Kyber Ransomware Debuts with Post-Quantum Encryption, Targeting Windows and ESXi

New Kyber Ransomware Gang Employs Post-Quantum Cryptography in Windows Attacks, Falsely Claims it for ESXi Variant

HIGH
April 24, 2026
6m read
RansomwareMalwareThreat Actor

Related Entities

Threat Actors

Kyber

Organizations

Products & Tech

Other

Kyber Ransomware

Full Report

Executive Summary

A new ransomware-as-a-service (RaaS) operation, identifying itself as Kyber, has emerged, targeting both Windows and VMware ESXi environments. In a notable technical development, the Windows variant of the ransomware employs a hybrid encryption scheme that incorporates Kyber1024, a post-quantum cryptography (PQC) algorithm. The ransomware, written in Rust, uses the AES-CTR algorithm for file encryption and protects the symmetric key with a combination of Kyber1024 and the X25519 elliptic-curve algorithm. While this represents a forward-looking approach by threat actors to 'future-proof' their encrypted data against potential advances in quantum computing, security analysts at Rapid7 assess its current use as primarily a psychological and marketing tactic. The group's Linux-based ESXi variant falsely claims to use PQC, instead relying on traditional ChaCha8 and RSA-4096 cryptography. The gang is actively extorting victims and has already listed a multi-billion-dollar American defense contractor on its leak site.

Threat Overview

Threat Actor: Kyber Ransomware Gang Malware: Kyber Ransomware (Windows and Linux/ESXi variants) Targets: Windows and VMware ESXi systems across various sectors, with an early identified victim in the U.S. defense industry.

The Kyber operation was first analyzed by Rapid7 during an incident response engagement in March 2026. The attackers deploy two distinct encryptor variants tailored to their target operating systems, sharing the same campaign IDs and ransom infrastructure. The primary attack vector for initial access has not been detailed, but the malware's post-exploitation behavior is designed for maximum damage and to impede recovery. The Windows variant performs typical ransomware actions such as deleting shadow copies, clearing event logs, and terminating critical services before encryption. The ESXi variant focuses on enumerating and encrypting virtual machine files (.vmdk, .vmsn, .vswp) and defacing the ESXi management interface.

Technical Analysis

The most significant aspect of the Kyber ransomware is its use of post-quantum cryptography in the Windows variant.

Windows Variant (Rust-based)

ESXi Variant (Linux-based)

The use of PQC is a strategic choice. While it offers no immediate advantage since current computers cannot break RSA-4096, it allows the threat actor to claim that even if the victim stores the encrypted data, it will remain secure against future quantum computers. This adds a layer of psychological pressure to pay the ransom.

Impact Assessment

The operational impact on a victim organization is severe, consistent with other modern ransomware attacks. The encryption of both Windows workstations/servers and VMware ESXi hypervisors can lead to a complete shutdown of business operations. For the ESXi variant, encrypting datastores means all hosted virtual machines become inaccessible, crippling production systems, databases, and internal services. The Windows variant's ability to terminate SQL and Exchange services further disrupts critical business functions. The double extortion model, where data is exfiltrated before encryption, adds the risk of a massive data breach, regulatory fines (e.g., GDPR, HIPAA), reputational damage, and loss of intellectual property. The targeting of a defense contractor highlights the threat to national security and sensitive government data.

IOCs — Directly from Articles

No specific file hashes, IP addresses, or domains were mentioned in the source articles.

Cyber Observables — Hunting Hints

Security teams may want to hunt for the following patterns to detect Kyber ransomware activity:

Type
process_name
Value
vssadmin.exe delete shadows /all /quiet
Description
Command line pattern for deleting volume shadow copies.
Type
process_name
Value
wevtutil.exe cl
Description
Command line pattern for clearing Windows Event Logs.
Type
command_line_pattern
Value
esxcli vm process kill
Description
Command used on ESXi hosts to terminate running virtual machines before encryption.
Type
file_path
Value
/usr/lib/vmware/hostd/docroot/ui/index.html
Description
The file on an ESXi host that is often modified to display a ransom note on the web interface.
Type
file_extension
Value
.kyber
Description
A likely file extension appended to encrypted files (hypothesized based on malware name).

Detection & Response

  • Behavioral Analysis: Deploy Endpoint Detection and Response (EDR) solutions capable of detecting ransomware behaviors, such as rapid file modification, deletion of shadow copies (T1490 - Inhibit System Recovery), and clearing of event logs (T1070.001 - Clear Windows Event Logs). Monitor for the execution of vssadmin.exe, wbadmin.exe, and wevtutil.exe.
  • ESXi Monitoring: Enable SSH on ESXi hosts and forward logs to a central SIEM. Monitor for suspicious command-line activity, especially esxcli commands used to list or kill VMs. Use Network Traffic Analysis to baseline normal ESXi management traffic and alert on anomalies.
  • File Integrity Monitoring: Monitor critical system files on ESXi hosts, such as the index.html file for the management UI, to detect defacement attempts.
  • Response: If Kyber is detected, immediately isolate affected hosts from the network to prevent lateral movement. If ESXi hosts are compromised, power down non-essential VMs and disconnect vSAN storage if possible to limit the blast radius.

Mitigation

  • Secure ESXi: Harden ESXi hosts by disabling unused services, restricting access to management interfaces to a dedicated VLAN, enabling lockdown mode, and using complex, unique credentials with Multi-factor Authentication (MFA).
  • Backup and Recovery: Maintain offline and immutable backups of critical data and virtual machines. Regularly test restoration procedures to ensure they are effective.
  • Network Segmentation: Segment networks to separate critical servers (like ESXi hosts) from user workstations. This can prevent a compromise on a user machine from spreading to the virtualization infrastructure.
  • Patch Management: Although no specific vulnerability was mentioned for initial access, maintaining a robust patch management program (M1051 - Update Software) is crucial to reduce the attack surface.

Timeline of Events

1
March 1, 2026
Rapid7 conducts an incident response engagement where the Kyber ransomware is first analyzed.
2
April 24, 2026
This article was published

MITRE ATT&CK Mitigations

Isolate critical infrastructure like ESXi hosts from general corporate networks to prevent lateral movement.

Mapped D3FEND Techniques:

Enforce MFA on all management interfaces, especially for critical systems like VMware vCenter and ESXi hosts.

Mapped D3FEND Techniques:

Use EDR/XDR tools to detect and block malicious behaviors like shadow copy deletion and mass file encryption.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

To defend against ransomware like Kyber that specifically targets virtualization infrastructure, organizations must implement rigorous platform hardening for VMware ESXi hosts. This involves more than just patching. Access to ESXi management interfaces should be restricted to a dedicated, isolated management network, inaccessible from the general user network. Enable ESXi's 'Lockdown Mode' to limit management capabilities to vCenter only, preventing direct host management via SSH or the host client. Disable all unnecessary services and ports on the hosts, such as the CIM server, to minimize the attack surface. Furthermore, enforce strong, unique passwords for the root account and integrate vCenter with a centralized identity provider that requires multi-factor authentication. These steps directly counter the lateral movement and host takeover techniques used by ESXi-targeting ransomware, making it significantly harder for attackers to gain the control needed to encrypt virtual machines.

For the Windows variant of Kyber, real-time process analysis is a critical detective and preventative control. EDR solutions should be configured with specific rules to detect and block the sequence of commands indicative of a ransomware pre-encryption script. Create a high-severity alert for any process that spawns vssadmin.exe delete shadows, bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures, and wevtutil.exe cl in a short time window. Since the Kyber ransomware is written in Rust, its executable may not be flagged by simple signature-based antivirus. Therefore, behavioral analysis is key. Monitor for unsigned processes performing rapid file I/O operations with high entropy, which is characteristic of encryption. Correlating this file activity with preceding service termination commands (e.g., for SQL or Exchange) can provide a high-confidence signal of a ransomware attack in progress, allowing for automated host isolation to stop the attack before it spreads.

Timeline of Events

1
March 1, 2026

Rapid7 conducts an incident response engagement where the Kyber ransomware is first analyzed.

Sources & References

Kyber ransomware gang toys with post-quantum encryption on Windows
BleepingComputer (bleepingcomputer.com) April 22, 2026
Kyber Ransomware Claims Post-Quantum Encryption on Windows Systems
Wildcat Cyber Patrol (wildcatcyberpatrol.com) April 23, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

RansomwareKyberPQCPost-Quantum CryptographyVMware ESXiWindowsRust

📢 Share This Article

Help others stay informed about cybersecurity threats