Skip to content
.ca
6 mincritical

VECT: Ransomware by design, Wiper by accident

VECT 2.0 is a cross-platform (Windows, Linux, ESXi) Ransomware-as-a-Service that effectively functions as a wiper due to a critical cryptographic implementation flaw. Files larger than 128 KB are encrypted in chunks using raw ChaCha20-IETF, but the malware fails to save the required nonces for the first three chunks, rendering full data recovery impossible even if the ransom is paid.

Sens:ImmediateConf:highAnalyzed:2026-04-28reports

Authors: Check Point Research

ActorsVECT Ransomware GroupTeamPCPBreachForums

Source:Check Point

Detection / Hunter

What Happened

The VECT 2.0 ransomware is a malicious program designed to lock computer files and demand payment, but a severe programming mistake actually causes it to permanently destroy most files instead. It affects Windows, Linux, and virtual machine servers, meaning a wide range of businesses and individuals are at risk of unrecoverable data loss. Because the attackers themselves cannot restore the destroyed files, paying the ransom will not help victims get their data back. Organizations should focus on strong backups and preventative security measures to block the initial infection.

Key Takeaways

  • VECT 2.0 ransomware permanently destroys files larger than 128 KB due to a critical flaw that discards decryption nonces, effectively making it a wiper.
  • The malware uses raw ChaCha20-IETF without authentication, contradicting public reports of ChaCha20-Poly1305 AEAD usage.
  • Windows, Linux, and ESXi variants share a single flawed codebase with identical encryption logic and file-size thresholds.
  • VECT operators partnered with TeamPCP and BreachForums to distribute the ransomware to affiliates and exploit supply-chain attack victims.
  • The ransomware exhibits amateur coding practices, including unreachable anti-analysis routines, self-canceling string obfuscation, and performance-degrading thread scheduling.

Affected Systems

  • Windows
  • Linux
  • VMware ESXi
  • Oracle VirtualBox
  • libvirt / KVM / QEMU
  • Xen Hypervisor

Attack Chain

VECT 2.0 gains access to environments, potentially leveraging supply chain compromises via the TeamPCP partnership. Upon execution, the Windows variant can force a safe-mode reboot for evasion, while Linux/ESXi variants terminate security and virtualization services. The malware spreads laterally using SSH keys (Linux/ESXi) or Windows protocols (WMI, SMB). Finally, it encrypts files using ChaCha20-IETF, appending the .vect extension and dropping ransom notes, though a cryptographic flaw permanently destroys files over 128 KB.

Detection Availability

  • YARA Rules: No
  • Sigma Rules: No
  • Snort/Suricata Rules: No
  • KQL Queries: No
  • Splunk SPL Queries: No
  • EQL Queries: No
  • Other Detection Logic: No

The article does not provide specific detection rules, but it includes comprehensive IOCs such as file hashes, command lines, and targeted services that can be used to build custom detections.

Detection Engineering Assessment

EDR Visibility: High — The malware executes highly visible commands (vssadmin, bcdedit, esxcli), drops specific ransom notes, and exhibits aggressive file I/O behavior during encryption. Network Visibility: Medium — Lateral movement via SSH or Windows protocols (SMB, WMI) can be detected, but the encryption itself is local. Detection Difficulty: Moderate — While the malware attempts to clear logs and disable defenses, its noisy execution (excessive thread spawning, hardcoded command lines) provides ample detection opportunities before encryption completes.

Required Log Sources

  • Process Creation (Event ID 4688)
  • PowerShell Operational Logs
  • Linux Syslog / Auditd
  • ESXi Shell Logs

Hunting Hypotheses

HypothesisTelemetryATT&CK StageFP Risk
Look for processes executing bcdedit to modify safe boot configurations, followed by registry modifications to service load paths.Process Creation, Registry ModificationsDefense EvasionLow
Monitor for rapid, sequential execution of esxcli commands disabling firewall rulesets and health monitoring services on ESXi hosts.ESXi Shell LogsDefense EvasionLow
Detect excessive thread creation (e.g., >40 threads) by a single unknown process accompanied by high volume file modifications renaming files to .vect.EDR Process/Thread Events, File System EventsImpactLow

Control Gaps

  • Safe mode execution bypasses many standard EDR agents
  • ESXi environments often lack robust endpoint monitoring compared to Windows

Key Behavioral Indicators

  • Execution of vssadmin to delete shadow copies
  • Creation of !!!READ_ME!!!.txt in multiple directories
  • SSH connections to multiple internal hosts using harvested keys

False Positive Assessment

  • Low

Recommendations

Immediate Mitigation

  • Block execution of known VECT 2.0 file hashes.
  • Isolate infected hosts immediately to prevent lateral movement via SSH or SMB.
  • Do not pay the ransom, as files over 128 KB are permanently destroyed and cannot be recovered.

Infrastructure Hardening

  • Restrict SSH access between internal hosts and implement strict key management.
  • Harden ESXi hypervisors by restricting access to the management interface and disabling unnecessary services.
  • Implement robust, offline, and immutable backups for all critical data.

User Protection

  • Deploy EDR solutions capable of detecting safe-mode persistence mechanisms.
  • Ensure anti-malware solutions are configured to block unauthorized modification of boot configurations (bcdedit).

Security Awareness

  • Educate incident response teams that VECT 2.0 acts as a wiper, altering recovery strategies from decryption to full restoration from backups.

MITRE ATT&CK Mapping

  • T1485 - Data Destruction
  • T1486 - Data Encrypted for Impact
  • T1562.001 - Impair Defenses: Disable or Modify Tools
  • T1562.009 - Impair Defenses: Safe Mode Boot
  • T1070.004 - Indicator Removal: File Deletion
  • T1070.001 - Indicator Removal: Clear Windows Event Logs
  • T1021.004 - Remote Services: SSH
  • T1082 - System Information Discovery

Additional IOCs

  • File Hashes:
    • 58e17dd61d4d55fa77c7f2dd28dd51875b0ce900c1e43b368b349e65f27d6fdd (SHA256) - VECT 2.0 ESXi variant executable
    • 9c745f95a09b37bc0486bf0f92aad4a3d5548a939c086b93d6235d34648e683f (SHA256) - VECT 2.0 Windows variant executable
    • e512d22d2bd989f35ebaccb63615434870dc0642b0f60e6d4bda0bb89adee27a (SHA256) - VECT 2.0 Windows variant executable
  • File Paths:
    • !!!READ_ME!!!.txt - Ransom note dropped by all variants
    • dvm3_wall.bmp - Desktop wallpaper replacement dropped by the Windows variant
    • /etc/profile.d/vector_notice.sh - Shell script displaying the ransom note on login for Linux/ESXi variants
  • Command Lines:
    • Purpose: Force the system to boot into minimal safe mode for evasion | Tools: bcdedit.exe | Stage: Defense Evasion | bcdedit /set {default} safeboot minimal
    • Purpose: Delete volume shadow copies to prevent file recovery | Tools: vssadmin.exe | Stage: Impact | vssadmin delete shadows /all /quiet
    • Purpose: Clear Windows event logs to remove forensic evidence | Tools: wevtutil.exe | Stage: Defense Evasion | wevtutil cl
    • Purpose: Disable the ESXi network firewall | Tools: esxcli | Stage: Defense Evasion | esxcli network firewall set --enabled false
  • Other:
    • .vect - File extension appended to encrypted files