<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Venezuela — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/venezuela/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 22 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/venezuela/feed.xml" rel="self" type="application/rss+xml"/><item><title>Lotus Data Wiper Targeting Venezuelan Energy and Utility Firms</title><link>https://feed.craftedsignal.io/briefs/2026-04-lotus-wiper/</link><pubDate>Wed, 22 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-lotus-wiper/</guid><description>The Lotus wiper, a previously undocumented data-wiping malware, was deployed against Venezuelan energy and utilities organizations in 2025, overwriting physical drives, deleting files, and rendering systems unrecoverable.</description><content:encoded><![CDATA[<p>In 2025, a new data wiper malware known as Lotus was used in targeted attacks against Venezuelan energy and utility companies. The malware, discovered by Kaspersky researchers after being uploaded to a public platform in mid-December 2025 from a Venezuelan machine, aims to completely destroy compromised systems. The attacks coincide with a period of geopolitical tension in the region. The malware not only overwrites data but also removes recovery mechanisms, overwrites the content of physical drives, and systematically deletes files across affected volumes, ultimately leaving the system in an unrecoverable state. The attackers used a series of batch scripts to prepare the environment before deploying the final Lotus wiper payload.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial execution of a batch script (<code>OhSyncNow.bat</code>) to disable the Windows <code>UI0Detect</code> service.</li>
<li><code>OhSyncNow.bat</code> performs an XML file check for coordinated execution.</li>
<li>Execution of a second-stage batch script (<code>notesreg.bat</code>) when specific conditions are met.</li>
<li><code>notesreg.bat</code> enumerates users, disables accounts by changing passwords, logs off active sessions, disables all network interfaces, and deactivates cached logins.</li>
<li>The malware enumerates drives and executes <code>diskpart clean all</code> to overwrite drives with zeros.</li>
<li><code>robocopy</code> is used to overwrite directory contents.</li>
<li>The malware calculates free space and uses <code>fsutil</code> to create a file that fills the disk, hindering data recovery.</li>
<li>The batch script decrypts and executes the Lotus wiper, which overwrites physical sectors, clears USN journal entries, and wipes restore points. The final step updates disk properties using <code>IOCTL_DISK_UPDATE_PROPERTIES</code>.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The Lotus wiper attacks against Venezuelan energy and utility firms in 2025 resulted in complete data loss and system unrecoverability. The attacks aimed to disrupt operations by destroying systems and eliminating any possibility of data recovery. While the exact number of affected organizations isn&rsquo;t specified, the impact of such attacks on critical infrastructure can be significant, potentially affecting energy distribution and essential services for the population. The attacks coincide with a period of geopolitical tension, suggesting a potential motive of sabotage or disruption.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor for changes to the NETLOGON share, as this is a potential indicator of compromise (see Overview).</li>
<li>Alert on modifications to the <code>UI0Detect</code> service state using a <code>registry_set</code> Sigma rule to identify potential initial stages of the attack (see Rules).</li>
<li>Implement detection rules to identify the execution of <code>diskpart</code>, <code>robocopy</code>, and <code>fsutil</code> with parameters related to data wiping activities using <code>process_creation</code> Sigma rules (see Rules).</li>
<li>Monitor for mass account changes and disabling of network interfaces, as these are precursor activities (see Overview).</li>
<li>Maintain regular offline backups and validate their restorability frequently to mitigate the impact of data wipers (see Overview).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>data-wiper</category><category>lotus-wiper</category><category>venezuela</category><category>energy</category><category>utilities</category></item></channel></rss>