Kyber Ransomware First to Deploy Quantum‑Resistant ML‑KEM Encryption
Kyber ransomware, seen since last September, employs ML‑KEM1024 to protect AES‑256 keys. Rapid7 confirms it is the first ransomware with NIST‑approved post‑quantum cryptography.

Screenshot of Cloudflare Post-Quantum Key Agreement test page showing Firefox 135.0 using X25519MLKEM768
TL;DR
Kyber ransomware, first seen last September, uses the ML‑KEM1024 post‑quantum algorithm to protect its encryption keys. Rapid7’s analysis confirms it is the inaugural ransomware to deploy NIST‑approved quantum‑resistant cryptography.
Context
Kyber is a ransomware family that encrypts victim files with AES‑256 and then safeguards the symmetric key using ML‑KEM1024, a lattice‑based key encapsulation mechanism standardized by NIST. The algorithm is marketed as resistant to attacks from future quantum computers. The ransomware name derives from the alternate name for ML‑KEM, also called Kyber.
Key Facts
- Kyber has been active since at least September of the previous year. - Rapid7 reverse‑engineered a Windows variant and found it employs ML‑KEM1024, the highest security level of the post‑quantum standard. - The ransomware wraps an AES‑256 key with ML‑KEM1024 before encrypting files. - Brett Callow of Emsisoft stated that Kyber is the first confirmed ransomware to use post‑quantum cryptography.
What It Means
The use of ML‑KEM1024 does not increase the cryptographic strength of AES‑256 against classical attacks; both are already considered secure. The move appears primarily as a marketing signal rather than a practical defense against quantum threats, which remain theoretical for now. Defenders should treat Kyber like any other ransomware while noting its novel key‑protection method.
Mitigations
- Ensure endpoint detection rules flag the use of ML‑KEM APIs or unusual cryptographic libraries (MITRE ATT&CK T1027). - Maintain offline, encrypted backups and test restoration regularly. - Apply the latest security patches for Windows systems to close common exploit paths (refer to Microsoft advisory CVE‑2024‑XXXX). - Monitor for suspicious PowerShell or script activity that launches encryption routines (MITRE ATT&CK T1059). - Segment networks to limit lateral movement after initial compromise.
Watch for whether other threat actors adopt post‑quantum primitives in their payloads and for any updates to NIST’s PQC standardization timeline.
Continue reading
More in this thread
US Charges Two Chinese Nationals in Myanmar Scam Compound Case; FBI Cites $7.2B Losses
Peter Olaleru
Vercel Breach Shows How Unsanctioned AI Tools Open Doors to Customer Data
Peter Olaleru
UNC6692 Uses Fake IT Helpdesk Teams Messages to Deploy SNOW Malware
Peter Olaleru
Conversation
Reader notes
Loading comments...