Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Lotus Wiper Threatens Venezuela’s Energy Sector

Lotus Wiper Threatens Venezuela’s Energy Sector

Posted on April 22, 2026 By CWS

Cybersecurity experts have identified a new malware, known as Lotus Wiper, targeting Venezuela’s energy infrastructure. The discovery, made by Kaspersky, highlights a series of attacks at the end of last year and the beginning of 2026 aimed specifically at the country’s energy and utilities sectors.

Understanding the Lotus Wiper Attack

Lotus Wiper is distinguished by its ability to disrupt systems without financial motivation. Instead, the malware, which was initially uploaded from Venezuela in December 2025, appears to have strategic objectives. The timing of its release coincides with heightened reports of similar malware activities in the region, although a direct connection to subsequent U.S. military actions in January 2026 has not been confirmed.

The attack involves batch scripts that orchestrate the deployment of the wiper across networks, weakening defenses and erasing data. This process leaves systems inoperable by targeting recovery mechanisms and deleting files on physical drives.

Technical Aspects of the Attack

The attack chain begins with a batch script designed to distribute the wiper. It attempts to disable the Windows UI0Detect service, which alerts users when a background service interacts with the desktop. This feature, absent in newer Windows versions, suggests the malware targets systems running older software.

Subsequent steps include checking for a NETLOGON share and executing further scripts based on network conditions. These scripts disable user accounts, log off sessions, and execute commands to wipe local drives, ensuring comprehensive system disruption.

Implications for Security and Prevention

Organizations are advised to monitor changes to NETLOGON shares and be vigilant for signs of credential theft or unauthorized privilege escalation. The use of native Windows utilities such as fsutil, robocopy, and diskpart in destructive activities should raise alarms.

The attack underscores the importance of maintaining updated security protocols, particularly for systems running outdated software. The evidence suggests that attackers had prior knowledge of the targeted environment, highlighting the need for proactive security measures.

In conclusion, the Lotus Wiper attack serves as a critical reminder of the vulnerabilities within critical infrastructure sectors and the evolving nature of cyber threats. Vigilance and robust cybersecurity strategies remain essential for defense against such sophisticated attacks.

The Hacker News Tags:Batch Scripts, critical infrastructure, Cybersecurity, Data Wiper, energy sector, Kaspersky, Lotus Wiper, malware attack, Venezuela, Windows security

Post navigation

Previous Post: Namastex npm Packages Compromised with CanisterWorm Malware
Next Post: Mirai Botnet Exploits Vulnerability in Old D-Link Routers

Related Posts

AsyncRAT’s Open-Source Code Sparks Surge in Dangerous Malware Variants Across the Globe AsyncRAT’s Open-Source Code Sparks Surge in Dangerous Malware Variants Across the Globe The Hacker News
Iran’s State TV Hijacked Mid-Broadcast Amid Geopolitical Tensions; M Stolen in Crypto Heist Iran’s State TV Hijacked Mid-Broadcast Amid Geopolitical Tensions; $90M Stolen in Crypto Heist The Hacker News
A Pragmatic Approach To NHI Inventories  A Pragmatic Approach To NHI Inventories  The Hacker News
The Hype We Can Ignore (And the Risks We Can’t) The Hype We Can Ignore (And the Risks We Can’t) The Hacker News
Guide to Managing AI Usage in Enterprises Guide to Managing AI Usage in Enterprises The Hacker News
Compromised IAM Credentials Power a Large AWS Crypto Mining Campaign Compromised IAM Credentials Power a Large AWS Crypto Mining Campaign The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Mastodon Faces Major DDoS Attack Following Bluesky Incident
  • Venezuelan Energy Sector Hit by New Wiper Malware
  • DinDoor Backdoor Exploits Deno and MSI for Stealth Attacks
  • UK Faces Rising Cyber Threats from Russia, Iran, China
  • Cross-App Permissions: Unseen Risks and Solutions

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Mastodon Faces Major DDoS Attack Following Bluesky Incident
  • Venezuelan Energy Sector Hit by New Wiper Malware
  • DinDoor Backdoor Exploits Deno and MSI for Stealth Attacks
  • UK Faces Rising Cyber Threats from Russia, Iran, China
  • Cross-App Permissions: Unseen Risks and Solutions

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark