Cybersecurity2 hrs ago

Kyber Ransomware First to Deploy Quantum‑Resistant ML‑KEM Encryption

Kyber ransomware, seen since last September, employs ML‑KEM1024 to protect AES‑256 keys. Rapid7 confirms it is the first ransomware with NIST‑approved post‑quantum cryptography.

Peter Olaleru/3 min/US

Cybersecurity Editor

TweetLinkedIn
Kyber Ransomware First to Deploy Quantum‑Resistant ML‑KEM Encryption

Screenshot of Cloudflare Post-Quantum Key Agreement test page showing Firefox 135.0 using X25519MLKEM768

Source: EnOriginal source

TL;DR

Kyber ransomware, first seen last September, uses the ML‑KEM1024 post‑quantum algorithm to protect its encryption keys. Rapid7’s analysis confirms it is the inaugural ransomware to deploy NIST‑approved quantum‑resistant cryptography.

Context

Kyber is a ransomware family that encrypts victim files with AES‑256 and then safeguards the symmetric key using ML‑KEM1024, a lattice‑based key encapsulation mechanism standardized by NIST. The algorithm is marketed as resistant to attacks from future quantum computers. The ransomware name derives from the alternate name for ML‑KEM, also called Kyber.

Key Facts

- Kyber has been active since at least September of the previous year. - Rapid7 reverse‑engineered a Windows variant and found it employs ML‑KEM1024, the highest security level of the post‑quantum standard. - The ransomware wraps an AES‑256 key with ML‑KEM1024 before encrypting files. - Brett Callow of Emsisoft stated that Kyber is the first confirmed ransomware to use post‑quantum cryptography.

What It Means

The use of ML‑KEM1024 does not increase the cryptographic strength of AES‑256 against classical attacks; both are already considered secure. The move appears primarily as a marketing signal rather than a practical defense against quantum threats, which remain theoretical for now. Defenders should treat Kyber like any other ransomware while noting its novel key‑protection method.

Mitigations

- Ensure endpoint detection rules flag the use of ML‑KEM APIs or unusual cryptographic libraries (MITRE ATT&CK T1027). - Maintain offline, encrypted backups and test restoration regularly. - Apply the latest security patches for Windows systems to close common exploit paths (refer to Microsoft advisory CVE‑2024‑XXXX). - Monitor for suspicious PowerShell or script activity that launches encryption routines (MITRE ATT&CK T1059). - Segment networks to limit lateral movement after initial compromise.

Watch for whether other threat actors adopt post‑quantum primitives in their payloads and for any updates to NIST’s PQC standardization timeline.

TweetLinkedIn

More in this thread

Reader notes

Loading comments...