Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Lotus Wiper Threatens Venezuela’s Energy Sector

Lotus Wiper Threatens Venezuela’s Energy Sector

Posted on April 22, 2026 By CWS

Cybersecurity experts have identified a new malware, known as Lotus Wiper, targeting Venezuela’s energy infrastructure. The discovery, made by Kaspersky, highlights a series of attacks at the end of last year and the beginning of 2026 aimed specifically at the country’s energy and utilities sectors.

Understanding the Lotus Wiper Attack

Lotus Wiper is distinguished by its ability to disrupt systems without financial motivation. Instead, the malware, which was initially uploaded from Venezuela in December 2025, appears to have strategic objectives. The timing of its release coincides with heightened reports of similar malware activities in the region, although a direct connection to subsequent U.S. military actions in January 2026 has not been confirmed.

The attack involves batch scripts that orchestrate the deployment of the wiper across networks, weakening defenses and erasing data. This process leaves systems inoperable by targeting recovery mechanisms and deleting files on physical drives.

Technical Aspects of the Attack

The attack chain begins with a batch script designed to distribute the wiper. It attempts to disable the Windows UI0Detect service, which alerts users when a background service interacts with the desktop. This feature, absent in newer Windows versions, suggests the malware targets systems running older software.

Subsequent steps include checking for a NETLOGON share and executing further scripts based on network conditions. These scripts disable user accounts, log off sessions, and execute commands to wipe local drives, ensuring comprehensive system disruption.

Implications for Security and Prevention

Organizations are advised to monitor changes to NETLOGON shares and be vigilant for signs of credential theft or unauthorized privilege escalation. The use of native Windows utilities such as fsutil, robocopy, and diskpart in destructive activities should raise alarms.

The attack underscores the importance of maintaining updated security protocols, particularly for systems running outdated software. The evidence suggests that attackers had prior knowledge of the targeted environment, highlighting the need for proactive security measures.

In conclusion, the Lotus Wiper attack serves as a critical reminder of the vulnerabilities within critical infrastructure sectors and the evolving nature of cyber threats. Vigilance and robust cybersecurity strategies remain essential for defense against such sophisticated attacks.

The Hacker News Tags:Batch Scripts, critical infrastructure, Cybersecurity, Data Wiper, energy sector, Kaspersky, Lotus Wiper, malware attack, Venezuela, Windows security

Post navigation

Previous Post: Namastex npm Packages Compromised with CanisterWorm Malware
Next Post: Mirai Botnet Exploits Vulnerability in Old D-Link Routers

Related Posts

Cursor AI Code Editor Fixed Flaw Allowing Attackers to Run Commands via Prompt Injection Cursor AI Code Editor Fixed Flaw Allowing Attackers to Run Commands via Prompt Injection The Hacker News
From Browser Stealer to Intelligence-Gathering Tool From Browser Stealer to Intelligence-Gathering Tool The Hacker News
What Attackers Are Doing With Them What Attackers Are Doing With Them The Hacker News
FreePBX Servers Targeted by Zero-Day Flaw, Emergency Patch Now Available FreePBX Servers Targeted by Zero-Day Flaw, Emergency Patch Now Available The Hacker News
VS Code Forks Recommend Missing Extensions, Creating Supply Chain Risk in Open VSX VS Code Forks Recommend Missing Extensions, Creating Supply Chain Risk in Open VSX The Hacker News
Adds Device Fingerprinting, PNG Steganography Payloads Adds Device Fingerprinting, PNG Steganography Payloads The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • UK Faces Rising Cyber Threats from Russia, Iran, China
  • Cross-App Permissions: Unseen Risks and Solutions
  • Global SIM Farm Network Reveals 87 Control Panels
  • Mirai Botnet Exploits Vulnerability in Old D-Link Routers
  • Lotus Wiper Threatens Venezuela’s Energy Sector

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • UK Faces Rising Cyber Threats from Russia, Iran, China
  • Cross-App Permissions: Unseen Risks and Solutions
  • Global SIM Farm Network Reveals 87 Control Panels
  • Mirai Botnet Exploits Vulnerability in Old D-Link Routers
  • Lotus Wiper Threatens Venezuela’s Energy Sector

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark