Ransomware & Malware

VECT Ransomware Flaw Wipes Files Over 128KB

Everyone figured VECT 2.0 was the next slick RaaS contender, partnering with BreachForums and supply-chain hackers. Turns out, its encryption engine self-destructs large files — making it a wiper by bug.

{# Always render the hero — falls back to the theme OG image when article.image_url is empty (e.g. after the audit's repair_hero_images cleared a blocked Unsplash hot-link). Without this fallback, evergreens with cleared image_url render no hero at all → the JSON-LD ImageObject loses its visual counterpart and LCP attrs go missing. #}
VECT ransomware encryption flaw diagram showing nonce discard on large files

Key Takeaways

  • VECT 2.0 wipes files >128KB due to nonce-discarding bug across Windows/Linux/ESXi.
  • Raw ChaCha20-IETF, no auth; speed flags ignored; bugs galore in shared codebase.
  • Hype from partnerships hides amateur execution — echoes WannaCry self-sabotage.

Cybercrime forums buzzed with hype around VECT ransomware. December 2025 debut. Partnerships with TeamPCP — those supply-chain saboteurs — and BreachForums itself. Affiliates handed keys to the kingdom, no reputation check needed. Expectations? A polished, cross-platform beast targeting Windows, Linux, ESXi, even cloud lockers on the horizon.

Check Point Research cracked open the builder. What they found flips the script: VECT 2.0 doesn’t encrypt large files. It obliterates them.

How Does VECT’s Encryption Actually Fail?

At the heart — libsodium’s raw ChaCha20-IETF, no Poly1305 MAC, no integrity checks. Public reports botched that, calling it AEAD. It’s not. Worse: for files over 131,072 bytes (128KB), the code splits into four chunks, generates nonces, then discards three. Every time. Recovery? Impossible. Attacker included.

“A critical flaw in the encryption implementation, identical across all three platform variants (Windows, Linux, ESXi), discards three of four decryption nonces for every file above 131,072 bytes (128 KB). Full recovery is impossible for anyone, including the attacker.”

That’s Check Point’s verdict, straight from their analysis of all public versions. Enterprise VMs, databases, backups — anything meaty — gone forever. Small config files? Encrypted, sure. But who’s paying ransom for scraps?

This isn’t isolated. Windows PE64, Linux ELF64, ESXi ELF64 — all share the flawed engine. Ported from one C++ codebase, hardcoded thresholds baked in. Flags like –fast, –medium, –secure? Parsed, ignored. Speed modes? Myth.

And the bugs pile up. Self-cancelling obfuscation. Unreachable anti-analysis code. A thread scheduler that tanks performance instead of boosting it. Professional on the surface — amateur underneath.

Why Does a Shared Codebase Doom VECT Across Platforms?

Ransomware devs love cross-platform play. Reuse code, hit more targets. VECT’s trio leans on libsodium static links, command-line flags, lateral movement, identical output format. Smart in theory.

But here’s the shift: that unity amplifies failure. One nonce-handling blunder ripples everywhere. No platform-specific tweaks to the crypto core. It’s like building a fleet from the same faulty blueprint — one recall sinks them all.

Check Point got builder access via BreachForums. Spun up Windows, Linux, ESXi payloads. Confirmed: same four-chunk logic, same thresholds, same trash-noncelike clockwork.

Background adds irony. VECT claimed first victims January 2026, right after TeamPCP’s Trivy, KICS, LiteLLM, Telnyx injections. BreachForums post bragged affiliation, promising forum users free reign. Leak site? Two victims, both from those chains. Ambitious marketing — thin results.

Version 2.0, February 2026. C++ from scratch, they boasted. Cloud lockers teased via quiz. Yet the panel offers exfiltration tools still MIA.

Is VECT’s Hype Just Ransomware Theater?

Look at the partnerships. TeamPCP’s supply-chain hits grabbed eyes; VECT surfed the wave. BreachForums deal democratizes access — every user an affiliate. No vetting, no fees. Bold.

But two victims? That’s not scaling. The wiper flaw explains it. Hit a VM disk, a database — poof. No decryptor sells. Victims ghost you. Cashflow dries.

Unique insight: this echoes WannaCry’s backdoor blunder. Remember? Shadow Brokers leaked EternalBlue; North Korea’s toy accidentally left a killswitch domain. Global chaos, sure — but self-sabotage neutered it. VECT’s nonce trash is no killswitch, but same vibe: architects kneecap their own weapon. Prediction? Affiliates bail fast. RaaS churn spikes as word spreads on forums. VECT joins the graveyard of overpromised ops.

PR spin calls it sophisticated. Check Point peels it back: misidentified cipher, ignored flags, performance-killing scheduler. Facade crumbles.

Table from the research sums platforms:

Property Windows Linux ESXi
Architecture PE64 (x86-64) ELF64 (x86-64) ELF64 (x86-64)
Toolchain MinGW-w64 / C++ GCC / C++ GCC / C++
Crypto library libsodium (static

Deeper cuts reveal the why. RaaS pressure cooker — rush multi-platform, cut corners. Libsodium’s power misused: raw ChaCha20 without auth invites this. Nonce reuse? Catastrophic in practice. At 128KB threshold, it’s wiper for real-world data.

Defenders win here. Spot VECT artifacts — static libsodium strings, flag patterns — and laugh. No decryptor means no incentive to pay. But the shift? Ransomware evolving toward reliability fails when bugs turn encryptors to erasers.

What Does This Mean for Enterprise Defenses?

ESXi targeting ups stakes — hypervisor hits cascade. But flaw levels it. IR teams: hunt the builder signatures, monitor for partial encrypts (small files intact).

Attackers pivot? Maybe. But trust erodes. Affiliates demand vetted tools. VECT’s leak site stagnation screams trouble.

Architectural tell: single-engine ports prioritize speed over audit. Future RaaS? Expect siloed platforms or heavier testing. Or more wipeouts.

Threat Digest watch: if cloud lockers drop, same engine? Disaster waiting.


🧬 Related Insights

Frequently Asked Questions

What is VECT ransomware?
VECT is a RaaS operation launched in December 2025, offering Windows, Linux, and ESXi payloads via BreachForums affiliates.

Why can’t VECT decrypt large files?
A bug discards decryption nonces for files over 128KB, using flawed four-chunk logic in its ChaCha20 implementation across all variants.

Is VECT still a threat despite the flaw?
Small files encrypt fine, but meaningful data wipes permanently — slashing ransom viability for most targets.

Maya Thompson
Written by

Threat intelligence reporter. Tracks CVEs, ransomware groups, and major breach investigations.

Frequently asked questions

What is VECT ransomware?
VECT is a RaaS operation launched in December 2025, offering Windows, Linux, and ESXi payloads via BreachForums affiliates.
Why can't VECT decrypt large files?
A bug discards decryption nonces for files over 128KB, using flawed four-chunk logic in its ChaCha20 implementation across all variants.
Is VECT still a threat despite the flaw?
Small files encrypt fine, but meaningful data wipes permanently — slashing ransom viability for most targets.

Worth sharing?

Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.

Originally reported by Check Point Research

Stay in the loop

The week's most important stories from Threat Digest, delivered once a week.