Kaspersky researchers have detailed a destructive malware campaign targeting the energy and utilities sector in Venezuela. The attack utilized a novel data wiper, dubbed Lotus Wiper, designed for the sole purpose of sabotage. Unlike ransomware, Lotus Wiper does not demand payment; its function is to permanently destroy data, overwrite physical drives, and erase system recovery options, rendering infected systems unbootable and data unrecoverable. The use of native Windows tools and a multi-stage deployment script suggests a planned operation by a threat actor focused on causing significant disruption to critical infrastructure operations.
Lotus Wiper represents a significant threat due to its purely destructive nature. The attacks, which occurred in late 2025 and early 2026, were highly targeted at Venezuelan energy companies. The malware's primary functions are to:
The absence of a ransom note confirms the attacker's objective is not financial gain but disruption, sabotage, or political statement. The malware sample was reportedly uploaded from a machine within Venezuela, suggesting either an insider threat or an attacker with a long-standing presence in the victim's network.
The Lotus Wiper attack is initiated via a batch script, which orchestrates a multi-stage destructive process. Key technical details include:
.bat) that prepares the environment for the wiper payload. This aligns with T1059.003 - Windows Command Shell.UI0Detect (Interactive Services Detection) service. This is a defense evasion technique (T1562.001 - Disable or Modify Tools) used to prevent graphical user interface warnings that might alert a user to the ongoing attack.fsutil: To create large files that overwrite free space.robocopy: To delete files and directories.diskpart: To manage and erase disk partitions.
This maps directly to T1485 - Data Destruction and T1561 - Disk Wipe.The use of legitimate system tools for destructive purposes makes detection challenging, as it requires distinguishing malicious use from benign administrative activity. This highlights the importance of behavioral monitoring and command-line logging.
The impact of a Lotus Wiper infection is catastrophic for the affected systems. It results in:
No specific file hashes, C2 domains, or IP addresses were provided in the source articles.
Security teams should proactively hunt for patterns associated with wiper malware activity:
cmd.exe /c stop UI0Detectfsutil file createnew <filename> <size>diskpart.exediskpart.exe outside of scheduled maintenance windows is highly suspicious.fsutil.exe, robocopy.exe, and diskpart.exe.diskpart or fsutil with destructive parameters, especially when initiated by non-administrative users or scripts. Use D3FEND's D3-PA - Process Analysis to monitor for chains of suspicious commands.Given the destructive nature of wipers, prevention and resilience are paramount.
M0951 - Data Backup (ICS).diskpart and fsutil to only authorized administrator accounts and from specific administrative workstations. This aligns with M1022 - Restrict File and Directory Permissions.The most critical defense against wipers is having immutable, offline backups that can be used to restore systems from scratch.
Use EDR or other endpoint security tools to detect and block sequences of commands indicative of wiper activity.
Mapped D3FEND Techniques:
Implement application allowlisting to prevent the execution of unauthorized batch scripts and other initial access payloads.
Mapped D3FEND Techniques:
Given that Lotus Wiper's goal is irreversible data destruction, the primary countermeasure is not detection or prevention alone, but resilience. Organizations must implement a robust backup and restoration strategy. This involves creating regular, automated backups of all critical systems and data. Crucially, these backups must be stored offline or on immutable storage, completely isolated from the primary network to prevent them from being wiped along with the production systems. Restoration procedures must be documented and tested frequently to ensure that systems can be rebuilt from bare metal in a timely manner. For the Venezuelan energy sector, this means having verified backups of SCADA configurations, historical data, and operating system images. This D3FEND technique is the only effective way to recover from a successful wiper attack.
To detect the 'living off the land' techniques used by Lotus Wiper, organizations should deploy an Endpoint Detection and Response (EDR) solution capable of advanced process analysis. This tool should be configured to monitor for suspicious parent-child process relationships and command-line arguments. Specifically for Lotus Wiper, rules should be created to alert on or block the execution of diskpart.exe or fsutil.exe when spawned by a batch script (cmd.exe) or an unfamiliar process. Furthermore, the EDR should flag any process attempting to stop the UI0Detect service. By baselining normal administrative activity, security teams can create high-fidelity alerts for the specific sequence of actions that constitute the wiper's attack chain, potentially stopping the destruction before it begins.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats