Lotus Wiper Malware Attack Cripples Venezuela’s Energy Sector, Targets Critical Infrastructure

Lotus Wiper Malware Devastates Venezuela’s Energy Sector

In a significant cyberattack targeting Venezuela’s energy and utilities sector, a newly identified malware known as Lotus Wiper has been deployed to inflict irreversible damage on critical infrastructure. Unlike traditional ransomware that encrypts data for ransom, Lotus Wiper is designed solely for destruction, permanently erasing data and rendering systems inoperable.

Discovery and Context

The attack was uncovered amid escalating geopolitical tensions in the Caribbean region during late 2025 and early 2026. Artifacts associated with the malware were uploaded from a Venezuelan machine in mid-December 2025, though analysis indicates that Lotus Wiper was compiled in late September 2025. This timeline suggests that the perpetrators had been preparing for several months before executing the attack.

Security researchers identified the malicious artifacts during routine threat hunting and malware classification activities. Analysis revealed that the intended target was an organization within the energy and utilities sector. Notably, the malware’s code contained no ransom demands or extortion messages, confirming its purely destructive intent without financial motivation.

Technical Analysis of Lotus Wiper

Lotus Wiper operates by aggressively eliminating recovery mechanisms, overwriting physical drives with zeros, and systematically deleting files across all affected volumes. This method ensures that recovery is virtually impossible, aligning Lotus Wiper with other notorious destructive malware such as NotPetya and HermeticWiper.

The malware disguises itself as legitimate HCL Domino application components, using filenames like `nstats.exe`, `nevent.exe`, and `ndesign.exe` to blend in with normal system processes. This tactic indicates that the attackers had prior access to the victim’s systems, likely through earlier backdoor activities, allowing them to stage the malicious executables in advance.

Infection Chain and Execution

The attack initiates with a batch script named `OhSyncNow.bat`, serving as the entry point for the destructive sequence. This script targets a working directory, typically `C:\lotus`, and attempts to disable the Interactive Services Detection service (UI0Detect), a Windows process that alerts users to background activities. The presence of this service, removed by Microsoft starting with Windows 10 version 1803, suggests that the attackers specifically targeted legacy systems where the service still exists.

The script then checks for a remote XML flag file named `OHSync.xml` on the domain’s NETLOGON share. The presence of this file acts as a trigger to begin execution across all machines in the domain. If the file is found, a second batch script called `notesreg.bat` is launched, designed to run only once. This script enumerates local user accounts, changes their passwords to random strings, marks them inactive, disables cached logins, logs off active sessions, and shuts down all network interfaces using `netsh`. It also runs `diskpart clean all` against every logical drive, overwriting the entire disk content with zeros.

After the batch scripts prepare the environment, the final payload, Lotus Wiper, takes over. It uses XOR decryption to restore its own executable before running. Once active, it enables administrative privileges, deletes all Windows System Restore points by abusing the `srclient.dll` API, and then fills each disk sector with zeros using low-level IOCTL disk commands. It also uses `fsutil` to create a file that consumes all remaining free space on the disk, ensuring complete data destruction.

Implications and Recommendations

The deployment of Lotus Wiper underscores the evolving nature of cyber threats targeting critical infrastructure. Organizations within the energy sector, particularly those operating legacy systems, are at heightened risk. To mitigate such threats, it is imperative for organizations to:

– Implement Robust Security Measures: Regularly update and patch systems to address vulnerabilities, especially in legacy systems that may no longer receive official support.

– Enhance Monitoring and Detection: Deploy advanced threat detection systems capable of identifying and responding to suspicious activities promptly.

– Conduct Regular Backups: Maintain up-to-date backups of critical data and ensure that backup systems are isolated from the main network to prevent compromise.

– Develop Incident Response Plans: Establish and regularly update incident response protocols to ensure swift action in the event of a cyberattack.

The emergence of Lotus Wiper serves as a stark reminder of the destructive potential of modern cyber threats. Proactive measures and heightened vigilance are essential to safeguard critical infrastructure from such malicious activities.