A VECT 2.0 error turns the supposed ansomware into an irreversible draft: Check Point researchers have discovered that VECT version 2.0 fails to handle nonces during block encryption, which causes large files to be permanently useless rather than simply encrypted. This failure is not a minor implementation detail: it affects the basic cryptographic mechanism that ensures that each encrypted block can be recovered independently.
In technical terms, VECT tries to accelerate the encryption of large files by dividing them into parts (chunks) and generating a nonce for each chunk. However, all the nonces are generated in the same memory buffer and are overwritten in each iteration; at the end of the operation only the last nonce is written in disk. The effect is that, in practice, only the last portion of the file (approximately 25% according to analysis) retains the nonce necessary to decipher it. The rest is irreversibly mutilated because the above nonces are never sent to the operator or preserved on the disk.

The implications for business environments are severe. Check Point points out that the threshold that VECT considers "large file" is just 128 KB, much lower than usual in virtual disks, backups, databases and many business documents; that makes the "accidental erasing" behavior affect most critical assets. In addition, the same defective logic is present in the variants for Windows, Linux and ESXi, so that servers and virtualization systems are equally exposed. More technical details are available in the Check Point report: Check Point Research on VECT 2.0.
The operating context increases the severity of the problem: VECT has been promoted in secret BreachForums-type forums with a affiliate model and, according to reports, operators announced an association with the TeamPCP group, involved in recent commitments of supply chains that affected projects such as Trivy or LiteLLM and services such as Telnyx. This collaboration suggests that VECT may have been designed to be deployed after vendor or software commitments, a vector that multiplies the potential damage and complicates the response.
It's important to understand why paying the ransom may not serve: as the lost nonces are not referred to the attacker, even if a victim met the demands there would not be enough keys to rebuild the blocks prior to the last. In practice, this transforms a ransomware attack (where there is hope of recovery after payment) into an act of irreversible data destruction for most affected files.
For organizations and security officials, the immediate priority is to contain and preserve: isolate affected machines, stop the spread, take forensic images of records and memory and connect with a specialized incident response team. Although the nonces may have been overwritten in memory, capturing an RAM image as soon as possible remains a valuable action for forensic investigation and for determining the sequence of the attack and the point of entry.
The best defence remains data prevention and resilience. This includes maintaining robust backup, with integrity controls and regular restoration tests; using immutable or air@-@ gapped versions of backups where possible; segmenting networks and prioritizing the principle of lesser privilege to reduce the scope of lateral movements; and deploying detection in endpoints and network telemetry to identify early suspicious activity.
In addition, it is critical to strengthen security controls in the supply chain: to audit and monitor units, to ensure CI / CD pipelines, to sign and verify artifacts, and to require security practices from suppliers. The cryptographic literature also recalls the importance of handling nonces and initialization vectors rigorously; for a technical reference on the correct use of AEAD modes (such as GCM) and nonces management, see the NIST technical guide: NIST SP 800-38D.

From the perspective of public-private response, the organisations concerned should notify authorities and regulators according to their legal and privacy obligations, and communicate the extent of the impact to customers and partners in a transparent manner. Since VECT is being distributed through participants and forums, sharing indicators of engagement with the community and sectoral focal points can help to identify new deployments and mitigate risk.
A message for CISUS and technical equipment: urgently review backup and retention policies, activate restoration tests on different scenarios, quarantine suspicious systems and prepare continuity plans that consider the possibility of partial or total loss of critical assets. If your organization depends on subcontracted software or services providers, prioritize the evaluation of such providers and the verification of the integrity of artifacts.
In short, the VECT 2.0 incident is a reminder that cryptographic implementation errors can turn an encryption malware into a data destroyer and that the combination of criminal affiliate models and supply chain attacks amplifies systemic risk. The defence requires both precise technical controls and operational and contractual practices that reduce the likelihood of intrusion and increase the real possibility of recovery if a commitment occurs.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...

PinTheft the public explosion that could give you root on Arch Linux
A new public explosion has brought to the surface again the fragility of the Linux privilege model: the V12 Security team named the failure as PinTheft and published a concept t...