Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

VECT 2.0 ransomware irreversibly destroys files larger than 131KB on Windows, Linux, and ESXi

Red Hat’s OpenClaw maintainers have made enterprise Claw deployments more secure

Why secure data movement is the Zero Trust bottleneck that no one talks about

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » VECT 2.0 ransomware irreversibly destroys files larger than 131KB on Windows, Linux, and ESXi
Identity

VECT 2.0 ransomware irreversibly destroys files larger than 131KB on Windows, Linux, and ESXi

By April 28, 2026No Comments5 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Threat hunters warn that the cybercrime campaign known as VECT 2.0 acts more like a wiper than a ransomware, as the encryption implementation across Windows, Linux, and ESXi variants has critical flaws that make recovery impossible even for attackers.

The fact that VECT’s locker permanently destroys large files rather than encrypting them means that even victims who choose to pay the ransom are unable to get their data back, as the decryption key is destroyed by the malware while the encryption takes place.

“VECT is marketed as ransomware, but it acts as a data destruction tool for files larger than 131KB, which is most of the files that businesses actually care about,” Eli Smadja, group manager at Check Point Research, said in a statement shared with Hacker News.

“CISOs need to understand that in VECT incidents, payment is not a recovery strategy. The lack of decryption tools to hand over is not because the attacker is unwilling, but because the information needed to build decryption tools is destroyed the moment the software is executed. The focus needs to be on resiliency – offline backups, tested recovery procedures, and rapid containment – not negotiation.”

VECT (now rebranded to VECT 2.0) is a ransomware-as-a-service (RaaS) scheme that first launched its affiliate program in December 2025. On its dark website, the group displays the message “Exfiltration/Encryption/Extortion,” highlighting its triple-threat business model.

According to an analysis released last month by the Data Security Council of India (DSCI), new affiliates are required to pay a $250 joining fee, paid in Monero (XMR). The fee is waived for applicants from Commonwealth of Independent States (CIS) countries, indicating that we are looking to recruit individuals from this region.

In recent weeks, the group has established formal partnerships with cybercrime marketplace BreachForums and hacker group TeamPCP. The aim is to further lower the barrier to entry for ransomware operators and encourage affiliates to launch attacks armed with previously stolen data.

Dataminr noted earlier this month that “the convergence of large-scale supply chain credential theft, maturing RaaS operations, and mass mobilization of dark web forums represents an unprecedented model for industrialized ransomware deployment.”

While this partnership may be a sign of things to come, the company’s data breach site currently only lists two victims, both of which are said to have been compromised by the TeamPCP supply chain attack. Additionally, contrary to the group’s initial claims of using ChaCha20-Poly1305 AEAD for encryption, Check Point’s analysis found that a weaker, unauthenticated cipher with no integrity protection was used.

But that’s not the only problem. C++-based lockers on all three platforms have a fundamental design flaw that causes files larger than 131,072 bytes to be permanently and irretrievably destroyed rather than encrypted.

“The malware encrypts four separate chunks of each ‘big file’ using four newly generated random 12-byte nonces, but only appends the final nonce to a given encrypted file on disk,” Check Point explains. “The first three nonces are required to decrypt each chunk and are generated, used, and silently discarded. They are never stored on disk, in the registry, or sent to the operator.”

“Because ChaCha20-IETF requires both a 32-byte key and an exactly matching 12-byte nonce to undo each chunk, the first three-quarters of every large file is unrecoverable by anyone, including ransomware operators who cannot provide effective decryption tools even after paying the ransom. Because the majority of operationally critical files exceed this ‘large’ threshold, VECT 2.0 actually acts as a data wiper. Ransomware facade. ”

In addition to encrypting files across local, removable, and network-accessible storage, the Windows version of this ransomware features a comprehensive suite of anti-analysis measures targeting 44 specific security and debugging tools, as well as a safe mode persistence mechanism and multiple remote execution script templates for lateral spread.

When “–force-safemode” is active, the locker configures the next boot into Windows Safe Mode and writes its own executable path to the Windows registry so that it runs automatically on subsequent Safe Mode boots. In this case, the operating system is started in a basic state with a limited set of files and drivers.

Additionally, the Windows variant implements under-the-radar environmental detection mechanisms that are never called, allowing security teams running the artifact to avoid triggering evasive responses. ESXi variants, on the other hand, force geofencing and anti-debugging checks before starting the encryption step. I also try to use SSH to navigate laterally. The Linux version uses the same codebase as the ESXi flavor and implements a subset of its features.

The geofencing step checks if it is running in a CIS country and, if so, exits without encrypting the files. Check Point said the move is rather unusual, as most RaaS programs removed Ukraine from their list of CIS countries following Russia’s military invasion in early 2022.

“These checks have been largely removed from ransomware in recent years,” it added. “It is quite unusual for VECT to include such a check and also add Ukraine to its exclusion list. Check Point Research has two theories regarding this observation: either this code was generated by AI, LLM was trained in Ukraine, which is part of the CIS, or VECT used an older codebase of ransomware.”

VECT’s operators are assessed to be novice actors rather than experienced threat actors, not to mention that some of the code may have been generated with the help of artificial intelligence (AI) tools.

“VECT 2.0 offers an ambitious threat profile with multi-platform coverage, an active affiliate program, supply chain delivery via the TeamPCP partnership, and a sophisticated operator panel,” Check Point concluded. “In reality, the technical implementation falls far short of the presentation.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleRed Hat’s OpenClaw maintainers have made enterprise Claw deployments more secure

Related Posts

Why secure data movement is the Zero Trust bottleneck that no one talks about

April 28, 2026

Unpatched critical flaw exposes Hugface LeRobot to uncertified RCE

April 28, 2026

A new handbook for the zero window era

April 28, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

VECT 2.0 ransomware irreversibly destroys files larger than 131KB on Windows, Linux, and ESXi

Red Hat’s OpenClaw maintainers have made enterprise Claw deployments more secure

Why secure data movement is the Zero Trust bottleneck that no one talks about

Unpatched critical flaw exposes Hugface LeRobot to uncertified RCE

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.