Now a ransomware turns quantum computing safe in encryption

Over the past few years, cybersecurity researchers have increasingly focused on developing encryption algorithms that can withstand the potential threats posed by quantum computing. As quantum machines advance, they are expected to break many of the classical cryptographic systems that currently secure digital communications and data. This has led to a surge in interest around “quantum-safe” or “post-quantum” cryptography—methods specifically designed to remain secure even against highly powerful quantum attacks.

Amid this evolving landscape, researchers from Rapid7 have identified a new ransomware strain that claims to incorporate such advanced protections. Known as Kyber Ransomware, this threat reportedly emerged in the first week of September 2025 and has drawn attention for its unusual positioning. Unlike typical ransomware groups that emphasize speed or stealth, the operators behind Kyber assert that their malware is resistant to quantum-computing-based cyberattacks.

At the core of this claim is the use of an ML-KEM (Module Lattice-based Key Encapsulation Mechanism) algorithm. This cryptographic method is part of a broader class of lattice-based encryption techniques, which are widely regarded as promising candidates for post-quantum security. Notably, ML-KEM has been standardized by the National Institute of Standards and Technology (NIST), lending it credibility within the cybersecurity community. The Kyber group specifically references ML-KEM1024, one of the higher-security parameter sets, suggesting that their encryption is designed to withstand even advanced post-quantum cryptographic attacks.

In addition to ML-KEM, the ransomware also reportedly employs AES-256, a widely trusted symmetric encryption standard used globally to secure sensitive data. AES-256 is known for its robustness against brute-force attacks using classical computing, and when combined with post-quantum techniques, it creates an impression of exceptionally strong encryption. This dual-layer approach is likely intended to reinforce the group’s claim that their malware is extremely difficult to break.

However, despite these bold assertions, security experts caution against taking such claims at face value. While the use of advanced cryptographic algorithms may sound impressive, their effectiveness ultimately depends on how well they are implemented. In many cases, ransomware developers lack the expertise to correctly integrate complex cryptographic systems, which can introduce weaknesses regardless of the algorithm’s theoretical strength.

Furthermore, the practical benefits of making ransomware “quantum-safe” are questionable. Cybercriminal operations typically rely on immediate impact—encrypting files quickly and coercing victims into paying a ransom—rather than defending against hypothetical future threats from quantum computers. As a result, the inclusion of post-quantum cryptography may serve more as a marketing tactic or psychological tool, aimed at intimidating victims and boosting the group’s perceived sophistication.

In conclusion, while Kyber Ransomware represents an intriguing intersection of emerging cryptographic standards and cybercrime, its claims of quantum resistance should be viewed with skepticism. The real-world effectiveness of such protections remains uncertain, and the broader threat posed by ransomware continues to depend more on operational tactics than on cutting-edge encryption alone.

Join our LinkedIn group Information Security Community! 

Latest articles

Related articles