CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

VECT 2.0 Ransomware Operation Degrades to Irreversible Data Destruction Due to Critical Encryption Flaw

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

A newly observed variant of the VECT ransomware (VECT 2.0) irretrievably destroys files larger than 131KB on Windows, Linux, and ESXi systems due to a fundamental design flaw in its encryption implementation. The flaw causes the malware to discard critical decryption metadata (nonces) for 75% of affected files, rendering recovery impossible regardless of ransom payment. Security researchers characterize the operation as a data wiper masquerading as ransomware, emphasizing that negotiating with threat actors offers no recovery path. VECT 2.0 operates as a ransomware-as-a-service (RaaS) scheme with a $250 Monero entry fee (waived for Commonwealth of Independent States affiliates) and has formed partnerships with BreachForums and TeamPCP to facilitate data exfiltration and affiliate recruitment.

Timeline

  1. 28.04.2026 17:01 1 articles · 3h ago

    VECT 2.0 Ransomware Variant Fails as Encryption Tool, Acts as Irreversible Data Wiper

    Analysis reveals VECT 2.0 irretrievably destroys files exceeding 131KB due to discarded decryption nonces during encryption, eliminating recovery options. The Windows variant includes anti-analysis, safe-mode persistence, and lateral movement features, while ESXi/Linux variants share code and enforce CIS geofencing exclusions. The RaaS operation, priced at $250 Monero for affiliates, has partnered with BreachForums and TeamPCP.

    Show sources

Information Snippets