VECT 2.0 ransomware destroys large files instead of encrypting them


A newly analyzed ransomware strain called VECT 2.0 can permanently destroy large files instead of encrypting them in a recoverable way. Check Point Research found that any file larger than 131,072 bytes, or 128 KB, loses critical decryption data during encryption.

The bug affects VECT’s Windows, Linux, and VMware ESXi variants. This means organizations hit by the malware may not be able to restore most business-critical files even if they pay the ransom.

The issue turns VECT 2.0 into an accidental data wiper. It still presents itself as ransomware, drops ransom notes, and renames files with the .vect extension, but its encryption design makes many affected files unrecoverable.

What happened

Check Point Research analyzed VECT 2.0 after accessing its ransomware builder panel through BreachForums. The researchers reviewed the Windows, Linux, and ESXi payloads and found that all three share the same flawed encryption engine.

VECT first appeared in December 2025 as a ransomware-as-a-service operation on a Russian-language cybercrime forum. The group claimed its first victims in January 2026 and released version 2.0 in February 2026.

The operation later gained more attention after announcing partnerships with TeamPCP and BreachForums. TeamPCP has been linked to supply chain attacks affecting software packages such as Trivy, Checkmarx KICS, LiteLLM, and Telnyx.

At a glance

ItemDetails
Ransomware nameVECT 2.0
Operation typeRansomware-as-a-Service
First observedDecember 2025
Version 2.0 releaseFebruary 2026
Affected platformsWindows, Linux, and VMware ESXi
File extension.vect
Ransom note!!!READ_ME!!!.txt
Crypto librarylibsodium
CipherChaCha20-IETF
Critical flawMissing nonces for files over 128 KB
Main impactLarge files become unrecoverable

Why VECT 2.0 destroys files

The problem sits in VECT’s nonce-handling logic. A nonce is a value that encryption systems need alongside the key to decrypt data correctly.

Partnership release page on BreachForums (Source – Check Point)

When VECT processes a file larger than 128 KB, it splits the file into four chunks. It then encrypts each chunk with a fresh random 12-byte nonce.

The mistake happens because the ransomware writes all four nonces into the same shared memory location. Each new nonce overwrites the one before it, so only the final nonce survives and gets written to disk.

Why paying cannot recover large files

ChaCha20-IETF needs the correct nonce for each encrypted chunk. Since VECT keeps only the fourth nonce, the first three chunks of a large file cannot be decrypted.

The missing nonces do not stay on the disk, in the registry, or on the attacker’s server. Once the encryption finishes, the data needed to restore the first three quarters of the file no longer exists.

This means the attacker cannot provide a working decryptor for most large files. Payment does not solve the technical problem because the ransomware destroyed the information required for recovery.

How the encryption flaw works

StepWhat VECT doesWhy it breaks recovery
1Finds a file larger than 128 KBMost business files meet this threshold
2Splits the file into four chunksEach chunk needs its own nonce for decryption
3Generates a random nonce for each chunkThe nonces must be saved to recover the file
4Writes all nonces into one shared bufferEach new nonce overwrites the previous nonce
5Saves only the last nonce to the encrypted fileThe first three chunks become unrecoverable

Why the 128 KB threshold matters

A 128 KB threshold is extremely small for modern business data. Many routine documents, spreadsheets, PDFs, images, archives, mailboxes, and database files exceed that size.

Large file processing, 4 chunks encrypted with 4 unique nonces, single nonce appended at EOF (Source – Check Point)

For enterprises, the damage can be severe. VM disk images, backups, database exports, project files, accounting records, and email archives usually sit well above 128 KB.

That means VECT does not just damage a narrow set of files. It can destroy the data organizations most need to restore operations after an attack.

Platforms affected

PlatformVariant typeImpact
WindowsPE64 executableTargets local, removable, and network-accessible storage
LinuxELF64 executableTargets Linux file systems and server workloads
VMware ESXiELF64 executableTargets virtualized environments and VM-related files

A polished panel with weak code

VECT presents itself as a professional ransomware operation. Its builder panel lets affiliates create payloads for multiple platforms, and the group markets itself through cybercrime forums.

Check Point Research found a different reality inside the code. The same encryption flaw appears across all three variants, which suggests the operators reused one flawed engine across Windows, Linux, and ESXi.

Researchers also found other design problems, including ignored encryption speed options and broken anti-analysis features. These flaws make VECT look less mature than its branding suggests.

TeamPCP and BreachForums partnerships

VECT became more visible after it announced a partnership with TeamPCP, the threat actor linked to recent supply chain attacks. The stated goal was to use access from those attacks as a launchpad for ransomware operations.

The group also partnered with BreachForums. Check Point Research said the arrangement gave registered forum members access to the ransomware platform, negotiation system, and leak site.

This open-affiliate model lowers the barrier for attackers. Less experienced operators can attempt ransomware attacks without building their own malware or infrastructure.

Why defenders should still take VECT seriously

VECT’s broken encryption does not make it harmless. The malware can still disrupt operations, damage systems, rename files, delete recovery options, and support extortion through stolen data.

The group’s partnerships also matter. A future version could fix the nonce bug while keeping the same affiliate network and distribution channels.

Encryption flaw, ESXi version (Source – Check Point)

Organizations should treat VECT as both a ransomware threat and a destructive malware risk. Recovery planning should focus on containment, clean backups, and verified restoration, not ransom negotiation.

  • Do not rely on ransom payment as a recovery plan for VECT incidents.
  • Maintain offline and immutable backups that attackers cannot reach.
  • Test backup restoration regularly, including VM and database recovery.
  • Monitor for mass file renaming to the .vect extension.
  • Watch for ransom notes named !!!READ_ME!!!.txt.
  • Investigate sudden shadow copy deletion or backup tampering.
  • Monitor for bulk process termination before encryption activity.
  • Block lateral movement paths from compromised endpoints.
  • Validate software dependencies because of VECT’s TeamPCP connection.

Behavior security teams should monitor

Security teams should watch for rapid file renaming, unusual encryption activity, and mass changes across network shares. These actions can signal an active ransomware event.

On Windows systems, teams should also monitor for PowerShell commands that disable security tools, clear event logs, change boot options, or interfere with recovery settings.

For ESXi environments, administrators should watch for suspicious ELF binaries, unexpected datastore access, and changes to VM-related files. ESXi recovery can become difficult if VMDK files exceed the 128 KB threshold, which they almost always do.

VECT defender checklist

AreaWhat to check
FilesLook for the .vect extension and !!!READ_ME!!!.txt
BackupsConfirm offline, immutable, and tested recovery copies exist
Windows endpointsReview PowerShell activity, Defender tampering, and event log clearing
ESXi hostsCheck for suspicious binaries and VM file modification spikes
Network sharesMonitor for bulk encryption and mass file renaming
Supply chainValidate packages and credentials linked to TeamPCP-related incidents
Incident responseIsolate affected systems quickly and preserve forensic evidence

Why this matters

VECT 2.0 shows that ransomware can fail in ways that make incidents even worse for victims. In this case, the operators built a tool that cannot reliably decrypt the files it damages.

The risk extends beyond one ransomware family. Open affiliate models and supply chain partnerships can give flawed malware a larger reach than its technical quality deserves.

For companies, the lesson is direct. Prevention, segmentation, offline backups, and tested recovery procedures matter more than ransom negotiations when ransomware behaves like a wiper.

FAQ

What is VECT 2.0?

VECT 2.0 is a ransomware-as-a-service operation that targets Windows, Linux, and VMware ESXi systems.

Why does VECT 2.0 act like a wiper?

VECT mishandles encryption nonces for files larger than 128 KB. It saves only the last nonce, making the first three chunks of each large file unrecoverable.

Can victims recover files after paying the ransom?

For large files, payment will not help. The attacker cannot provide a working decryptor because the missing nonces no longer exist.

Which platforms does VECT target?

VECT 2.0 has variants for Windows, Linux, and VMware ESXi.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages