VECT Ransomware's Fatal Flaw: Encryption Bug Turns Malware into Unrecoverable Wiper for Enterprise Data
<h2>Breaking News: VECT Ransomware Destroys Data Instead of Encrypting It</h2>
<p>Check Point Research (CPR) has uncovered a devastating flaw in the VECT 2.0 ransomware that permanently destroys large files rather than encrypting them. The bug, present across all three platform variants (Windows, Linux, ESXi), makes full recovery impossible for anyone—including the attackers themselves.</p><figure style="margin:20px 0"><img src="https://research.checkpoint.com/wp-content/uploads/2026/04/Cover2-1024x576.png" alt="VECT Ransomware's Fatal Flaw: Encryption Bug Turns Malware into Unrecoverable Wiper for Enterprise Data" style="width:100%;height:auto;border-radius:8px" loading="lazy"><figcaption style="font-size:12px;color:#666;margin-top:5px">Source: research.checkpoint.com</figcaption></figure>
<p>“This flaw effectively turns VECT into a wiper for virtually any file containing meaningful data,” said a CPR researcher. “Enterprise assets such as VM disks, databases, documents, and backups are all affected.”</p>
<h3>The Critical Encryption Flaw</h3>
<p>The flaw stems from a nonce-handling error in the encryption implementation. For every file above 131,072 bytes (128 KB), three of four decryption nonces are discarded. This means that even with the correct decryption key, the data is unrecoverable.</p>
<p>CPR confirmed the flaw is present across all publicly available VECT versions. The threshold of only 128 KB effectively turns the ransomware into a wiper for any file containing meaningful data.</p>
<h3>Additional Missteps and Bugs</h3>
<p>CPR also found that VECT’s cipher is misidentified in public reports. The malware uses raw ChaCha20-IETF (RFC 8439) with no authentication, not the ChaCha20-Poly1305 AEAD claimed by several threat intelligence sources. There is no Poly1305 MAC and no integrity protection.</p>
<p>Furthermore, the advertised encryption speed modes (--fast, --medium, --secure) are parsed but silently ignored. Every execution applies identical hardcoded thresholds, regardless of operator selection. Additional bugs include self-cancelling string obfuscation, permanently unreachable anti-analysis code, and a thread scheduler that degrades encryption performance.</p>
<h2 id="background">Background: VECT Ransomware and Its Origins</h2>
<p>VECT Ransomware is a Ransomware-as-a-Service (RaaS) program that first appeared in December 2025 on a Russian-language cybercrime forum. The group claimed their first two victims in January 2026.</p><figure style="margin:20px 0"><img src="https://research.checkpoint.com/wp-content/uploads/2026/04/Cover2.png" alt="VECT Ransomware's Fatal Flaw: Encryption Bug Turns Malware into Unrecoverable Wiper for Enterprise Data" style="width:100%;height:auto;border-radius:8px" loading="lazy"><figcaption style="font-size:12px;color:#666;margin-top:5px">Source: research.checkpoint.com</figcaption></figure>
<p>They gained public attention in March 2026 after announcing a partnership with TeamPCP, the actor behind several supply-chain attacks. These attacks injected malware into popular software packages such as Trivy, Checkmarx’ KICS, LiteLLM, and Telnyx, affecting a large base of downstream consumers.</p>
<p>Following these attacks, VECT posted on BreachForums announcing the partnership, aiming to exploit companies affected by the supply-chain attacks. Additionally, VECT promised that every registered BreachForums user would become an affiliate, gaining access to the ransomware, negotiation platform, and leak site.</p>
<h2 id="what-this-means">What This Means for Victims and Organizations</h2>
<p>The encryption flaw means that any VECT infection targeting large files results in permanent data destruction. Victims should not expect to recover their data even if they pay the ransom.</p>
<p>Organizations must treat any VECT incident as a destructive wiper attack, not a typical ransomware event. Immediate incident response should focus on containment and data restoration from clean backups, not negotiation.</p>
<p>Given the partnership with TeamPCP, companies that were affected by the earlier supply-chain attacks should be especially vigilant. The VECT group’s professional facade masks an amateurish execution that makes them unpredictable and dangerous.</p>
<p>For full technical details, see the <a href="#background">background section</a> above. CPR recommends all organizations review their defenses against wiper attacks and ensure that critical data is backed up offline.</p>
Tags: