Daily OT Security News: April 25, 2026

Welcome to the Daily OT Security News for April 25, 2026. Today’s briefing covers groundbreaking malware discoveries reshaping our understanding of state-sponsored cyber sabotage, persistent threats in critical federal network devices, and the latest assessments on OT malware targeting vital water treatment systems. We also examine a destructive cyberattack impacting Venezuela’s energy sector and explore emerging ICS/OT cybersecurity trends driving industrial defense strategies in 2026.

Researchers Uncover Pre-Stuxnet ‘fast16’ Malware Targeting Engineering Software

SentinelOne researchers have identified fast16, a previously undocumented Lua-based cyber sabotage framework dating back to 2005 and predating Stuxnet by at least five years. This malware targeted high-precision engineering software used in civil engineering and physics, potentially impacting Iran’s nuclear program. Forensic evidence links fast16 to the NSA-affiliated Equation Group, marking it as the first known Windows malware embedding a Lua engine and prompting a reassessment of early state-sponsored sabotage timelines.

Source: The Hacker News

CISA Reports Persistent FIRESTARTER Backdoor on Cisco ASA Device in Federal Network

CISA and the UK NCSC revealed that a U.S. federal civilian agency’s Cisco Firepower ASA device was compromised in September 2025 by the FIRESTARTER backdoor, which persisted despite security patches. Exploiting CVE-2025-20333 and CVE-2025-20362, the malware embedded itself in the LINA engine to intercept XML handling and maintain persistence through reboots and firmware updates. Organizations are advised to inventory edge devices, apply CISA’s YARA rules for detection, and consider full device reimaging for remediation.

Source: Security Affairs

ZionSiphon OT Malware Targeting Water Treatment Facilities Assessed as Non-Functional Proof of Concept

Nozomi Networks Labs’ technical analysis of ZionSiphon OT malware reveals multiple critical inconsistencies, indicating it is a non-functional proof of concept rather than a genuine threat. Issues include fabricated configuration paths, flawed geofencing logic unsuitable for NAT environments, and inadequate Modbus interactions lacking facility-specific mappings. This case highlights the crucial need for rigorous technical scrutiny when evaluating OT threat claims to maintain water and critical infrastructure security.

Source: Nozomi Networks

Lotus Wiper Malware Hits Venezuela’s Energy Sector in Destructive Cyberattack

The destructive Lotus Wiper malware has targeted Venezuela’s energy and utilities sector, aiming to permanently destroy data and disrupt operations without seeking ransom. The attack employs batch scripts to lock users out, disable networks, overwrite disks at the sector level, and execute a wiper payload that erases restore points and renames files to random strings, rendering systems unrecoverable. Evidence suggests prolonged attacker access prior to the late 2025 deployment, linked to regional geopolitical tensions.

Source: GBHackers

Top 7 ICS/OT Cybersecurity Trends and Frameworks Shaping Industrial Defense in 2026

IIoT World’s latest analysis identifies seven key ICS/OT cybersecurity trends for 2026, including the rise of AI-driven attacks focused on industrial data theft, increasing board-level OT risk ownership, and convergence of major compliance frameworks such as IEC 62443, NIST 800-82, and NIS2. Zero Trust architectures using PKI-based device identities are gaining momentum, alongside supply chain scrutiny via SBOMs. The industry’s shift toward ‘secure by design’ acknowledges the limitations of traditional patching in OT environments with infrequent update cycles.

Source: IIoT World

Thank you for reading today’s briefing. As cyber threats continue to evolve across OT environments, staying informed and vigilant remains essential to safeguarding critical infrastructure and industrial operations.

Share this