VECT Ransomware: Encryption Flaw Turns It Into an Accidental Wiper

By ✦ min read

Overview

Ransomware groups usually aim to encrypt files to demand a ransom. But a recent discovery by Check Point Research (CPR) shows that the VECT ransomware—marketed as a sophisticated encryption tool—actually destroys large files instead of locking them. A critical design flaw in its encryption logic renders recovery impossible for victims and even the attackers themselves. This article dissects the flaw, its implications, and the broader context of VECT's activities.

VECT Ransomware: Encryption Flaw Turns It Into an Accidental Wiper
Source: research.checkpoint.com

Key Findings

Background

VECT emerged in December 2025 as a Ransomware-as-a-Service (RaaS) offering on a Russian-language cybercrime forum. Its first known victims appeared in January 2026. The group gained broader attention after announcing a partnership with TeamPCP, an actor behind several supply-chain attacks in March 2026. These attacks injected malware into widely used software packages like Trivy, Checkmarx KICS, LiteLLM, and Telnyx, affecting a large downstream base. Shortly after those incidents made headlines, VECT posted on BreachForums declaring its alliance with TeamPCP, aiming to exploit companies impacted by the supply-chain compromises.

In a further move, VECT also partnered with BreachForums itself, promising that every registered forum user would become an affiliate—able to use the VECT ransomware, negotiation platform, and leak site for operations. This open recruitment strategy contrasts with typical ransomware groups that vet affiliates carefully.

Technical Analysis of the Encryption Flaw

How VECT Encrypts Files

VECT uses the ChaCha20-IETF stream cipher from the libsodium library. The encryption process divides files into four chunks: the first chunk contains metadata and is encrypted normally; the next two chunks store encryption parameters; the fourth chunk contains the bulk of the data. The critical bug lies in how the encryption nonces are derived and stored.

The Nonce Bug

For files larger than 128 KB, VECT divides the data into segments and encrypts each segment with a different nonce. However, the implementation incorrectly writes only one nonce—the first—into the file header, discarding the nonces for the remaining three chunks. Without those nonces, decryption is impossible. Since the file is irreversibly scrambled, VECT effectively acts as a wiper for any file containing meaningful data, including enterprise assets such as VM disks, databases, documents, and backups.

CPR confirmed this flaw exists in all publicly available VECT versions, suggesting it was never caught during development or testing.

Misidentified Cipher

Several prominent threat intelligence reports (and VECT's own advertisements) claimed the ransomware used ChaCha20-Poly1305 AEAD, which includes authentication via a MAC. In reality, VECT employs raw ChaCha20-IETF (RFC 8439) without any Poly1305 MAC. This means there is no integrity protection; an attacker or victim cannot verify whether a file was tampered with—though given the nonce flaw, integrity is moot anyway.

VECT Ransomware: Encryption Flaw Turns It Into an Accidental Wiper
Source: research.checkpoint.com

Unimplemented Features

The Linux and ESXi variants include command-line flags for encryption speed modes: --fast, --medium, and --secure. These are parsed but then silently ignored; every execution uses the same hardcoded thresholds regardless of the operator's selection. This reveals rushed development and a failure to deliver advertised capabilities.

Three Platforms, One Flawed Engine

VECT offers variants for Windows, Linux, and ESXi. CPR's analysis shows that all three share an identical encryption design built on libsodium, with the same file-size thresholds, the same four-chunk logic, and the same nonce-handling flaw. This confirms a single codebase ported across platforms—a double-edged sword that made the bug universal.

Additional Bugs and Design Failures

Beyond the critical nonce flaw, CPR found multiple amateur mistakes:

These issues underscore a wide gap between VECT's professional marketing and its amateur coding.

Implications for the Cybersecurity Community

The discovery that VECT is an accidental wiper has several implications:

Check Point Research recommends that organizations treat any VECT infection as a destructive attack, not a typical ransomware incident. Incident response teams should focus on containment and restoring from clean backups, without any expectation of paying for decryption.

Conclusion

VECT ransomware marketed itself as a professional tool, but under the hood it suffers from a catastrophic design flaw that turns it into a wiper for files over 128 KB. The same bug plagues all three platform variants, and the lack of authentication, unimplemented speed modes, and additional amateur mistakes paint a picture of a hastily assembled operation. For defenders, the key takeaway is clear: if you encounter VECT, treat it as a wiper—and ensure your backups are offline and immutable.

Tags:

Recommended

Discover More

5 Surprising Facts About Charging Your Phone With a Hamster WheelMastering Ubuntu’s New App Permission Prompts: A Step-by-Step GuideBYD’s $13,000 Seagull EV: Affordable Smart Driving with LiDAR – Your Questions AnsweredSPIFFE Identity Standard Becomes Urgent Fix as Autonomous AI Agents Outpace Traditional SecurityNavigating AI Governance in Enterprise Vibe Coding: A Comprehensive Guide