A new and sophisticated ransomware family, named KYBER, has been discovered by researchers at CYFIRMA. The malware distinguishes itself by using an advanced hybrid encryption scheme that combines AES-256-CTR, X25519, and the quantum-resistant Kyber1024 algorithm, making decryption without the private key computationally infeasible. The operators are already engaging in double extortion, claiming to exfiltrate significant amounts of data before encryption and threatening to publish it on a leak blog. The campaign appears to be in its early stages but shows signs of evolving into a structured, data-driven extortion operation, with the potential to become a scalable Ransomware-as-a-Service (RaaS) threat.
KYBER ransomware targets Windows environments, including network shares and removable drives. Upon execution, it encrypts files, appending a random extension like .#~~~, and drops a ransom note named ReadMeForDecrypt.txt. The note details the encryption method and instructs the victim to make contact within one to two weeks to prevent their data from being leaked. The attackers offer to decrypt three small files for free to prove their capability. The primary targets are currently organizations in English-speaking regions such as the United States, Western Europe, and Australia, with a focus on industries like Aerospace & Defense, government contractors, and technology firms.
KYBER's most notable feature is its advanced cryptographic implementation.
Kyber1024 algorithm, a candidate in the NIST Post-Quantum Cryptography standardization process, is likely used for key encapsulation to protect the symmetric keys. The X25519 elliptic-curve algorithm is also used, likely for key exchange. The actual file contents are encrypted with the fast and secure AES-256-CTR symmetric cipher.T1486 - Data Encrypted for Impact): The ransomware systematically traverses local drives, removable media, and mapped network shares to encrypt files.T1567 - Exfiltration Over Web Service): Before encryption, the malware exfiltrates sensitive data to attacker-controlled infrastructure. The exact tools used for exfiltration are not yet known but are a key part of its data-driven extortion model.The emergence of KYBER represents a concerning evolution in the ransomware landscape. The use of a post-quantum algorithm, while possibly more of a marketing gimmick at this stage, demonstrates a growing sophistication among threat actors. If KYBER transitions to a RaaS model as predicted, it could quickly proliferate and become a widespread threat. For victims, the combination of robust encryption and data theft presents a difficult dilemma. The loss of access to critical files can halt business operations, while the public leak of sensitive data can lead to severe reputational damage, regulatory fines, and loss of competitive advantage.
ReadMeForDecrypt.txt or files with unusual extensions like .#~~~. This can be done with file content rules (D3-FCR).D3-PA) is key here.Standard ransomware defenses are effective against KYBER.
M1030 - Network Segmentation): Segment the network to prevent the ransomware from spreading from a compromised workstation to critical servers and backup systems.M1026 - Privileged Account Management): Ensure user and service accounts have only the minimum permissions necessary. This can limit the scope of files a ransomware process can encrypt.M1017 - User Training): Train users to recognize and report phishing emails, which are a common initial access vector for ransomware.Use endpoint protection to detect and block known ransomware executables.
Isolate critical assets to prevent the spread of ransomware across the network.
Deploy EDR tools that can detect ransomware-like behavior, such as mass file encryption, and terminate the process.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats