VECT 2.0 Ransomware Irreversibly Destroys Files Over 131KB on Windows, Linux, ESXi
嗯,用户让我用中文总结这篇文章,控制在一百个字以内,而且不需要用“文章内容总结”这样的开头。好的,首先我得仔细阅读这篇文章,理解它的主要内容。 文章主要讲的是一个名为VECT 2.0的网络犯罪活动,它实际上更像是一个擦除器而不是传统的勒索软件。因为它的加密实现存在重大缺陷,在Windows、Linux和ESXi系统中都无法恢复数据,即使支付赎金也没用。这主要是因为加密过程中丢弃了必要的解密密钥。 接下来,文章提到VECT 2.0作为勒索软件即服务(RaaS)的模式,虽然声称使用ChaCha20-Poly1305加密,但实际上使用的是较弱的加密方式,并且存在根本性的设计缺陷,导致大文件被永久删除。此外,VECT 2.0还与一些网络犯罪市场合作,进一步降低了攻击门槛。 总结下来,VECT 2.0虽然看起来像勒索软件,但实际上更像一个数据破坏工具。对于企业来说,备份和快速响应是关键。 现在我需要把这些要点浓缩到100字以内。首先说明VECT 2.0的性质和问题:它作为勒索软件即服务存在重大缺陷,无法恢复数据。然后提到其合作和加密问题:与犯罪市场合作,并使用弱加密。最后强调它更像是擦除器而非勒索软件。 这样组合起来应该可以控制在100字以内。 </think> VECT 2.0是一种勒索软件即服务(RaaS),因其加密实现的重大缺陷而更像是擦除器而非传统勒索软件。其无法恢复大文件数据,即使支付赎金也无法解密。该恶意软件与犯罪市场合作,并使用弱加密方式。 2026-4-28 14:1:0 Author: thehackernews.com(查看原文) 阅读量:35 收藏

Threat hunters are warning that the cybercriminal operation known as VECT 2.0 acts more like a wiper than a ransomware due to a critical flaw in its encryption implementation across Windows, Linux, and ESXi variants that renders recovery impossible even for the threat actors.

The fact that VECT's locker permanently destroys large files rather than encrypting them means even victims who opt to pay the ransom cannot get their data back, as the decryption keys are discarded by the malware during the time encryption occurs.

"VECT is being marketed as ransomware, but for any file over 131KB – which is most of what enterprises actually care about – it functions as a data destruction tool," Eli Smadja, group manager at Check Point Research, said in a statement shared with The Hacker News.

"CISOs need to understand that in a VECT incident, paying is not a recovery strategy. There is no decrypter that can be handed over, not because the attackers are unwilling, but because the information required to build one was destroyed the moment their software ran. The focus has to be on resilience: offline backups, tested recovery procedures, and rapid containment – not negotiation."

VECT (now rebranded as VECT 2.0) is a ransomware-as-a-service (RaaS) scheme that first launched its affiliate program in December 2025. On its dark website, the group displays the message "Exfiltration / Encryption / Extortion," highlighting its triple-threat business model.

According to an analysis published by the Data Security Council of India (DSCI) last month, a $250 entry fee, payable in Monero (XMR), is required for new affiliates. The fee is waived for applicants from the Commonwealth of Independent States (CIS) countries, indicating an attempt to recruit individuals from the region.

In recent weeks, the group has established a formal partnership with the BreachForums cybercrime marketplace and the TeamPCP hacking group, in a move aimed at further lowering the barrier to entry for ransomware operators and incentivizing affiliates to launch attacks by weaponizing previously stolen data.

"The convergence of large-scale supply chain credential theft, a maturing RaaS operation, and mass dark web forum mobilization represents an unprecedented model of industrialized ransomware deployment," Dataminr noted earlier this month.

While the collaboration may be a sign of what's to come, its data leak site currently lists only two victims, both of which are said to have been compromised via the TeamPCP supply chain attacks. What's more, contrary to the group's initial claims of using ChaCha20-Poly1305 AEAD for encryption, Check Point's analysis has found that it uses a weaker, unauthenticated cipher with no integrity protection.

But it doesn't end there, for the C++-based lockers for all three platforms suffer from a fundamental design flaw that causes any file larger than 131,072 bytes to be permanently and irrecoverably destroyed, as opposed to being encrypted.

"The malware encrypts four independent chunks of each 'large file' using four freshly generated random 12-byte nonces, but appends only the final nonce to the specific encrypted file on disk," Check Point explained. "The first three nonces, each required to decrypt its respective chunk, are generated, used, and silently discarded. They are never stored on disk, in the registry, or transmitted to the operator."

"Because ChaCha20-IETF requires both the 32-byte key and the exact matching 12-byte nonce to reverse each chunk, the first three quarters of every large file are unrecoverable by anyone, including the ransomware operator, who cannot provide a working decryption tool even after ransom payment. Since the vast majority of operationally critical files exceed this 'large-size' threshold, VECT 2.0 functions in practice as a data wiper with a ransomware facade."

The Windows version of the ransomware, besides encrypting files across local, removable, and network-accessible storage, features a comprehensive anti-analysis suite targeting 44 specific security and debugging tools, alongside a safe-mode persistence mechanism and multiple remote-execution script templates for lateral spread.

When "--force-safemode" is active, the locker configures the next boot into Windows Safe Mode and writes its own executable path into the Windows Registry so that it's automatically run on the subsequent Safe Mode boot, where the operating system is launched in a basic state using a limited set of files and drivers.

On top of that, although the Windows variant implements environment detection mechanisms to fly under the radar, they are never invoked, allowing security teams running the artifacts to avoid triggering any evasive response. The ESXi variant, on the other hand, enforces geofencing and anti-debugging checks prior to commencing the encryption step. It also attempts to move laterally using SSH. The Linux version uses the same codebase as the ESXi flavor and implements a subset of its functionality.

The geofencing step verifies if it's running in a CIS country, and if so, exits without encrypting the files. This behavior, per Check Point, is rather unusual as most RaaS programs removed Ukraine from the CIS countries list following Russia's military invasion of the country in early 2022.

"During recent years these checks have been largely removed from ransomware," it added. "VECT including such checks and even adding Ukraine to the list of exclusions is rather uncommon. Check Point Research has two theories regarding this observation: either this code was AI generated, where LLMs were trained with Ukraine being part of CIS or VECT used an old code base for their ransomware."

It's assessed that the operators of VECT are novice actors rather than experienced threat actors, not to mention the possibility that some chunks of code could have been generated with help from an artificial intelligence (AI) tool.

"VECT 2.0 presents an ambitious threat profile with multi-platform coverage, an active affiliate program, supply-chain distribution via the TeamPCP partnership, and a polished operator panel," Check Point concluded. "In practice, the technical implementation falls significantly short of its presentation."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/04/vect-20-ransomware-irreversibly.html
如有侵权请联系:admin#unsafe.sh