Lotus Wiper: Destructive New Malware Hits Venezuela's Energy Sector
What Is a Wiper?
Unlike ransomware, which locks data and demands payment, a wiper malware has one purpose: to permanently destroy data and render systems completely inoperable. Notably, Lotus Wiper contains no ransom demands or payment instructions, meaning the attack was not financially motivated, it was purely destructive.
How the Attack Unfolded
The attack chain begins with two batch scripts that work together to prepare the environment and deploy the wiper payload. The first script attempts to stop a Windows service related to background process alerts, checks for a NETLOGON network share, and retrieves a remote XML file — a step that researchers believe is used to confirm the machine is part of an Active Directory domain before proceeding.
If the conditions are met, a second script takes over. It enumerates local user accounts, disables cached logins, logs off active sessions, shuts down network interfaces, and runs the Windows built-in "diskpart clean all" command to wipe all identified drives. It also uses native Windows tools like robocopy and fsutil to overwrite folders and completely fill drive storage making recovery far more difficult.
Once the environment is sufficiently weakened, Lotus Wiper itself is launched. It removes system restore points, overwrites physical drive sectors with zeroes, clears volume journal records, and deletes all files across every mounted volume effectively destroying the system entirely.
A Targeted and Pre-Planned Operation
The malware sample was compiled in late September 2025 and uploaded to a public analysis platform from a machine in Venezuela in mid-December 2025, weeks before the U.S. military intervention in the country in January 2026. Whether the two events are directly connected remains unknown.
What is clear, however, is that the attackers had detailed knowledge of the target environment. The malware includes specific logic for older versions of Windows (pre-Windows 10 version 1803), suggesting the attackers had already compromised the network long before launching the destructive phase.
What Organizations Should Watch For
Security teams are advised to monitor for unusual changes to NETLOGON shares, signs of credential dumping or privilege escalation, and suspicious use of native Windows utilities like fsutil, robocopy, and diskpart, particularly when used in combination or in automated scripts.
Comments
Post a Comment