VECT 2.0 Ransomware Flaw Turns It Into a Data Wiper, Destroying Files Permanently
Cybersecurity researchers have identified a critical flaw in VECT 2.0, a Ransomware-as-a-Service (RaaS) operation, that renders victim data permanently unrecoverable even after paying the ransom. Unlike traditional ransomware, which encrypts files for extortion, VECT 2.0 destroys files larger than 128 KB due to a cryptographic error, effectively functioning as a data wiper.
The Fatal Flaw: How VECT 2.0 Fails at Encryption
VECT 2.0 uses the ChaCha20-IETF cipher across its Windows, Linux, and VMware ESXi variants. However, a coding mistake causes the malware to overwrite encryption nonces in memory. For files exceeding 131,072 bytes (128 KB), the ransomware splits data into four chunks, each requiring a unique nonce. Due to the flaw, only the final nonce is retained, making decryption of the first three chunks mathematically impossible even for the attackers.
Enterprise databases, virtual machine disks, and standard office documents most of which exceed 128 KB are irreversibly corrupted. Researchers initially misidentified the cipher as ChaCha20-Poly1305 AEAD, but confirmed the malware lacks integrity protection or authentication tags, further complicating recovery efforts.
Multi-Platform Threat: Enterprise-Wide Destruction
Despite amateur coding errors such as an aggressive thread scheduler that slows encryption and self-canceling obfuscation VECT 2.0 poses a severe risk to enterprise networks. The malware targets multiple platforms in coordinated attacks:
- Windows: Manipulates Safe Mode boot settings to disable security tools, then spreads laterally via SMB and WinRM.
- Linux: Wipes system logs and targets enterprise file servers.
- VMware ESXi: Disables hypervisor monitoring services and destroys virtual machine disk files.
Threat Actor Alliances Expand Attack Surface
VECT 2.0 has formed strategic partnerships with major cybercrime groups, amplifying its reach:
- BreachForums: All forum members are now automatic affiliates, granting VECT a vast distribution network.
- TeamPCP: A threat actor known for supply chain attacks on developer tools like Trivy and Checkmarx KICS, providing VECT with a direct pipeline to exploit downstream consumers.
With no possibility of data recovery, organizations face total data loss if infected. The flaw underscores the growing trend of ransomware evolving into destructive wipers, shifting the focus from extortion to outright sabotage.
Source: https://cyberpress.org/vect-2-0-multi-platform-threat/
VECT 2.0 TPRM report: https://www.rankiteo.com/company/vectra_ai
"id": "vec1777466071",
"linkid": "vectra_ai",
"type": "Ransomware",
"date": "4/2026",
"severity": "100",
"impact": "5",
"explanation": "Attack threatening the organization's existence"
{'affected_entities': [{'type': ['Enterprises',
'Organizations using Windows/Linux/VMware '
'ESXi']}],
'attack_vector': ['SMB',
'WinRM',
'Supply Chain Attacks (via TeamPCP)',
'BreachForums Affiliates'],
'data_breach': {'data_encryption': 'ChaCha20-IETF (flawed implementation)',
'file_types_exposed': ['Databases',
'VM disks',
'Office files'],
'sensitivity_of_data': 'High (irreversible destruction)',
'type_of_data_compromised': ['Enterprise databases',
'Virtual machine disks',
'Office documents']},
'description': 'Cybersecurity researchers have identified a critical flaw in '
'VECT 2.0, a Ransomware-as-a-Service (RaaS) operation, that '
'renders victim data permanently unrecoverable even after '
'paying the ransom. Unlike traditional ransomware, VECT 2.0 '
'destroys files larger than 128 KB due to a cryptographic '
'error, effectively functioning as a data wiper. The flaw '
'causes the malware to overwrite encryption nonces, making '
'decryption of files exceeding 128 KB mathematically '
'impossible. The ransomware targets Windows, Linux, and VMware '
'ESXi systems, corrupting enterprise databases, virtual '
'machine disks, and standard office documents.',
'impact': {'brand_reputation_impact': 'Severe (permanent data loss, inability '
'to recover files)',
'data_compromised': 'Permanent destruction of files >128 KB '
'(enterprise databases, VM disks, office '
'documents)',
'operational_impact': 'Irreversible data loss, potential '
'enterprise-wide system corruption',
'systems_affected': ['Windows', 'Linux', 'VMware ESXi']},
'initial_access_broker': {'entry_point': ['Supply chain attacks (TeamPCP)',
'BreachForums affiliates'],
'high_value_targets': ['Enterprise file servers',
'VMware ESXi hypervisors']},
'lessons_learned': 'Ransomware can evolve into destructive wipers due to '
'coding flaws, emphasizing the need for robust backup '
'strategies and multi-layered security defenses. The flaw '
'in VECT 2.0 highlights the risks of amateurish malware '
'development in RaaS operations.',
'motivation': ['Sabotage',
'Extortion (though ineffective due to flaw)',
'Data Destruction'],
'post_incident_analysis': {'corrective_actions': ['Patch or replace flawed '
'ransomware variants',
'Implement multi-layered '
'security to detect and '
'block wiper malware',
'Enforce strict backup '
'policies for critical '
'data'],
'root_causes': ['Cryptographic flaw in '
'ChaCha20-IETF implementation '
'(nonce overwriting)',
'Aggressive thread scheduler '
'causing inefficient encryption',
'Lack of integrity protection or '
'authentication tags']},
'ransomware': {'data_encryption': 'Yes (flawed, irreversible for files >128 '
'KB)',
'ransomware_strain': 'VECT 2.0'},
'recommendations': ['Implement immutable backups to protect against data '
'wipers',
'Enforce network segmentation to limit lateral movement',
'Monitor for unusual activity in Safe Mode boot settings '
'(Windows)',
'Enhance security for VMware ESXi hypervisors',
'Educate employees on supply chain attack risks (e.g., '
'compromised developer tools)'],
'references': [{'source': 'Cybersecurity Research Report'}],
'threat_actor': ['VECT 2.0 (RaaS)', 'TeamPCP', 'BreachForums Affiliates'],
'title': 'VECT 2.0 Ransomware Flaw Turns It Into a Data Wiper, Destroying '
'Files Permanently',
'type': 'Ransomware (Data Wiper)',
'vulnerability_exploited': 'Cryptographic flaw in ChaCha20-IETF cipher '
'implementation (nonce overwriting)'}