Lotus Wiper Malware Targets Venezuelan Energy Systems in Destructive Attack
好的,我现在需要帮用户总结一篇文章,控制在100字以内。用户的要求很明确,直接写文章描述,不需要特定的开头。 首先,我得快速浏览文章内容。文章讲的是Kaspersky发现了一种新的恶意软件,叫做Lotus Wiper,用于攻击委内瑞拉的能源和公用事业部门。攻击发生在2025年底到2026年初。 接下来,我需要提取关键信息:Lotus Wiper是一种数据擦除器,通过批处理脚本启动攻击,破坏系统防御,覆盖物理驱动器内容,并删除文件。攻击不以金钱为目的,可能与美国军事行动有关联。 然后,我要确保在100字以内涵盖这些要点:Lotus Wiper的用途、攻击目标、时间和机制、动机以及可能的关联事件。 最后,组织语言,确保简洁明了。比如:“Kaspersky发现了一种新型数据擦除器Lotus Wiper,在2025年底至2026年初针对委内瑞拉能源和公用事业部门发起攻击。该恶意软件通过批处理脚本启动破坏性操作,覆盖物理驱动器内容并删除文件。攻击未涉及勒索行为,可能与美国军事行动有关。” 这样既涵盖了主要内容又符合字数要求。 </think> Kaspersky发现了一种新型数据擦除器Lotus Wiper,在2025年底至2026年初针对委内瑞拉能源和公用事业部门发起攻击。该恶意软件通过批处理脚本启动破坏性操作,覆盖物理驱动器内容并删除文件。攻击未涉及勒索行为,可能与美国军事行动有关。 2026-4-22 10:55:0 Author: thehackernews.com(查看原文) 阅读量:13 收藏

Malware / Critical Infrastructure

Cybersecurity researchers have discovered a previously undocumented data wiper that has been used in attacks targeting Venezuela at the end of last year and the start of 2026.

Dubbed Lotus Wiper, the novel file wiper has been used in a destructive campaign targeting the energy and utilities sector in Venezuela, per findings from Kaspersky.

"Two batch scripts are responsible for initiating the destructive phase of the attack and preparing the environment for executing the final wiper payload," the Russian cybersecurity vendor said. "These scripts coordinate the start of the operation across the network, weaken system defenses, and disrupt normal operations before retrieving, deobfuscating, and executing a previously unknown wiper."

Once deployed, the wiper erases recovery mechanisms, overwrites the content of physical drives, and systematically deletes files across affected volumes, effectively leaving the system in an inoperable state.

No extortion or payment instructions are baked into the artifact, indicating that the aggressive wiper activity is not motivated by financial gain. It's worth noting that the wiper was uploaded to a publicly available platform in mid-December 2025 from a machine in Venezuela, weeks before the U.S. military action in the country in early January 2026. The sample was compiled in late September 2025.

It's currently not known if these two events are related, but Kaspersky noted that the sample was uploaded "during a period of increased public reports of malware activity targeting the same sector and region," suggesting the wiper attack is extremely targeted in nature.

The attack chain begins with a batch script that triggers a multi-stage sequence responsible for dropping the wiper payload. Specifically, it attempts to stop the Windows Interactive Services Detection (UI0Detect) service, which is used to alert users when a background service running in Session 0 attempts to display a graphical interface or interactive dialog.

UI0Detect has been removed from modern versions of Windows. The presence of such a setting indicates that the batch script is designed to operate on machines running versions prior to Windows 10 version 1803, which eliminated the feature. 

The script then checks for a NETLOGON share and accesses a remote XML file, after which it checks for the presence of a corresponding file with the same name in a local directory defined previously ("C:\lotus" or "%SystemDrive%\lotus"). Irrespective of whether such a local file exists, it proceeds to execute a second batch script.

"The local check most likely tries to determine whether the machine is part of an Active Directory domain," Kaspersky said. "If the remote file is not found, the script exits. In cases where the NETLOGON share is initially unreachable, the script introduces a randomized delay of up to 20 minutes before retrying the remote check."

The second batch script, if not run already, enumerates local user accounts, disables cached logins, logs off active sessions, deactivates network interfaces, and runs the "diskpart clean all" command to wipe all identified logical drives on the system.

It also recursively mirrors folders to overwrite existing contents or delete them using the robocopy command-line utility, and calculates available free space and utilizes fsutil to create a file that fills the entire drive to exhaust storage capacity and impair recovery.

Once the compromised environment is prepared for destructive activity, the Lotus Wiper is launched to delete restore points, overwrite physical sectors by writing all zeroes, clear the update sequence numbers (USN) of the volumes' journals, and erase all the system's files for each mounted volume.

Organizations and government organizations are advised to monitor for NETLOGON share changes, potential credential dumping or privilege escalation activity, and the use of native Windows utilities like fsutil, robocopy, and diskpart to perform the destructive actions.

"Given that the files included certain functionalities targeting older versions of the Windows operating system, the attackers likely had knowledge of the environment and compromised the domain long before the attack occurred," Kaspersky said.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/04/lotus-wiper-malware-targets-venezuelan.html
如有侵权请联系:admin#unsafe.sh