Destructive 'Lotus Wiper' Malware Strikes Venezuelan Energy Sector

Kaspersky Identifies 'Lotus Wiper' in Destructive Campaign Against Venezuelan Energy and Utilities

HIGH
April 22, 2026
5m read
MalwareCyberattackIndustrial Control Systems

Related Entities

Organizations

Other

Lotus WiperVenezuela

Full Report

Executive Summary

Kaspersky researchers have detailed a destructive malware campaign targeting the energy and utilities sector in Venezuela. The attack utilized a novel data wiper, dubbed Lotus Wiper, designed for the sole purpose of sabotage. Unlike ransomware, Lotus Wiper does not demand payment; its function is to permanently destroy data, overwrite physical drives, and erase system recovery options, rendering infected systems unbootable and data unrecoverable. The use of native Windows tools and a multi-stage deployment script suggests a planned operation by a threat actor focused on causing significant disruption to critical infrastructure operations.

Threat Overview

Lotus Wiper represents a significant threat due to its purely destructive nature. The attacks, which occurred in late 2025 and early 2026, were highly targeted at Venezuelan energy companies. The malware's primary functions are to:

  • Overwrite the contents of physical drives.
  • Delete files across all system volumes.
  • Erase system recovery mechanisms to prevent restoration.

The absence of a ransom note confirms the attacker's objective is not financial gain but disruption, sabotage, or political statement. The malware sample was reportedly uploaded from a machine within Venezuela, suggesting either an insider threat or an attacker with a long-standing presence in the victim's network.

Technical Analysis

The Lotus Wiper attack is initiated via a batch script, which orchestrates a multi-stage destructive process. Key technical details include:

  1. Execution Staging: The attack begins with a batch script (.bat) that prepares the environment for the wiper payload. This aligns with T1059.003 - Windows Command Shell.
  2. Defense Evasion: The script attempts to stop the UI0Detect (Interactive Services Detection) service. This is a defense evasion technique (T1562.001 - Disable or Modify Tools) used to prevent graphical user interface warnings that might alert a user to the ongoing attack.
  3. Data Destruction: The wiper leverages legitimate Windows utilities to perform its destructive actions, a technique known as Living Off The Land (LotL). The report mentions monitoring for unusual use of:
    • fsutil: To create large files that overwrite free space.
    • robocopy: To delete files and directories.
    • diskpart: To manage and erase disk partitions. This maps directly to T1485 - Data Destruction and T1561 - Disk Wipe.

The use of legitimate system tools for destructive purposes makes detection challenging, as it requires distinguishing malicious use from benign administrative activity. This highlights the importance of behavioral monitoring and command-line logging.

Impact Assessment

The impact of a Lotus Wiper infection is catastrophic for the affected systems. It results in:

  • Permanent Data Loss: All data on the infected machine is irrecoverably destroyed.
  • Operational Downtime: Critical systems are rendered inoperable, leading to significant downtime for energy and utility services.
  • Costly Recovery: Recovery requires completely rebuilding systems from bare metal using trusted backups, a time-consuming and expensive process.
  • Infrastructure Disruption: In the context of an energy provider, this could lead to power outages or other disruptions to essential services.

IOCs — Directly from Articles

No specific file hashes, C2 domains, or IP addresses were provided in the source articles.

Cyber Observables — Hunting Hints

Security teams should proactively hunt for patterns associated with wiper malware activity:

Type
Command-Line Pattern
Value
cmd.exe /c stop UI0Detect
Description
Attempt to stop the Interactive Services Detection service to hide GUI alerts.
Type
Command-Line Pattern
Value
fsutil file createnew <filename> <size>
Description
Suspicious, large file creation, especially in critical system directories.
Type
Process Name
Value
diskpart.exe
Description
Execution of diskpart.exe outside of scheduled maintenance windows is highly suspicious.
Type
Log Source
Value
Windows Event ID 4688 / Sysmon Event ID 1
Description
Monitor for command-line arguments of fsutil.exe, robocopy.exe, and diskpart.exe.

Detection & Response

  • Detection: Implement robust command-line logging (e.g., via PowerShell logging, Sysmon, or EDR) to capture the full command line of all executed processes. Create high-fidelity alerts for the execution of tools like diskpart or fsutil with destructive parameters, especially when initiated by non-administrative users or scripts. Use D3FEND's D3-PA - Process Analysis to monitor for chains of suspicious commands.
  • Response: If wiper activity is suspected, the immediate priority is to contain the blast radius. Isolate the affected host(s) from the network instantly to prevent propagation. Do not attempt to reboot or shut down gracefully, as this may trigger the final wipe sequence. Power off the machine directly to preserve any volatile memory for forensic analysis, if possible. Trigger the incident response plan and prepare to restore from known-good, offline backups.

Mitigation

Given the destructive nature of wipers, prevention and resilience are paramount.

  1. Offline Backups: The single most important mitigation is maintaining regular, tested, and isolated backups. The 3-2-1 backup rule (3 copies, 2 different media, 1 offline/off-site) is critical. This is the core of M0951 - Data Backup (ICS).
  2. Application Allowlisting: Use application allowlisting to prevent unauthorized scripts and executables from running. This would block the initial batch script from executing.
  3. Restrict Administrative Tools: Limit the ability to use tools like diskpart and fsutil to only authorized administrator accounts and from specific administrative workstations. This aligns with M1022 - Restrict File and Directory Permissions.
  4. Endpoint Behavioral Monitoring: Deploy an EDR solution that can detect and block malicious sequences of behavior, such as a script stopping services and then attempting to wipe a disk.

Timeline of Events

1
September 30, 2025
Lotus Wiper malware sample was compiled.
2
December 15, 2025
The malware sample was uploaded to a public platform from a machine located in Venezuela.
3
January 1, 2026
Destructive attacks using Lotus Wiper against Venezuela's energy sector occurred around the end of 2025 and beginning of 2026.
4
April 22, 2026
This article was published

MITRE ATT&CK Mitigations

The most critical defense against wipers is having immutable, offline backups that can be used to restore systems from scratch.

Use EDR or other endpoint security tools to detect and block sequences of commands indicative of wiper activity.

Mapped D3FEND Techniques:

Implement application allowlisting to prevent the execution of unauthorized batch scripts and other initial access payloads.

Mapped D3FEND Techniques:

Audit

M1047enterprise

Enable comprehensive logging of process execution and command-line arguments to facilitate detection and investigation.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

Given that Lotus Wiper's goal is irreversible data destruction, the primary countermeasure is not detection or prevention alone, but resilience. Organizations must implement a robust backup and restoration strategy. This involves creating regular, automated backups of all critical systems and data. Crucially, these backups must be stored offline or on immutable storage, completely isolated from the primary network to prevent them from being wiped along with the production systems. Restoration procedures must be documented and tested frequently to ensure that systems can be rebuilt from bare metal in a timely manner. For the Venezuelan energy sector, this means having verified backups of SCADA configurations, historical data, and operating system images. This D3FEND technique is the only effective way to recover from a successful wiper attack.

To detect the 'living off the land' techniques used by Lotus Wiper, organizations should deploy an Endpoint Detection and Response (EDR) solution capable of advanced process analysis. This tool should be configured to monitor for suspicious parent-child process relationships and command-line arguments. Specifically for Lotus Wiper, rules should be created to alert on or block the execution of diskpart.exe or fsutil.exe when spawned by a batch script (cmd.exe) or an unfamiliar process. Furthermore, the EDR should flag any process attempting to stop the UI0Detect service. By baselining normal administrative activity, security teams can create high-fidelity alerts for the specific sequence of actions that constitute the wiper's attack chain, potentially stopping the destruction before it begins.

Sources & References

Lotus Wiper Malware Targets Venezuelan Energy Systems in Destructive Attack
The Hacker News (thehackernews.com) April 22, 2026
New Lotus Wiper malware targets energy sector in Venezuela
BleepingComputer (bleepingcomputer.com) April 22, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Wiper MalwareData DestructionVenezuelaEnergy SectorKasperskyDestructive Malware

📢 Share This Article

Help others stay informed about cybersecurity threats