MalwareHigh

Vect Ransomware-as-a-Service Targets Windows and Linux/ESXi Systems Globally

Friday, April 3, 2026
Global
CYFIRMA Intelligence

Summary

CYFIRMA researchers identified Vect Ransomware, a new ransomware-as-a-service (RaaS) operation targeting both Windows and Linux/ESXi systems. The malware encrypts files, exfiltrates sensitive data before encryption, and demands ransom under a double-extortion model. Initial access is achieved through phishing, stolen credentials, and exposed RDP/VPN services.

Threat Analysis

Vect Ransomware is a newly identified ransomware-as-a-service (RaaS) operation built on a custom C++ codebase, capable of targeting both Windows and Linux/ESXi environments. The malware follows a triple-threat model: it exfiltrates sensitive data (databases, backups), encrypts files with a ".vect" extension, and threatens public data exposure if ransom demands are not met. Vect establishes persistence through scheduled tasks, can force systems into Safe Mode to disable security tools, and employs privilege escalation and credential dumping techniques. Lateral movement is achieved via SMB and WinRM protocols. Command and control communication uses encrypted protocols over anonymized infrastructure. Initial access vectors include phishing campaigns, stolen credentials, and exploitation of exposed remote services (RDP, VPN). Organizations should ensure RDP and VPN services are not directly exposed to the internet, implement multi-factor authentication, maintain offline backups, and deploy endpoint detection and response (EDR) solutions capable of detecting ransomware behavior patterns.

Last updated: Apr 3, 2026, 08:15 AM

Daily Intelligence

Stay Ahead of Threats

Subscribe to receive daily threat briefings delivered to your inbox. Be the first to know about emerging security risks.

No spamUnsubscribe anytimeDaily at 9 AM