← Back to Pulse Feed
PULSE DETAIL
A highly targeted destructive wiper campaign dubbed 'Lotus Wiper' was discovered targeting the energy and utilities sector in Venezuela during late 2025 and early 2026. The attack begins with batch scripts coordinating execution across networks using domain shares as trigger mechanisms. These scripts disable security services, lock out users, and prepare the environment for the final payload. The Lotus Wiper systematically destroys data by wiping physical drives with zeros, deleting restore points, clearing USN journals, and recursively deleting files. Unlike ransomware, this wiper has no financial motivation or ransom demands, designed purely for data destruction. Evidence suggests attackers maintained long-term domain access prior to the attack, with the wiper compiled months before deployment. The malware targets older Windows systems and uses legitimate system tools like diskpart, robocopy, and fsutil.
MITRE ATT&CK & Malware Families
Indicators of Compromise (3)
| TYPE | INDICATOR | DESCRIPTION | CREATED | |
|---|---|---|---|---|
| FileHash-MD5 | 0b83ce69d16f5ecd00f4642deb3c5895 | — | 2026-04-21 | |
| FileHash-MD5 | b41d0cd22d5b3e3bdb795f81421a11cb | — | 2026-04-21 | |
| FileHash-MD5 | c6d0f67db6a7dbf1f9394d98c1e13670 | — | 2026-04-21 |
References (1)