A new ransomware-as-a-service (RaaS) operation, identifying itself as Kyber, has emerged, targeting both Windows and VMware ESXi environments. In a notable technical development, the Windows variant of the ransomware employs a hybrid encryption scheme that incorporates Kyber1024, a post-quantum cryptography (PQC) algorithm. The ransomware, written in Rust, uses the AES-CTR algorithm for file encryption and protects the symmetric key with a combination of Kyber1024 and the X25519 elliptic-curve algorithm. While this represents a forward-looking approach by threat actors to 'future-proof' their encrypted data against potential advances in quantum computing, security analysts at Rapid7 assess its current use as primarily a psychological and marketing tactic. The group's Linux-based ESXi variant falsely claims to use PQC, instead relying on traditional ChaCha8 and RSA-4096 cryptography. The gang is actively extorting victims and has already listed a multi-billion-dollar American defense contractor on its leak site.
Threat Actor: Kyber Ransomware Gang Malware: Kyber Ransomware (Windows and Linux/ESXi variants) Targets: Windows and VMware ESXi systems across various sectors, with an early identified victim in the U.S. defense industry.
The Kyber operation was first analyzed by Rapid7 during an incident response engagement in March 2026. The attackers deploy two distinct encryptor variants tailored to their target operating systems, sharing the same campaign IDs and ransom infrastructure. The primary attack vector for initial access has not been detailed, but the malware's post-exploitation behavior is designed for maximum damage and to impede recovery. The Windows variant performs typical ransomware actions such as deleting shadow copies, clearing event logs, and terminating critical services before encryption. The ESXi variant focuses on enumerating and encrypting virtual machine files (.vmdk, .vmsn, .vswp) and defacing the ESXi management interface.
The most significant aspect of the Kyber ransomware is its use of post-quantum cryptography in the Windows variant.
AES-CTRKyber1024 (a PQC Key Encapsulation Mechanism) and X25519 (an elliptic-curve algorithm).T1082 - System Information Discovery: Gathers system information.T1489 - Service Stop: Terminates SQL and Exchange services to unlock files.T1070.001 - Clear Windows Event Logs: Wipes event logs to cover tracks.T1490 - Inhibit System Recovery: Deletes volume shadow copies and disables boot repair.T1486 - Data Encrypted for Impact: Encrypts files on the system.ChaCha8RSA-4096T1567.002 - Exfiltration to Cloud Storage: Exfiltrates data (implied by double extortion model).T1486 - Data Encrypted for Impact: Encrypts virtual machine files.T1491.002 - Defacement: Internal Banners: Defaces the ESXi host's login page with a ransom message.The use of PQC is a strategic choice. While it offers no immediate advantage since current computers cannot break RSA-4096, it allows the threat actor to claim that even if the victim stores the encrypted data, it will remain secure against future quantum computers. This adds a layer of psychological pressure to pay the ransom.
The operational impact on a victim organization is severe, consistent with other modern ransomware attacks. The encryption of both Windows workstations/servers and VMware ESXi hypervisors can lead to a complete shutdown of business operations. For the ESXi variant, encrypting datastores means all hosted virtual machines become inaccessible, crippling production systems, databases, and internal services. The Windows variant's ability to terminate SQL and Exchange services further disrupts critical business functions. The double extortion model, where data is exfiltrated before encryption, adds the risk of a massive data breach, regulatory fines (e.g., GDPR, HIPAA), reputational damage, and loss of intellectual property. The targeting of a defense contractor highlights the threat to national security and sensitive government data.
No specific file hashes, IP addresses, or domains were mentioned in the source articles.
Security teams may want to hunt for the following patterns to detect Kyber ransomware activity:
vssadmin.exe delete shadows /all /quietwevtutil.exe clesxcli vm process kill/usr/lib/vmware/hostd/docroot/ui/index.html.kyberT1490 - Inhibit System Recovery), and clearing of event logs (T1070.001 - Clear Windows Event Logs). Monitor for the execution of vssadmin.exe, wbadmin.exe, and wevtutil.exe.esxcli commands used to list or kill VMs. Use Network Traffic Analysis to baseline normal ESXi management traffic and alert on anomalies.index.html file for the management UI, to detect defacement attempts.M1051 - Update Software) is crucial to reduce the attack surface.Isolate critical infrastructure like ESXi hosts from general corporate networks to prevent lateral movement.
Enforce MFA on all management interfaces, especially for critical systems like VMware vCenter and ESXi hosts.
Mapped D3FEND Techniques:
Use EDR/XDR tools to detect and block malicious behaviors like shadow copy deletion and mass file encryption.
Mapped D3FEND Techniques:
To defend against ransomware like Kyber that specifically targets virtualization infrastructure, organizations must implement rigorous platform hardening for VMware ESXi hosts. This involves more than just patching. Access to ESXi management interfaces should be restricted to a dedicated, isolated management network, inaccessible from the general user network. Enable ESXi's 'Lockdown Mode' to limit management capabilities to vCenter only, preventing direct host management via SSH or the host client. Disable all unnecessary services and ports on the hosts, such as the CIM server, to minimize the attack surface. Furthermore, enforce strong, unique passwords for the root account and integrate vCenter with a centralized identity provider that requires multi-factor authentication. These steps directly counter the lateral movement and host takeover techniques used by ESXi-targeting ransomware, making it significantly harder for attackers to gain the control needed to encrypt virtual machines.
For the Windows variant of Kyber, real-time process analysis is a critical detective and preventative control. EDR solutions should be configured with specific rules to detect and block the sequence of commands indicative of a ransomware pre-encryption script. Create a high-severity alert for any process that spawns vssadmin.exe delete shadows, bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures, and wevtutil.exe cl in a short time window. Since the Kyber ransomware is written in Rust, its executable may not be flagged by simple signature-based antivirus. Therefore, behavioral analysis is key. Monitor for unsigned processes performing rapid file I/O operations with high entropy, which is characteristic of encryption. Correlating this file activity with preceding service termination commands (e.g., for SQL or Exchange) can provide a high-confidence signal of a ransomware attack in progress, allowing for automated host isolation to stop the attack before it spreads.
Rapid7 conducts an incident response engagement where the Kyber ransomware is first analyzed.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats