
Ransomware Strain VECT 2.0 Accidentally Wipes Crucial Files
A flawed ransomware named VECT 2.0 is wiping out critical files instead of encrypting them. Victims may pay, but they get nothing back.
New Ransomware Threat: VECT 2.0
A newly identified ransomware strain, VECT 2.0, is causing significant concern among cybersecurity experts due to a critical flaw that results in the permanent loss of files larger than 128 kilobytes, rather than merely encrypting them. The findings, published by Check Point Research, reveal that victims who are desperate enough to pay the ransom may end up with no way to recover their critical data.
The Mechanics of VECT 2.0
Cybercriminals typically employ ransomware to infiltrate a victim's system, rendering files unreadable and then demanding payment to restore access. In the case of VECT 2.0, the process is fundamentally flawed. When this ransomware scrambles a file, it is supposed to generate a cryptographic nonce—a unique code needed to decrypt the file later.
However, the malware mistakenly overwrites these nonces instead of storing them separately, leading to a situation where only the last nonce remains. As a result, files larger than 128 KB are irretrievably lost. This size is smaller than most significant files, meaning databases, backups, and documents are all at risk of being permanently erased.
Unintentional Consequences for Victims
The implications of VECT 2.0's coding errors are dire. Victims who pay the ransom will find themselves unable to retrieve their essential files, as the attackers cannot restore lost data without the necessary decryption keys. Security researchers highlight how this situation renders any ransom payment utterly pointless.
Additional Weaknesses in VECT 2.0
Check Point’s investigation also uncovered several other amateur mistakes inherent in the programming of VECT 2.0. Features that were advertised by the ransomware creators do not function as intended, and built-in security evasion tools remain inactive. Obfuscation attempts within the code frequently result in making it more accessible rather than complicated.
Worrying Reach Despite Ineptitude
Despite its evident coding deficiencies, VECT 2.0 has established connections with BreachForums, a significant hub for cybercriminal activities. This partnership allows any registered user on the forum access to VECT’s ransomware toolkit, increasing the reach of this flawed malware. Check Point warns that while the attacks appear to be the work of novice programmers, the distribution of this defective ransomware poses a substantial risk, equipping many potential attackers with a dangerous tool.
In conclusion, while VECT 2.0’s ineffectiveness may seem like a silver lining, the reality is that it opens the door to widespread data loss and confusion among ransomware victims, highlighting the urgent need for vigilance in data security.
Popular news
Trump declares a three-day ceasefire in the Russia-Ukraine war, with both sides agreeing. A prisoner exchange is also set in motion.
Subscribe to
our news
Get the most important updates and top stories in your inbox.





