Kaspersky Report: Ransomware Landscape Shifts to Post-Quantum Encryption, Data Leak Extortion, and EDR Evasion

Ransomware Evolves in 2026: Attackers Adopt Post-Quantum Crypto and Encryptionless Extortion

HIGH
May 12, 2026
6m read
RansomwareThreat IntelligenceThreat Actor

Related Entities

Threat Actors

ShinyHuntersInitial Access Brokers (IABs)

Organizations

Products & Tech

Remote Desktop Protocol (RDP)VPN

Full Report

Executive Summary

On International Anti-Ransomware Day, Kaspersky released its annual report on the ransomware threat landscape, highlighting profound tactical evolutions in 2026. While the overall percentage of organizations impacted by ransomware saw a slight decline in 2025, the nature of the threat has become more sophisticated and dangerous. The report identifies three key trends: the adoption of post-quantum cryptography by advanced groups to ensure long-term data decryption impossibility; a significant shift towards 'encryptionless extortion' where data theft and public leakage is the sole threat; and the methodical, widespread use of tools and techniques like 'EDR killers' and Bring Your Own Vulnerable Driver (BYOVD) to disable security measures before payload deployment.

Threat Overview

The 2026 ransomware ecosystem is characterized by adaptation and specialization. Threat actors are not just encrypting data; they are building multi-faceted extortion schemes.

  1. Post-Quantum Cryptography (PQC): For the first time, ransomware families have been observed in the wild using quantum-resistant encryption algorithms. This is a forward-looking strategy. Attackers are encrypting data today knowing that even if victims back it up, the data will remain securely encrypted against future quantum computers, making the extortion demand perpetually relevant.

  2. Encryptionless Extortion: Groups like ShinyHunters are pioneering a model that bypasses the encryption step altogether. They gain access, exfiltrate sensitive data, and then threaten to leak it publicly. This approach is faster, stealthier (as it avoids noisy encryption processes that might trigger alerts), and removes the need for the attackers to maintain complex and potentially buggy encryption software.

  3. Systematic Evasion: The neutralization of endpoint security is no longer an opportunistic step but a core, planned phase of the attack. Ransomware operators are heavily utilizing 'EDR killers' (tools designed to terminate security agent processes) and BYOVD techniques. The BYOVD method involves using a legitimate, signed (but vulnerable) driver to execute malicious code with kernel-level privileges, effectively blinding EDR and antivirus solutions.

  4. Initial Access: The reliance on Initial Access Brokers (IABs) remains strong. IABs continue to sell access to corporate networks, with compromised Remote Desktop Protocol (RDP), VPNs, and especially RDWeb being the most common entry points.

Technical Analysis

Post-Quantum Cryptography

  • Implementation: Involves using algorithms like CRYSTALS-Kyber (for key exchange) and CRYSTALS-Dilithium (for digital signatures), which are standardized by NIST.
  • Impact: Makes encrypted data theoretically immune to decryption by future quantum computers, increasing the long-term leverage of the extortion.

BYOVD (Bring Your Own Vulnerable Driver)

  • Process:
    1. Attacker gains initial access and elevates privileges to administrator.
    2. Attacker drops a known-vulnerable but legitimately signed driver (e.g., from a hardware vendor) onto the system.
    3. The attacker loads this driver into the kernel.
    4. They exploit the vulnerability in the driver to run their own malicious code with kernel-level permissions.
    5. This kernel-level code is then used to terminate security processes (e.g., MsMpEng.exe, SentinelAgent.exe) in a way that the EDR cannot protect itself.

MITRE ATT&CK Techniques

Impact Assessment

These evolving tactics have significant implications for organizations:

  • Future-Proofed Extortion: Data encrypted with PQC may be permanently lost if the key is not paid for, as future technological advances won't be able to break it.
  • Increased Reputational Damage: The shift to encryptionless extortion makes every ransomware attack a data breach by default. The primary impact shifts from operational downtime to severe reputational damage, regulatory fines (GDPR, HIPAA), and loss of customer trust.
  • Evasion of Modern Defenses: The systematic targeting of EDR solutions means that organizations relying solely on endpoint protection are increasingly blind to the most critical stages of a ransomware attack.

IOCs — Directly from Articles

No specific Indicators of Compromise were provided in the source articles.

Cyber Observables — Hunting Hints

Security teams may want to hunt for the following patterns related to these new trends:

  • Driver Loading: Monitor for the loading of unusual or known-vulnerable drivers. Track driver load events (e.g., Windows Event ID 7045) and correlate them with process termination events for security agents.
  • Data Staging: For encryptionless extortion, hunt for large-scale data aggregation. Look for the creation of large archive files (.zip, .rar, .7z) on servers or workstations, followed by large outbound data transfers to cloud storage or unfamiliar IP addresses.
  • Security Service Tampering: Create alerts for the termination or modification of critical security services and processes. Any attempt to stop an EDR agent should be a high-priority alert.

Detection & Response

  • Detection:

    • Tamper Protection: Ensure that all endpoint security solutions have tamper protection enabled and monitored. This is a critical feature to defend against 'EDR killers'.
    • Driver Control: Use application control policies to restrict the loading of all but a pre-approved list of drivers. This is a core principle of D3FEND Driver Load Integrity Checking (D3-DLIC).
    • Data Loss Prevention (DLP): Deploy and tune DLP solutions to detect and block the unauthorized exfiltration of large volumes of sensitive data.
  • Response:

    • If EDR tampering is detected, assume the host is fully compromised and move to isolate it from the network immediately.
    • In an encryptionless extortion scenario, the response plan must pivot from data recovery to crisis communication, legal counsel engagement, and regulatory notification.

Mitigation

  • Backup and Recovery: While less effective against encryptionless extortion, immutable, offline backups remain the single most important defense against data encryption attacks.
  • Harden Access Vectors: Aggressively patch VPNs and other edge devices. Enforce strong, phishing-resistant MFA on all external access points, especially RDP and RDWeb. This aligns with D3FEND Multi-factor Authentication (D3-MFA).
  • Kernel Protection: Enable virtualization-based security (VBS) and Hypervisor-Protected Code Integrity (HVCI) on Windows systems to protect the kernel from malicious code injection via vulnerable drivers.
  • Network Segmentation: Segment networks to prevent attackers from moving laterally after gaining initial access. This can contain the blast radius of an attack and hinder data exfiltration from sensitive data stores.

Timeline of Events

1
May 12, 2026
Kaspersky releases its annual ransomware report on International Anti-Ransomware Day.
2
May 12, 2026
This article was published

MITRE ATT&CK Mitigations

Utilize EDR/EPP solutions with strong behavioral detection and tamper-proofing to identify and block processes attempting to disable security tools.

Use application allowlisting or driver control policies to prevent the loading of unauthorized or known-vulnerable drivers used in BYOVD attacks.

Implement egress filtering and DLP to detect and block the large-scale data exfiltration that is central to encryptionless extortion.

Enforce phishing-resistant MFA on all remote access points (VPN, RDP) to disrupt the initial access chain provided by IABs.

D3FEND Defensive Countermeasures

The rise of Bring Your Own Vulnerable Driver (BYOVD) attacks makes Driver Load Integrity Checking a critical defense. This technique directly counters an attacker's ability to load a malicious or vulnerable driver to gain kernel-level privileges and disable security tools. Implementation should involve using modern endpoint security solutions and operating system features like Windows Defender Application Control (WDAC) to create a policy that only allows a specific set of known, trusted drivers to be loaded. Any attempt to load an unauthorized driver is blocked and logged. This is not a simple 'on/off' switch; it requires a period of auditing to build a baseline of necessary drivers in your environment. Once enforced, this policy effectively neuters the BYOVD technique, forcing attackers to find other, often more difficult, paths to escalation and ensuring your EDR and other security agents remain active and protected.

To combat the trend of 'encryptionless extortion,' Outbound Traffic Filtering is paramount. Since the attacker's primary goal is data exfiltration, controlling and monitoring outbound data flows can disrupt the entire attack. Organizations should configure firewalls and web proxies to deny all outbound traffic by default, only allowing connections to known, approved destinations on specific ports. For sensitive servers that have no business communicating directly with the internet, all outbound access should be blocked. For workstations, this means restricting access to unsanctioned file sharing and cloud storage sites. Furthermore, this technique should be combined with Network Traffic Analysis (NTA) and Data Loss Prevention (DLP) to inspect the content and volume of allowed traffic, alerting on or blocking transfers that contain sensitive data patterns or are anomalously large.

Given the increased sophistication and stealth of modern ransomware attacks, deception technology offers a powerful way to detect threats that have bypassed traditional defenses. A Decoy Environment, or honeypot, can be configured to mimic a real production system, complete with fake sensitive documents, databases, and credentials. These decoys are placed strategically within the network. Since no legitimate user has a reason to access them, any interaction is, by definition, malicious. If a ransomware actor, having bypassed EDR, begins network reconnaissance or lateral movement, they are likely to encounter and interact with a decoy. This interaction provides a high-fidelity, low-false-positive alert, giving the security team early warning of an active intrusion and valuable intelligence on the attacker's TTPs before they reach actual critical assets.

Timeline of Events

1
May 12, 2026

Kaspersky releases its annual ransomware report on International Anti-Ransomware Day.

Sources & References

Reviewing the trends in ransomware attacks in 2026
Kaspersky Securelist (securelist.com) May 12, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

RansomwareKasperskyPost-Quantum CryptographyPQCEncryptionless ExtortionShinyHuntersEDR EvasionBYOVD

📢 Share This Article

Help others stay informed about cybersecurity threats

🎯 MITRE ATT&CK Mapped

Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.

🧠 Enriched & Analyzed

Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.

🛡️ Actionable Guidance

Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.

🔗 STIX Visualizer

Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.

Sigma Generator

Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.