of which allegedly advertised the ability to launch tens of thousands of attacks per day. Investigators also searched backend servers tied to the platforms.

Officials did not immediately identify those behind the services, but said the action was intended to disrupt the technical backbone used to power attacks globally.

75,000 Users Contacted Directly

In one of the more unusual aspects of the operation, authorities contacted more than 75,000 suspected users directly through warning emails and letters.

Law enforcement agencies appear to be using deterrence alongside takedowns—sending a message that paying for DDoS attacks leaves a trail and may bring legal consequences.

Security experts say the tactic could be particularly effective against younger or low-level offenders who use these platforms for gaming disputes, personal retaliation, or vandalism without fully understanding the legal risks.

Investigators said they identified around three million criminal accounts connected to the wider DDoS-for-hire ecosystem. The sheer number of accounts shows how industrialized cybercrime services have become. Instead of building botnets or malware, users can simply rent attack capability on demand.

DDoS attacks overwhelm a target with traffic, often causing websites, applications, or networks to crash. While sometimes dismissed as nuisance attacks, they can disrupt hospitals, financial institutions, government portals, and emergency services.

Recent years have also seen DDoS attacks used as smokescreens to distract security teams while other intrusions unfold.

Read: Europol Issues Public Alert: ‘We Will Never Call You’ as Phone and App Scams Surge

A Persistent Cat-and-Mouse Game

Despite repeated takedowns, booter services often reappear quickly under new names, new domains, or relocated hosting providers. Researchers have found that while seizures can significantly reduce traffic in the short term, the market has proven resilient over time.

That means operations like PowerOFF may need to combine arrests, infrastructure seizures, financial disruption, and user deterrence to have lasting impact.

Read the whole story
NerdsToGo
9 minutes ago
reply
Share this story
Delete

Google wipes out 602 million scam ads with Gemini on duty

1 Share

Google claims that its security teams work around the clock using its Gemini AI models to detect and stop harmful ads. “Bad actors are using generative AI to create deceptive ads at scale, and Gemini helps us detect and block them in real time” Keerat Sharma, VP and GM, Ads Privacy and Safety, Google, said. “Our models analyze hundreds of billions of signals — including account age, behavioral cues and campaign patterns — to stop … More

The post Google wipes out 602 million scam ads with Gemini on duty appeared first on Help Net Security.

Read the whole story
NerdsToGo
10 minutes ago
reply
Share this story
Delete

Microsoft Confirms Windows Servers Enter Reboot Loops Following April Patches

1 Share

Microsoft has confirmed that some Windows Server 2025 systems are entering reboot loops after installing its April 2026 Patch Tuesday update, raising concerns among enterprise administrators and IT teams.

The issue is linked to cumulative update KB5082063 (OS Build 26100.32690), released on April 14, 2026.

While the update includes important security fixes and performance improvements, Microsoft acknowledged that domain controllers may restart repeatedly after installation, effectively creating a reboot loop scenario that can disrupt critical infrastructure.

According to Microsoft’s official release notes and Windows release health dashboard, the problem primarily affects domain controllers, which are essential for authentication and Active Directory operations in enterprise environments.

Repeated restarts in such systems can lead to authentication failures, service outages, and network instability.

The April update was designed to introduce several security enhancements, including improvements to Secure Boot certificate deployment and Kerberos authentication.

Notably, Microsoft modified Kerberos Key Distribution Center (KDC) behavior to use stronger AES-based encryption by default, addressing risks tied to CVE-2026-20833.

However, these authentication-related changes may be contributing to system instability in certain configurations.

Microsoft also highlighted additional known issues tied to the update. Devices using unsupported or misconfigured BitLocker Group Policy settings may be forced into BitLocker recovery mode after installation.

In parallel, Windows Server Update Services (WSUS) is reportedly failing to display detailed error messages, making troubleshooting more difficult for administrators.

Beyond the reboot loop issue, KB5082063 includes several improvements:

  • Enhanced protection against malicious Remote Desktop (.rdp) files by showing connection settings before execution.
  • Improved SMB compression reliability over QUIC, reducing timeout issues.
  • Updates to Windows Deployment Services (WDS), where the “Hands-Free Deployment” feature is now disabled by default due to security hardening linked to CVE-2026-0386.
  • Better handling of PowerShell registry imports and improved Bluetooth device management.

Microsoft has not yet released an out-of-band patch or full mitigation guidance for the reboot loop issue at the time of writing.

However, administrators are advised to closely monitor affected systems and review update deployment strategies, especially in domain controller environments.

As an immediate precaution, security teams should:

  • Delay deployment of KB5082063 on critical servers until further guidance is issued.
  • Ensure recent system backups are available for rapid recovery.
  • Monitor domain controller uptime and authentication logs for anomalies.
  • Validate BitLocker configurations to avoid unexpected recovery prompts.

This incident highlights the ongoing risk associated with monthly security updates, where critical fixes can sometimes introduce operational instability.

Organizations are encouraged to test patches in controlled environments before wide deployment to minimize disruption.

Microsoft is expected to provide further updates or mitigation steps as investigations continue.

Follow us on Google News , LinkedIn and X to Get More Instant UpdatesSet Cyberpress as a Preferred Source in Google

The post Microsoft Confirms Windows Servers Enter Reboot Loops Following April Patches appeared first on Cyber Security News.



Read the whole story
NerdsToGo
11 minutes ago
reply
Share this story
Delete
Next Page of Stories