HomeIntelligenceBrief
🔓 BREACH BRIEF🟠 High💀 Ransomware

Kyber Ransomware Deploys Post‑Quantum Encryption Against Windows and VMware ESXi Servers, Hits Defense Contractor

Rapid7 identified two Kyber ransomware variants that encrypt Windows file servers and VMware ESXi hosts using post‑quantum Kyber1024 and classic RSA‑4096. The campaign, linked to a multi‑billion‑dollar U.S. defense contractor, deletes backups and disables services, raising supply‑chain risk for critical‑infrastructure vendors.

🛡️ LiveThreat™ Intelligence · 📅 April 23, 2026· 📰 bleepingcomputer.com
🟠
Severity
High
💀
Type
Ransomware
🎯
Confidence
High
🏢
Affected
3 sector(s)
Actions
3 recommended
📰
Source
bleepingcomputer.com

Kyber Ransomware Uses Post‑Quantum Encryption to Target Windows File Servers and VMware ESXi, Impacts Defense Contractor

What Happened – In March 2026 Rapid7 observed two Kyber ransomware variants: one encrypting Windows file servers (written in Rust) and another attacking VMware ESXi hosts. The Windows variant employs Kyber1024 key‑encapsulation and X25519 for key protection, while the ESXi variant uses ChaCha8 and RSA‑4096. Both encryptors delete backups, shadow copies, and services, and the campaign is linked to a multi‑billion‑dollar U.S. defense contractor listed on the Kyber extortion portal.

Why It Matters for TPRM

  • Ransomware that leverages emerging post‑quantum cryptography may evade traditional decryption tools, extending dwell time.
  • The attack spans both physical and virtual infrastructure, increasing supply‑chain exposure for vendors that host or manage VMs.
  • A high‑profile defense contractor victim signals potential targeting of other critical‑infrastructure suppliers.

Who Is Affected – Government & defense contractors, IT services providers, cloud‑hosting and virtualization service vendors.

Recommended Actions

  • Verify that all third‑party vendors enforce immutable backup strategies and offline storage.
  • Conduct a cryptographic‑tool audit to ensure decryption capabilities for both classic and post‑quantum algorithms.
  • Review and harden VMware ESXi and Hyper‑V configurations, disabling unnecessary remote management interfaces.

Technical Notes – The ESXi variant enumerates VMs, encrypts datastore files, and defaces the management UI; it uses ChaCha8 for bulk encryption and RSA‑4096 for key wrapping. The Windows variant encrypts files with AES‑CTR, protects the symmetric key with Kyber1024/Kyber‑KEM and X25519, and appends “.#~~~” to encrypted files. Both variants delete shadow copies, kill SQL/Exchange/backup services, and may terminate VMs. Source: BleepingComputer

📰 Original Source
https://www.bleepingcomputer.com/news/security/kyber-ransomware-gang-toys-with-post-quantum-encryption-on-windows/

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

🛡️

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.