New “Vect” RaaS Variant Poses Critical Threat, Researchers Warn

▼ Summary
– A new ransomware-as-a-service group named “Vect” has emerged, victimizing organizations in Brazil and South Africa.
– The group uses custom-built malware written in C++ and employs the fast ChaCha20-Poly1305 encryption algorithm with intermittent encryption techniques.
– Vect demonstrates unusual maturity by targeting multiple platforms, suppressing security tools, and maintaining strong operational security with anonymous payments and communications.
– It operates a double extortion model and offers a generous affiliate program, with evidence suggesting it is run by experienced threat actors.
– Security researchers recommend specific mitigations, noting the group is likely in an early testing phase before broader expansion.
A newly identified ransomware-as-a-service operation, named Vect, is raising significant alarm among cybersecurity professionals for its advanced capabilities and rapid development. Researchers warn this group poses a critical threat, having already targeted organizations in Brazil and South Africa. The operation is actively recruiting affiliates, signaling its intent to expand its criminal activities.
The group distinguishes itself by claiming its malware is built from the ground up in C++, rather than relying on leaked source code from older ransomware families like Lockbit or Conti. This bespoke approach suggests a higher degree of technical sophistication. For encryption, Vect employs the ChaCha20-Poly1305 algorithm, which is notably faster than more common alternatives on systems lacking specific hardware support. To further accelerate its attack process, it uses intermittent encryption, scrambling only select blocks of data to cause maximum disruption in minimal time.
Despite its recent emergence, analysts note the group displays unusual maturity. Its advertised features include cross-platform functionality targeting Windows, Linux, and VMware ESXi systems, the ability to execute in Safe Mode to bypass security tools, and the fast encryption methods mentioned. Security firm Halcyon assesses that Vect is currently in an early validation phase, testing its capabilities with a few victims before a likely broader campaign.
The affiliate model appears designed to attract partners, particularly from certain regions. The operation waives a standard $250 entry fee for applicants within the Commonwealth of Independent States (CIS), a strong hint about the group’s geographical origins or primary recruitment focus. This, combined with the technical features, leads experts to believe experienced ransomware operators are behind the venture, potentially as a rebrand or new project by established criminals.
A separate analysis by Red Piranha highlights the group’s robust operational security. Vect utilizes the privacy-focused cryptocurrency Monero for payments, the encrypted TOX protocol for affiliate communications, and operates exclusively on TOR hidden services with no presence on the regular internet. This comprehensive focus on anonymity makes tracking and disrupting the group particularly challenging.
Initial access for attacks is believed to be gained through common vectors such as exposed Remote Desktop Protocol (RDP) or VPN services, stolen credentials, phishing campaigns, or the exploitation of software vulnerabilities. Once inside a network, Vect employs a double extortion tactic, both encrypting files and stealing data to pressure victims into paying a ransom, with victim information posted to a public leak site.
For network defenders, mitigating the risk from threats like Vect involves several key actions. Securing remote access points like RDP and VPNs with strong authentication, preferably multi-factor authentication, is essential. Regularly patching systems and educating users on phishing threats can close common entry doors. Implementing robust, offline data backups ensures operational resilience, while deploying advanced endpoint detection and response (EDR) tools can help identify and halt malicious activity early.
(Source: InfoSecurity Magazine)
