Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

VECT: Ransomware by design, Wiper by accident

0
Medium
Published: Tue Apr 28 2026 (04/28/2026, 16:34:45 UTC)
Source: AlienVault OTX General

Description

VECT 2. 0 ransomware contains a critical encryption flaw that causes files larger than 128 KB to be irreversibly destroyed rather than properly encrypted. This flaw affects Windows, Linux, and ESXi platforms and is due to improper handling of ChaCha20-IETF cipher nonces, making file recovery impossible even if ransom is paid. The malware's encryption speed modes are broken, and some anti-analysis features are non-functional. Despite being distributed via known ransomware affiliates, the technical implementation is amateurish. This flaw effectively turns VECT ransomware into a destructive wiper targeting enterprise assets such as virtual machine disks, databases, and backups.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/29/2026, 07:23:13 UTC

Technical Analysis

Check Point Research identified fundamental flaws in VECT 2.0 ransomware impacting multiple platforms including Windows, Linux, and ESXi. The ransomware uses the ChaCha20-IETF cipher but only saves one of the four required decryption nonces for files larger than 128 KB, causing permanent data loss instead of recoverable encryption. The encryption speed modes do not function, thread scheduling reduces performance, and anti-analysis code is unreachable. These issues have existed since the ransomware's initial deployment, effectively making it a wiper rather than a recoverable ransomware. The malware is associated with distribution partnerships with TeamPCP and BreachForums but demonstrates poor cryptographic implementation.

Potential Impact

Files larger than 128 KB encrypted by VECT ransomware are permanently destroyed due to missing decryption nonces, making recovery impossible even if ransom demands are met. This impacts critical enterprise assets including virtual machine disks, databases, and backups across Windows, Linux, and ESXi environments. The ransomware's flawed implementation results in data loss rather than the typical ransomware scenario of encrypted but recoverable files.

Mitigation Recommendations

No official patch or remediation is available as this is malware behavior rather than a software vulnerability. Organizations should focus on preventing infection through standard security controls such as endpoint protection, network segmentation, and restricting lateral movement. Backup strategies should ensure offline or immutable copies to recover from data destruction caused by this ransomware. Monitor threat intelligence sources for updates on detection and prevention techniques specific to VECT ransomware.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://research.checkpoint.com/2026/vect-ransomware-by-design-wiper-by-accident/"]
Adversary
VECT
Pulse Id
69f0e1a5f1a168738b4eda1a
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash8ee4ec425bc0d8db050d13bbff98f483fff020050d49f40c5055ca2b9f6b1c4d
hash207b1a60f803d348c795d382f5aed9c3
hash4cc6e614e0b766ced936a7e44976f10a
hash7f6670a37338ffcaa61578e24164c540
hashaa72609186042f1d7d01ce070306a9f2
hashe27f4feffc1ba6bf4e35aec4a5270fccb636e5cf
hashecba8e27fe57953fa43818f141cee17db4ba6a07
hashf4b904fb6ba8474cb87f26302b74c4b82c106003
hashfe65bd9073617752460ac3419881c67848381fa3
hash58e17dd61d4d55fa77c7f2dd28dd51875b0ce900c1e43b368b349e65f27d6fdd
hash9c745f95a09b37bc0486bf0f92aad4a3d5548a939c086b93d6235d34648e683f
hasha7eadcf81dd6fda0dd6affefaffcb33b1d8f64ddec6e5a1772d028ef2a7da0f2
hashe1fc59c7ece6e9a7fb262fc8529e3c4905503a1ca44630f9724b2ccc518d0c06
hashe512d22d2bd989f35ebaccb63615434870dc0642b0f60e6d4bda0bb89adee27a

Domain

ValueDescriptionCopy
domainvectordntlcrlmfkcm4alni734tbcrnd5lk44v6sp4lqal6noqrgnbyd.onion

Url

ValueDescriptionCopy
urlhttp://vectordntlcrlmfkcm4alni734tbcrnd5lk44v6sp4lqal6noqrgnbyd.onion/chat/REDACTED

Threat ID: 69f1adeecbff5d8610b7f21d

Added to database: 4/29/2026, 7:06:22 AM

Last enriched: 4/29/2026, 7:23:13 AM

Last updated: 4/29/2026, 8:56:27 PM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses