Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
VECT 2.0 Ransomware Permanently Destroys Large Files

VECT 2.0 Ransomware Permanently Destroys Large Files

Posted on April 28, 2026 By CWS

Cybersecurity experts are alerting organizations about VECT 2.0, a malicious operation that behaves more like a data wiper than traditional ransomware. Due to a critical flaw in its encryption mechanism, this malware permanently destroys files larger than 131KB on Windows, Linux, and ESXi systems, making recovery impossible even for the attackers themselves.

Ransomware or Data Wiper?

Unlike typical ransomware, VECT 2.0 fails to offer any recovery option for files above 131KB, which are crucial for most enterprises. Victims who opt to pay the ransom find themselves unable to retrieve their data as the ransomware discards necessary decryption keys during the encryption process. Eli Smadja from Check Point Research emphasized that paying a ransom is futile since the decryption information is destroyed immediately as the malware operates.

The ransomware, presented as a RaaS (Ransomware-as-a-Service) model, initially began its affiliate program in December 2025. Advertised as a triple-threat operation on the dark web, it demands a $250 entry fee paid in Monero, except for affiliates from the Commonwealth of Independent States (CIS), aiming to attract recruits from this region.

Partnerships and Technical Flaws

Recently, VECT 2.0 has formed alliances with BreachForums and the TeamPCP hacking group to streamline the entry process for new ransomware operators. This collaboration aims to lower barriers and motivate affiliates by leveraging previously stolen data. However, despite these strategic partnerships, the ransomware’s technical flaws undermine its effectiveness.

Check Point’s analysis reveals that VECT 2.0 uses a weak, unauthenticated cipher rather than the advertised ChaCha20-Poly1305 AEAD. This flaw, combined with the malware’s handling of files larger than 131,072 bytes, results in irreversible data destruction. The implementation of the encryption process discards essential nonces, making the decryption of large files impossible.

Cross-Platform Impact and Operational Challenges

VECT 2.0 targets multiple platforms with distinct strategies. The Windows variant includes anti-analysis measures and a safe-mode persistence mechanism, whereas the ESXi version uses geofencing and anti-debugging checks. Meanwhile, the Linux variant shares a codebase with the ESXi version, supporting only part of its functionality.

Interestingly, the ESXi version exits without encrypting files in CIS countries, including Ukraine, a rarity among RaaS programs post-2022. This behavior suggests potential AI involvement in its code development or reliance on outdated codebases.

In conclusion, while VECT 2.0 presents a formidable threat with its multi-platform reach and affiliate model, its operational efficacy is hindered by significant technical shortcomings. Organizations must prioritize resilience through offline backups and rigorous recovery practices, as traditional negotiation strategies with ransomware operators prove ineffective.

The Hacker News Tags:Check Point Research, Cybercrime, Cybersecurity, data destruction, encryption flaw, ESXi, Linux, Malware, Ransomware, VECT 2.0, Windows

Post navigation

Previous Post: WhatsApp Develops Built-In Cloud Backup with Encryption
Next Post: Chinese Hacker Extradited to US for Cyberattacks

Related Posts

PUBLOAD and Pubshell Malware Used in Mustang Panda’s Tibet-Specific Attack PUBLOAD and Pubshell Malware Used in Mustang Panda’s Tibet-Specific Attack The Hacker News
Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation The Hacker News
North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels The Hacker News
Hackers Breach Toptal GitHub, Publish 10 Malicious npm Packages With 5,000 Downloads Hackers Breach Toptal GitHub, Publish 10 Malicious npm Packages With 5,000 Downloads The Hacker News
Chinese Hackers Use Anthropic’s AI to Launch Automated Cyber Espionage Campaign Chinese Hackers Use Anthropic’s AI to Launch Automated Cyber Espionage Campaign The Hacker News
FreePBX Patches Critical SQLi, File-Upload, and AUTHTYPE Bypass Flaws Enabling RCE FreePBX Patches Critical SQLi, File-Upload, and AUTHTYPE Bypass Flaws Enabling RCE The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Webinar on AI Governance: Ensuring Safe Adoption
  • Windows Vulnerability Exploited by Russian Group
  • Chinese Hacker Extradited to US for Cyberattacks
  • VECT 2.0 Ransomware Permanently Destroys Large Files
  • WhatsApp Develops Built-In Cloud Backup with Encryption

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Webinar on AI Governance: Ensuring Safe Adoption
  • Windows Vulnerability Exploited by Russian Group
  • Chinese Hacker Extradited to US for Cyberattacks
  • VECT 2.0 Ransomware Permanently Destroys Large Files
  • WhatsApp Develops Built-In Cloud Backup with Encryption

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark