{"id":741,"date":"2026-04-28T14:57:19","date_gmt":"2026-04-28T14:57:19","guid":{"rendered":"https:\/\/thedigitalfortress.us\/?p=741"},"modified":"2026-04-28T14:57:19","modified_gmt":"2026-04-28T14:57:19","slug":"vect-2-0-ransomware-irreversibly-destroys-files-over-131kb-on-windows-linux-esxi","status":"publish","type":"post","link":"https:\/\/thedigitalfortress.us\/?p=741","title":{"rendered":"VECT 2.0 Ransomware Irreversibly Destroys Files Over 131KB on Windows, Linux, ESXi"},"content":{"rendered":"<div id=\"articlebody\">\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEji1Auw0eR5oiVkEiB8JPzjSCaFsUUiAOfNHrcsOzO4DElBB4gbQ20uu3p69nojIkLsgxZOj81fa7fK_dchUAx0WINAGMq3X0VSA7LH_Isc1hPAvls76rdLeSYCn40zw8P2xAikVwxb_pclaNQXER8G7nzPO41LAl0-ELu-i60_RLl7CLCWcC9gGrEC8oXw\/s1700-e365\/vect.gif\" style=\"display: block;  text-align: center; clear: left; float: left;\"><\/a><\/div>\n<p>Threat hunters are warning that the cybercriminal operation known as <strong>VECT 2.0<\/strong> acts more like a wiper than a ransomware due to a critical flaw in its encryption implementation across Windows, Linux, and ESXi variants that renders recovery impossible even for the threat actors.<\/p>\n<p>The fact that VECT&#8217;s locker <a href=\"https:\/\/research.checkpoint.com\/2026\/vect-ransomware-by-design-wiper-by-accident\/\">permanently destroys large files<\/a> rather than encrypting them means even victims who opt to pay the ransom cannot get their data back, as the decryption keys are discarded by the malware during the time encryption occurs.<\/p>\n<p>\u00abVECT is being marketed as ransomware, but for any file over 131KB \u2013 which is most of what enterprises actually care about \u2013 it functions as a data destruction tool,\u00bb Eli Smadja, group manager at Check Point Research, said in a statement shared with The Hacker News.<\/p>\n<p>\u00abCISOs need to understand that in a VECT incident, paying is not a recovery strategy. There is no decrypter that can be handed over, not because the attackers are unwilling, but because the information required to build one was destroyed the moment their software ran. The focus has to be on resilience: offline backups, tested recovery procedures, and rapid containment \u2013 not negotiation.\u00bb<\/p>\n<p><a href=\"https:\/\/www.halcyon.ai\/ransomware-alerts\/emerging-ransomware-group-vect\">VECT<\/a> (now rebranded as VECT 2.0) is a ransomware-as-a-service (RaaS) scheme that first <a href=\"https:\/\/www.cyfirma.com\/news\/weekly-intelligence-report-03-april-2026\/\">launched<\/a> its affiliate program in December 2025. On its dark website, the group displays the message \u00abExfiltration \/ Encryption \/ Extortion,\u00bb highlighting its triple-threat business model.<\/p>\n<p>According to an analysis <a href=\"https:\/\/www.dsci.in\/files\/content\/advisory\/2026\/threat-report-feb-2026.pdf\">published<\/a> by the Data Security Council of India (DSCI) last month, a $250 entry fee, payable in Monero (XMR), is required for new affiliates. The fee is waived for applicants from the Commonwealth of Independent States (CIS) countries, indicating an attempt to recruit individuals from the region.<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/ai-agentic-guide-d-3\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgKLSgj9Smgyqpn4Kj-zAzWxJG1LUku8TpOERMxD6_hmMZQtXRFYXU-NA2ocnjrRafjkLtrxujKRuBstSZ4Il5z6hOu4oa7UM1FjkNoRQqrF5MWlShygYIqpnMGxHX2RHEBh9Y40x-p4PKn3cSlaWTEwKiVBDSoJgLPzR09dmp8HBffLlIqro73HVD30D00\/s728-e100\/nudge-d-3.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>In recent weeks, the group has established a formal partnership with the BreachForums cybercrime marketplace and the TeamPCP hacking group, in a move aimed at further lowering the barrier to entry for ransomware operators and incentivizing affiliates to launch attacks by weaponizing previously stolen data.<\/p>\n<p>\u00abThe convergence of large-scale supply chain credential theft, a maturing RaaS operation, and mass dark web forum mobilization represents an unprecedented model of industrialized ransomware deployment,\u00bb Dataminr noted earlier this month.<\/p>\n<p><a name=\"more\"\/><\/p>\n<p>While the collaboration may be a sign of what&#8217;s to come, its data leak site currently lists only two victims, both of which are said to have been compromised via the TeamPCP supply chain attacks. What&#8217;s more, contrary to the group&#8217;s initial claims of using ChaCha20-Poly1305 <a href=\"https:\/\/developers.google.com\/tink\/aead\">AEAD<\/a> for encryption, Check Point&#8217;s analysis has found that it uses a weaker, unauthenticated cipher with no integrity protection.<\/p>\n<p>But it doesn&#8217;t end there, for the C++-based lockers for all three platforms suffer from a fundamental design flaw that causes any file larger than 131,072 bytes to be permanently and irrecoverably destroyed, as opposed to being encrypted.<\/p>\n<p>\u00abThe malware encrypts four independent chunks of each &#8216;large file&#8217; using four freshly generated random 12-byte nonces, but appends only the final nonce to the specific encrypted file on disk,\u00bb Check Point explained. \u00abThe first three nonces, each required to decrypt its respective chunk, are generated, used, and silently discarded. They are never stored on disk, in the registry, or transmitted to the operator.\u00bb<\/p>\n<p>\u00abBecause ChaCha20-IETF requires both the 32-byte key and the exact matching 12-byte nonce to reverse each chunk, the first three quarters of every large file are unrecoverable by anyone, including the ransomware operator, who cannot provide a working decryption tool even after ransom payment. Since the vast majority of operationally critical files exceed this &#8216;large-size&#8217; threshold, VECT 2.0 functions in practice as a data wiper with a ransomware facade.\u00bb<\/p>\n<p>The Windows version of the ransomware, besides encrypting files across local, removable, and network-accessible storage, features a comprehensive anti-analysis suite targeting 44 specific security and debugging tools, alongside a safe-mode persistence mechanism and multiple remote-execution script templates for lateral spread.<\/p>\n<p>When \u00ab&#8211;force-safemode\u00bb is active, the locker configures the next boot into Windows Safe Mode and writes its own executable path into the Windows Registry so that it&#8217;s automatically run on the subsequent Safe Mode boot, where the operating system is launched in a basic state using a limited set of files and drivers.<\/p>\n<p>On top of that, although the Windows variant implements environment detection mechanisms to fly under the radar, they are never invoked, allowing security teams running the artifacts to avoid triggering any evasive response. The ESXi variant, on the other hand, enforces geofencing and anti-debugging checks prior to commencing the encryption step. It also attempts to move laterally using SSH. The Linux version uses the same codebase as the ESXi flavor and implements a subset of its functionality.<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/fast-response-not-fast-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjgi9mu68zRUz1nCLLKmkAA2aBtNfP_JOTXulZoB6yImso1Onk7oM_LI0kdROu8fq5S5oDyMtd1j50W44Ye_8Sl3zQZiE8A9tmFr6kejGKjGh74uoxluF-RyBq_unDQlzjXZHCqQeuYXBoogda5zf0w-zXd6v0rIM7fEw6TcFf_QGWBu5Mop-djkEaOUa5A\/s728-e100\/tl-d.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>The geofencing step verifies if it&#8217;s running in a CIS country, and if so, exits without encrypting the files. This behavior, per Check Point, is rather unusual as most RaaS programs removed Ukraine from the CIS countries list following Russia&#8217;s military invasion of the country in early 2022.<\/p>\n<p>\u00abDuring recent years these checks have been largely removed from ransomware,\u00bb it added. \u00abVECT including such checks and even adding Ukraine to the list of exclusions is rather uncommon. Check Point Research has two theories regarding this observation: either this code was AI generated, where LLMs were trained with Ukraine being part of CIS or VECT used an old code base for their ransomware.\u00bb<\/p>\n<p>It&#8217;s assessed that the operators of VECT are novice actors rather than experienced threat actors, not to mention the possibility that some chunks of code could have been generated with help from an artificial intelligence (AI) tool.<\/p>\n<p>\u00abVECT 2.0 presents an ambitious threat profile with multi-platform coverage, an active affiliate program, supply-chain distribution via the TeamPCP partnership, and a polished operator panel,\u00bb Check Point concluded. \u00abIn practice, the technical implementation falls significantly short of its presentation.\u00bb<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Threat hunters are warning that the cybercriminal operation known as VECT 2.0 acts more like a wiper than a ransomware due to a critical flaw in its encryption implementation across&hellip;<\/p>\n","protected":false},"author":1,"featured_media":742,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[1453,1452,1454,236,1451,181,93,1450,307],"class_list":["post-741","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-131kb","tag-destroys","tag-esxi","tag-files","tag-irreversibly","tag-linux","tag-ransomware","tag-vect","tag-windows"],"_links":{"self":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/741","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=741"}],"version-history":[{"count":0,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/741\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/media\/742"}],"wp:attachment":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=741"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=741"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=741"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}