Tech

VECT 2.0 cracked ransomware works as a data feature for large files

Researchers warn that the VECT 2.0 ransomware has a problem with the way it handles encryption nonces which results in permanently destroying large files rather than encrypting them.

VECT has been advertised in some of the latest BreachForums iterations, inviting registered users to become their contacts, and distributing access keys via private messages to those who have expressed interest.

At one point, VECT operators announced a partnership with TeamPCP, a threat group responsible for the latest supply-chain attacks affecting Trivy, LiteLLM, and Telnyx, as well as the European Commission attack.

picture

In the announcement, the VECT operators stated that their goal was to exploit the victims of those supply-chain compromises, send ransomware payloads to their sites, and carry out massive supply chain attacks against other organizations.

VECT operators post on BreachForums
VECT operators post on BreachForums
Source: Check Point

Flawed ransomware

Although this is intended to increase the speed of encryption for large files, because all chunk encryptions use the same memory buffer for random output, each new nonce overwrites the previous one.

Once all bits have been processed, only the last nonce generated remains in memory, and only that one is written to disk.

As a result, the only part of the file that can be recovered is the last 25%, the first three parts cannot be reversed, as the nonces are lost.

Those lost nonces are not transmitted to the attacker either, so even if the VECT operators wanted to decrypt the files of the ransom paying victims, they wouldn’t be able to.

Bad management mentality
Bad management mentality
Source: Check Point

Although this is intended to increase the speed of encryption for large files, because all chunk encryptions use the same memory buffer for random output, each new nonce overwrites the previous one.

Once all bits have been processed, only the last nonce generated remains in memory, and only that one is written to disk.

As a result, the only part of the file that can be recovered is the last 25%, the first three parts cannot be reversed, as the nonces are lost.

Those lost nonces are not transmitted to the attacker either, so even if the VECT operators wanted to decrypt the files of the ransom paying victims, they wouldn’t be able to.

VECT 2.0 ransom note
VECT 2.0 ransom note
Source: Check Point

Checkpoint notes that, since most business-critical files, including VM disks, database files, and backups, are larger than 128kb, the impact of VECT as a data eraser can be catastrophic in many areas.

“At a threshold of only 128 KB, smaller than a typical email attachment or office document, what the code classifies as a large file includes not only VM disks, databases, and backups, but regular documents, spreadsheets, and mailboxes. In fact, almost nothing the victim would care to recover falls under this threshold,” Check Point said.

The researchers found that the same misbehavior is present in all variants of VECT 2.0 ransomware, including Windows, Linux, and ESXi, so the same behavior of data deletion applies in all cases.

header image

AI has tied four zero days to a single exploit that bypasses both renderer and OS sandboxes. A wave of new exploits is coming.

At the Automated Validation Conference (May 12 & 14), see how autonomous, context-rich validation finds usability, validates controls, and closes the correction loop.

Find Your Place

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button