Ethical Hacking News
In a surprising move, a newly discovered ransomware family has been found using a novel approach to hype its encryption strength, claiming to be protected against attacks by quantum computers. But is this just marketing hype? Experts weigh in on the implications of this development and what it means for the fight against quantum computing threats.
The newly discovered ransomware family "Kyber" is exploiting quantum-resistant encryption technique ML-KEM. The use of ML-KEM has raised both excitement and skepticism in the security community due to its potential benefits and implementation challenges. Post-quantum cryptography (PQC) algorithms like ML-KEM are being developed as a solution to traditional encryption techniques vulnerable to quantum computer attacks. The use of ML-KEM has been questioned by some experts who believe it provides no practical benefit due to its relatively easy implementation. Experts acknowledge that the attention surrounding PQC is not entirely unwarranted, as less technically inclined individuals may be swayed by the impression of overwhelming strength provided by the use of ML-KEM.
The world of cyber security has just taken an interesting turn as a newly discovered ransomware family, dubbed "Kyber," is exploiting the latest quantum-resistant encryption technique. According to recent findings by security firm Rapid7, Kyber's Windows variant uses Module Lattice-based Key Encapsulation Mechanism (ML-KEM)1024, which is considered a high-strength version of the post-quantum cryptography (PQC) standard.
The use of ML-KEM by Kyber has been met with both excitement and skepticism in the security community. While some have hailed it as a potential game-changer in the fight against quantum computing threats, others have expressed concerns about its practical benefits and implementation challenges.
To understand why Kyber is using ML-KEM, we need to delve into the world of post-quantum cryptography. As traditional encryption techniques like RSA and Elliptic Curve begin to be vulnerable to attacks by quantum computers, PQC algorithms like ML-KEM are being developed as a potential solution.
ML-KEM is an asymmetric encryption method that uses problems based on lattices, which are structures in mathematics that quantum computers have no advantage in solving over classic computing. This makes it a promising candidate for protecting sensitive data against quantum computer attacks.
However, the use of ML-KEM by Kyber has been questioned by some experts. In an interview with Ars Technica, Anna Širokova, a Rapid7 senior security researcher and author of the recent post, noted that there is no practical benefit to using PQC. "The claim that 'post-quantum encryption' sounds scarier than 'we used AES'" is likely a marketing tactic designed to sway decision-makers into paying ransom.
Moreover, Širokova pointed out that implementing ML-KEM requires relatively little work by Kyber developers. The ransomware doesn't directly use Kyber1024 libraries; instead, it generates a random AES key and encrypts files with that key before wrapping the AES key in Kyber1024.
Despite this, experts like Širokova acknowledge that the attention surrounding PQC is not entirely unwarranted. Less technically inclined attorneys and executives may be swayed by the impression of overwhelming strength provided by the use of ML-KEM.
The implications of Kyber's use of ML-KEM are far-reaching. As quantum computers capable of breaking certain encryption techniques continue to develop, it is essential that we understand the potential benefits and drawbacks of PQC algorithms like ML-KEM.
In conclusion, while Kyber's exploitation of ML-KEM has raised eyebrows in the security community, it also serves as a reminder of the ongoing cat-and-mouse game between attackers and defenders in the realm of cyber security. As we navigate this complex landscape, it is crucial to separate signal from noise and carefully evaluate the practical benefits and implementation challenges of emerging technologies like PQC.
Related Information:
https://www.ethicalhackingnews.com/articles/Newly-Discovered-Ransomware-Family-Exploits-Quantum-Resistant-Encryption-Technique-ehn.shtml
https://arstechnica.com/security/2026/04/now-even-ransomware-is-using-post-quantum-cryptography/
https://app.daily.dev/posts/in-a-first-a-ransomware-family-is-confirmed-to-be-quantum-safe-ur96wxntm
Published: Thu Apr 23 18:44:00 2026 by llama3.2 3B Q4_K_M