CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

Lotus Wiper malware campaign disrupts Venezuelan energy and utilities sector with destructive file wiping

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

A previously undocumented file wiper malware named Lotus Wiper has been deployed in a destructive campaign targeting the energy and utilities sector in Venezuela, with activity spanning late 2025 and early 2026. The wiper systematically destroys system recovery mechanisms, overwrites physical drive contents, and deletes files across mounted volumes, rendering affected systems inoperable. No ransom or extortion demands were observed, indicating a non-financial motive. The attack chain involves multi-stage batch scripts that disable defenses, enumerate domain users, disable cached logins, disable network interfaces, and prepare the environment for wiper execution using native Windows utilities such as diskpart, robocopy, and fsutil.

Timeline

  1. 22.04.2026 13:55 1 articles · 2h ago

    Lotus Wiper malware campaign impacts Venezuelan energy and utilities sector

    A destructive file wiper malware, Lotus Wiper, was deployed against the energy and utilities sector in Venezuela between December 2025 and early 2026. The campaign utilized multi-stage batch scripts to disable system recovery mechanisms, enumerate domain users, disable cached logins, and deactivate network interfaces before executing diskpart clean all and fsutil to wipe logical drives and exhaust storage capacity. The wiper overwrites physical sectors with zeroes, clears USN journals, deletes restore points, and removes all system files, leaving systems inoperable without recovery options.

    Show sources

Information Snippets