Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    SSA-614723 V1.2 (Last Update: 2025-10-14): Denial of Service Vulnerabilities in User Management Component (UMC)

    April 26, 2026

    New ‘Pack2TheRoot’ flaw gives hackers root Linux access

    April 26, 2026

    CVE-2026-7036 | THREATINT

    April 26, 2026
    Facebook X (Twitter) Instagram
    • Demos
    • Technology
    • Gaming
    • Buy Now
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Canadian Cyber WatchCanadian Cyber Watch
    • Home
    • News
    • Alerts
    • Tips
    • Tools
    • Industry
    • Incidents
    • Events
    • Education
    Subscribe
    Canadian Cyber WatchCanadian Cyber Watch
    Home»News»New Lotus data wiper used against Venezuelan energy, utility firms
    News

    New Lotus data wiper used against Venezuelan energy, utility firms

    adminBy adminApril 21, 2026No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    New Lotus data wiper used against Venezuelan energy, utility firms

    A previously undocumented data-wiping malware dubbed Lotus was used last year in targeted attacks against energy and utilities organizations in Venezuela.

    The malware was uploaded to a publicly available platform in mid-December from a machine in Venezuela and has been analyzed by researchers at Kaspersky.

    Before the cripling stage, the attacker relies on two batch scripts that prepare the system for the final payload by weakening defenses and obstructing normal operations.

    image

    According to the researchers, the Lotus data-wiping malware is designed to completely destroy compromised systems by overwriting physical drives and eliminating recovery options.

    “The wiper removes recovery mechanisms, overwrites the content of physical drives, and systematically deletes files across affected volumes, ultimately leaving the system in an unrecoverable state,” Kaspersky says in a report today.

    Given the timing, the observed activity aligns with geopolitical tensions in the region, which culminated this year on January 3 with the capture of Venezuela’s then-president, Nicolás Maduro.

    Around mid-December 2025, the state-owned oil company Petróleos de Venezuela (PDVSA) suffered a cyberattack that disabled its delivery systems. The organization blamed the United States for the incident.

    It should be noted that there is no public evidence indicating that PDVSA’s systems were wiped in the attack or details about the nature of the attack.

    Preliminary activity

    Kaspersky’s report notes that the attacks begin with the execution of a batch script (OhSyncNow.bat) that disables the Windows ‘UI0Detect’ service, and performs an XML file check to coordinate execution across domain-joined systems.

    A second-stage script (notesreg.bat) is executed when certain conditions are met. It enumerates users, disables accounts via password changes, logs off active sessions, disables all network interfaces, and deactivates cached logins.

    The malicious code then enumerates drives and runs ‘diskpart clean all’ to overwrite them with zeros. It also uses ‘robocopy’ to overwrite directory contents, Kaspersky found.

    In the next phase, it calculates the free space and uses ‘fsutil’ to create a file that fills the disk, making it harder to restore the wiped data.

    After preparing the environment for data destruction and performing some wiping actions itself, the batch script decrypts and executes the Lotus wiper as the final payload.

    Lotus wiper deployment

    The Lotus wiper operates at a lower level, interacting with disks via IOCTL calls, retrieving the disk geometry, clearing USN journal entries, wiping restore points, and overwriting physical sectors, not just logical volumes.

    The malware performs multiple actions, summarized as follows:

    • Enables all privileges in its token to gain administrative-level access.
    • Deletes all Windows restore points using the Windows System Restore API.
    • Wipes physical drives by retrieving disk geometry and overwriting all sectors with zeroes.
    • Clears the USN journal to remove traces of file system activity.
    • Deletes files by zeroing their contents, renaming them randomly, and removing them (or scheduling deletion on reboot if locked).
    • Repeats cycles of drive wiping and restore point deletion multiple times.
    • Updates disk properties using IOCTL_DISK_UPDATE_PROPERTIES after the final wipe.

    Kaspersky suggests that system administrators should monitor for NETLOGON share changes, UI0Detect manipulation, mass account changes, and disabling of network interfaces, which are all precursor activities.

    They say that unexpected usage of ‘diskpart,’ ‘robocopy,’ and ‘fsutil’ is also a red flag.

    A general recommendation against wipers and ransomware is to maintain regular offline backups whose restorability is frequently validated.


    article image

    AI chained four zero-days into one exploit that bypassed both renderer and OS sandboxes. A wave of new exploits is coming.

    At the Autonomous Validation Summit (May 12 & 14), see how autonomous, context-rich validation finds what’s exploitable, proves controls hold, and closes the remediation loop.

    Claim Your Spot



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleFlowise – Cypher Injection in GraphCypherQAChain – Research Advisory
    Next Article Atlassian security advisory (AV26-375) – Canadian Centre for Cyber Security
    admin
    • Website

    Related Posts

    News

    New ‘Pack2TheRoot’ flaw gives hackers root Linux access

    April 26, 2026
    News

    Understanding Exploits | Blog | VulnCheck

    April 26, 2026
    News

    Microsoft to roll out Entra passkeys on Windows in late April

    April 26, 2026
    Add A Comment

    Comments are closed.

    Demo
    Top Posts

    Catchy & Intriguing

    March 17, 202662 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202620 Views

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    85
    Featured

    Pico 4 Review: Should You Actually Buy One Instead Of Quest 2?

    January 15, 2021 Featured
    8.1
    Uncategorized

    A Review of the Venus Optics Argus 18mm f/0.95 MFT APO Lens

    January 15, 2021 Uncategorized
    8.9
    Editor's Picks

    DJI Avata Review: Immersive FPV Flying For Drone Enthusiasts

    January 15, 2021 Editor's Picks

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Demo
    Most Popular

    Catchy & Intriguing

    March 17, 202662 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202620 Views

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views
    Our Picks

    SSA-614723 V1.2 (Last Update: 2025-10-14): Denial of Service Vulnerabilities in User Management Component (UMC)

    April 26, 2026

    New ‘Pack2TheRoot’ flaw gives hackers root Linux access

    April 26, 2026

    CVE-2026-7036 | THREATINT

    April 26, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • Home
    • Technology
    • Gaming
    • Phones
    • Buy Now
    © 2026 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.