Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
VECT 2.0 Ransomware Permanently Destroys Large Files

VECT 2.0 Ransomware Permanently Destroys Large Files

Posted on April 28, 2026 By CWS

Cybersecurity experts are alerting organizations about VECT 2.0, a malicious operation that behaves more like a data wiper than traditional ransomware. Due to a critical flaw in its encryption mechanism, this malware permanently destroys files larger than 131KB on Windows, Linux, and ESXi systems, making recovery impossible even for the attackers themselves.

Ransomware or Data Wiper?

Unlike typical ransomware, VECT 2.0 fails to offer any recovery option for files above 131KB, which are crucial for most enterprises. Victims who opt to pay the ransom find themselves unable to retrieve their data as the ransomware discards necessary decryption keys during the encryption process. Eli Smadja from Check Point Research emphasized that paying a ransom is futile since the decryption information is destroyed immediately as the malware operates.

The ransomware, presented as a RaaS (Ransomware-as-a-Service) model, initially began its affiliate program in December 2025. Advertised as a triple-threat operation on the dark web, it demands a $250 entry fee paid in Monero, except for affiliates from the Commonwealth of Independent States (CIS), aiming to attract recruits from this region.

Partnerships and Technical Flaws

Recently, VECT 2.0 has formed alliances with BreachForums and the TeamPCP hacking group to streamline the entry process for new ransomware operators. This collaboration aims to lower barriers and motivate affiliates by leveraging previously stolen data. However, despite these strategic partnerships, the ransomware’s technical flaws undermine its effectiveness.

Check Point’s analysis reveals that VECT 2.0 uses a weak, unauthenticated cipher rather than the advertised ChaCha20-Poly1305 AEAD. This flaw, combined with the malware’s handling of files larger than 131,072 bytes, results in irreversible data destruction. The implementation of the encryption process discards essential nonces, making the decryption of large files impossible.

Cross-Platform Impact and Operational Challenges

VECT 2.0 targets multiple platforms with distinct strategies. The Windows variant includes anti-analysis measures and a safe-mode persistence mechanism, whereas the ESXi version uses geofencing and anti-debugging checks. Meanwhile, the Linux variant shares a codebase with the ESXi version, supporting only part of its functionality.

Interestingly, the ESXi version exits without encrypting files in CIS countries, including Ukraine, a rarity among RaaS programs post-2022. This behavior suggests potential AI involvement in its code development or reliance on outdated codebases.

In conclusion, while VECT 2.0 presents a formidable threat with its multi-platform reach and affiliate model, its operational efficacy is hindered by significant technical shortcomings. Organizations must prioritize resilience through offline backups and rigorous recovery practices, as traditional negotiation strategies with ransomware operators prove ineffective.

The Hacker News Tags:Check Point Research, Cybercrime, Cybersecurity, data destruction, encryption flaw, ESXi, Linux, Malware, Ransomware, VECT 2.0, Windows

Post navigation

Previous Post: WhatsApp Develops Built-In Cloud Backup with Encryption
Next Post: Chinese Hacker Extradited to US for Cyberattacks

Related Posts

SysAid Patches 4 Critical Flaws Enabling Pre-Auth RCE in On-Premise Version SysAid Patches 4 Critical Flaws Enabling Pre-Auth RCE in On-Premise Version The Hacker News
Tropic Trooper Utilizes Trojanized Software for Cyber Attacks Tropic Trooper Utilizes Trojanized Software for Cyber Attacks The Hacker News
UNC1549 Hacks 34 Devices in 11 Telecom Firms via LinkedIn Job Lures and MINIBIKE Malware UNC1549 Hacks 34 Devices in 11 Telecom Firms via LinkedIn Job Lures and MINIBIKE Malware The Hacker News
XWorm 6.0 Returns with 35+ Plugins and Enhanced Data Theft Capabilities XWorm 6.0 Returns with 35+ Plugins and Enhanced Data Theft Capabilities The Hacker News
First Malicious MCP Server Found Stealing Emails in Rogue Postmark-MCP Package First Malicious MCP Server Found Stealing Emails in Rogue Postmark-MCP Package The Hacker News
AI Skill Exploits and Record DDoS Attack Highlight Cyber Vulnerabilities AI Skill Exploits and Record DDoS Attack Highlight Cyber Vulnerabilities The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Enterprises Combat AI Threats with Autonomous Solutions
  • LiteLLM SQL Injection Threat Exposes Critical Data
  • Webinar on AI Governance: Ensuring Safe Adoption
  • Windows Vulnerability Exploited by Russian Group
  • Chinese Hacker Extradited to US for Cyberattacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Enterprises Combat AI Threats with Autonomous Solutions
  • LiteLLM SQL Injection Threat Exposes Critical Data
  • Webinar on AI Governance: Ensuring Safe Adoption
  • Windows Vulnerability Exploited by Russian Group
  • Chinese Hacker Extradited to US for Cyberattacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark