Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
DDoS Attack Hits Ubuntu Website & Canonical Web Services
May 1, 2026
Ransomware Victims Jump to 7,831 as AI Crime Tools Scale Global
May 1, 2026
Deep#Door Stealer Harvests Passwords, Cloud Browser Tokens
May 1, 2026
Home/Threats/New VECT 2.0 Ransomware Destroys Files Over 128 KB Across Windows,
Threats

New VECT 2.0 Ransomware Destroys Files Over 128 KB Across Windows,

The cybersecurity community is closely monitoring a new ransomware strain named VECT 2.0. This variant isn’t just encrypting files; it’s designed with a critical flaw that causes...

Sarah simpson
Sarah simpson
April 29, 2026 4 Min Read
0 0

The cybersecurity community is closely monitoring a new ransomware strain named VECT 2.0. This variant isn’t just encrypting files; it’s designed with a critical flaw that causes permanent data destruction. Specifically, it destroys any file larger than 128 KB across compromised Windows systems. Its highly damaging operational method represents a concerning evolution in ransomware attacks.

Unlike typical ransomware that locks files and demands payment for decryption, VECT 2.0 permanently destroys any file larger than 128 KB, making recovery impossible even if a victim pays the ransom.

VECT Ransomware first appeared in December 2025 on a Russian-language cybercrime forum, operating as a Ransomware-as-a-Service (RaaS) program.

The group claimed its first two victims in January 2026 and released version 2.0 in February 2026, expanding its reach across Windows, Linux, and VMware ESXi systems.

The malware gained more visibility in March 2026 when VECT announced a partnership with TeamPCP, a threat actor behind supply-chain attacks that injected malware into widely-used packages including Trivy, Checkmarx KICS, LiteLLM, and Telnyx, affecting a large number of downstream users.

Check Point Research analysts identified and analyzed all three VECT 2.0 variants after gaining access to the builder panel through a BreachForums account.

Their investigation uncovered that VECT also entered a partnership with BreachForums itself, giving every registered forum member free access to deploy the ransomware as an affiliate.

This open-affiliate model removes the usual vetting process, significantly lowering the barrier for less experienced attackers to join the operation.

Partnership release page on BreachForums (Source - Check Point)
Partnership release page on BreachForums (Source – Check Point)

The ransomware is written in C++ and targets all three platforms through statically compiled executables that share a common codebase.

Each variant uses the ChaCha20-IETF (RFC 8439) cipher via the libsodium cryptographic library and renames encrypted files with the .vect extension, dropping a ransom note named !!!READ_ME!!!.txt on each compromised system.

Despite its polished builder panel, the technical execution falls well short of a professionally developed ransomware tool.

VECT builder panel (Source - Check Point)
VECT builder panel (Source – Check Point)

The most alarming aspect of VECT 2.0 is a critical coding flaw that effectively turns it into a data wiper.

Any file exceeding 131,072 bytes (128 KB) is not properly encrypted but instead rendered permanently unrecoverable, targeting the very assets organizations depend on to keep operations running.

The Nonce-Handling Flaw That Destroys Large Files

At the heart of the problem is a fundamental error in how VECT 2.0 handles cryptographic nonces during file encryption.

When the malware processes a large file, it divides it into four chunks and encrypts each one using a freshly generated, random 12-byte nonce.

All four encryption calls write their nonces into the same shared memory buffer, meaning each new nonce overwrites the previous one.

By the time encryption finishes, only the nonce from the fourth and final chunk survives and gets written to the encrypted file on disk.

Large file processing, 4 chunks encrypted with 4 unique nonces, single nonce appended at EOF (Source - Check Point)
Large file processing, 4 chunks encrypted with 4 unique nonces, single nonce appended at EOF (Source – Check Point)

Since ChaCha20-IETF decryption requires both the encryption key and the exact matching nonce to reverse each chunk, the first three quarters of every large file are unrecoverable by anyone.

The discarded nonces are never saved on disk, stored in the registry, or sent to the attacker’s server in any of the three variants. Even if a victim pays the ransom in full, the operator cannot provide a working decryptor because the nonces required for decryption were permanently lost the moment the buffer was overwritten.

At just 128 KB, this threshold captures virtually every meaningful file type, from VM disk images and databases to backups, spreadsheets, and email archives.

Encryption flaw, ESXi version (Source - Check Point)
Encryption flaw, ESXi version (Source – Check Point)

Check Point Research confirmed this flaw is present in all three platform variants and predates the 2.0 release, having existed in earlier deployments without ever being fixed.

Organizations should keep offline, air-gapped backups that cannot be reached through network shares or lateral movement.

Monitoring for bulk process terminations, sudden shadow copy deletions, and mass file renaming to the .vect extension can provide early warning of an active infection.

Given VECT’s partnership with TeamPCP, validating the integrity of third-party software dependencies is also a critical step.

Security teams should watch for PowerShell-based disabling of Windows Defender, event log clearing activity, and unusual safe-mode boot configuration changes, all of which are key behavioral indicators of this ransomware.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackBreachCybersecurityMalwareransomwareSecurityThreat

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

BlueNoroff Campaign Uses Fileless PowerShell & AI-Generated Zoom

Next Post

New Vect 2.0 RaaS Operation Targets Windows, Linux, and ESXi Systems

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Critical Wireshark Flaws Allow Code Execution via Malformed
May 1, 2026
Anthropic Launches Claude Security Beta for Enterprise
May 1, 2026
Human-Centric
Beyond the Click: A Human-Centric Approach to Phishing Defense
April 30, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us