New Lotus Data Wiper Used Against Venezuelan Energy, Utility Firms

New Lotus Data Wiper Used Against Venezuelan Energy, Utility Firms

BleepingComputer
BleepingComputerApr 21, 2026

Why It Matters

The Lotus wiper demonstrates how cyber‑actors can physically destroy critical infrastructure data, forcing organizations to reassess backup strategies and detection capabilities. Its sophisticated, low‑level drive wiping raises the stakes for utilities worldwide, where downtime can translate into economic and public safety crises.

Key Takeaways

  • Lotus wiper overwrites physical drives, erasing all data
  • Attack chain uses two batch scripts to disable defenses first
  • Targets include Venezuela’s PDVSA and other utility firms
  • Detection signs: UI0Detect changes, diskpart, robocopy, fsutil usage
  • Offline, regularly tested backups are essential mitigation

Pulse Analysis

The emergence of Lotus adds a new chapter to the growing catalog of destructive malware aimed at critical infrastructure. While ransomware typically encrypts data for ransom, Lotus goes a step further by physically overwriting disk sectors, erasing system restore points, and scrubbing USN journals. Kaspersky’s analysis shows the malware was uploaded from within Venezuela, suggesting a possible domestic origin or a proxy used to mask attribution. Its deployment coincided with political unrest, highlighting how cyber weapons are increasingly leveraged as extensions of geopolitical strategy.

Technically, Lotus follows a multi‑stage infection chain. Initial batch scripts—OhSyncNow.bat and notesreg.bat—disable the UI0Detect service, alter user accounts, log off sessions, and shut down network interfaces, effectively isolating the target environment. The scripts then invoke native Windows utilities such as diskpart, robocopy, and fsutil to begin wiping data, before decrypting and executing the Lotus payload. Once active, the wiper gains administrative privileges, deletes all restore points via the System Restore API, and issues low‑level IOCTL commands to overwrite every sector with zeros. By repeatedly cycling through wipe and delete operations, it ensures no viable recovery path remains.

For utilities and other high‑value sectors, Lotus underscores the urgency of robust, offline backup regimes and proactive threat hunting. Security teams should monitor for the specific precursor activities identified by Kaspersky—unexpected UI0Detect modifications, mass account changes, and the use of diskpart, robocopy, or fsutil outside of routine maintenance. Regularly testing backup restorability, segmenting critical networks, and enforcing least‑privilege access can mitigate the impact of such wipers. As nation‑state actors continue to weaponize destructive malware, organizations must elevate their resilience posture to protect both data integrity and operational continuity.

New Lotus data wiper used against Venezuelan energy, utility firms

Comments

Want to join the conversation?

Loading comments...