Broken VECT 2.0 Ransomware – Destructive Wiper Behavior Observed
Scope: Enterprise Endpoints and File Systems
Severity: Red
Broken VECT 2.0 ransomware has evolved beyond financial extortion, now functioning as a destructive data wiper that corrupts or permanently destroys large files, rendering recovery impossible even after ransom payment. This shift in behavior dramatically increases the impact severity, as organizations face irreversible data loss with no viable recovery path through attacker cooperation. Organizations should ensure secure, offline, and immutable backups are maintained, deploy EDR solutions, enforce MFA for remote access, and segment networks to contain lateral spread.
The Uganda National CERT and Coordination Center (CERT.UG/CC) encourages users and administrators to review the recommendations and apply the necessary updates.