<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>KICS — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/kics/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 28 Apr 2026 13:03:01 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/kics/feed.xml" rel="self" type="application/rss+xml"/><item><title>VECT Ransomware Destroys Files Due to Encryption Flaw</title><link>https://feed.craftedsignal.io/briefs/2026-04-vect-ransomware/</link><pubDate>Tue, 28 Apr 2026 13:03:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-vect-ransomware/</guid><description>VECT 2.0 ransomware, a RaaS offering, permanently destroys large files due to an encryption flaw, discarding decryption nonces for files above 128 KB, rendering them unrecoverable and effectively acting as a wiper; it uses raw ChaCha20-IETF with no authentication.</description><content:encoded><![CDATA[<p>VECT Ransomware is a Ransomware-as-a-Service (RaaS) that emerged in December 2025 and gained notoriety after partnering with TeamPCP in March 2026. This partnership aimed to exploit victims of TeamPCP&rsquo;s supply chain attacks, which injected malware into software packages like Trivy, Checkmarx’ KICS, LiteLLM and Telnyx. VECT 2.0, released in February 2026, targets Windows, Linux, and ESXi, built from a single flawed codebase using libsodium and the ChaCha20-IETF cipher. A critical flaw causes the ransomware to discard decryption nonces for files larger than 128KB, resulting in data corruption and irrecoverable files. Advertised encryption speed modes (&ndash;fast, &ndash;medium, &ndash;secure) are parsed, but ignored.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Affiliate gains access to the VECT RaaS platform via BreachForums, after VECT announced the partnership with BreachForums in April 2026.</li>
<li>Affiliate builds a custom ransomware payload (Windows, Linux, or ESXi) via the VECT builder panel.</li>
<li>Ransomware binary is deployed to the target system.</li>
<li>The VECT ransomware begins encrypting files.</li>
<li>For files larger than 128 KB, the ransomware discards three of four decryption nonces due to a flaw in its encryption implementation.</li>
<li>Files are encrypted using ChaCha20-IETF (RFC 8439) without authentication.</li>
<li>A ransom note is displayed, demanding payment for decryption.</li>
<li>Due to the discarded nonces, files larger than 128KB are unrecoverable, even with the correct decryption key.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The VECT ransomware acts as a wiper for files larger than 128KB due to a flaw in its encryption process, causing permanent data loss. This includes enterprise assets such as VM disks, databases, documents and backups. The leak site has listed two victims, both originating from the TeamPCP supply chain attacks. If successful, the attack results in significant data loss.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for executables with file names similar to legitimate system tools but located in unusual directories, which could indicate the presence of VECT ransomware on a system (see Sigma rule <code>Detect VECT Ransomware Execution</code>).</li>
<li>Implement network monitoring to detect unusual outbound connections from systems, which might indicate lateral movement or communication with a command-and-control server.</li>
<li>Deploy endpoint detection and response (EDR) solutions to detect and block suspicious file encryption activity on endpoints.</li>
<li>Review and update incident response plans to include procedures for handling potential ransomware attacks, with a focus on data recovery and business continuity.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>ransomware</category><category>wiper</category><category>raas</category></item></channel></rss>