AI & TechArtificial IntelligenceCybersecurityNewswireTechnology

First ransomware family confirmed as quantum-safe

▼ Summary

– A ransomware family called Kyber claims to use ML-KEM, an encryption standard resistant to attacks by quantum computers.
– Kyber ransomware has been active since at least September 2024 and gained attention for its quantum-safe encryption claims.
– ML-KEM is an asymmetric encryption method based on lattice problems that quantum computers cannot solve efficiently.
– The algorithm is designed to replace current cryptosystems like RSA and Elliptic Curve, which quantum computers could break.
– The ransomware’s use of post-quantum cryptography is primarily a marketing tactic to hype its encryption strength.

A newly identified ransomware strain is making waves for a bold claim: its encryption is resistant to attacks from quantum computers. The malware, named Kyber, has been active since at least September of last year and quickly drew scrutiny for its use of ML-KEM, a post-quantum cryptographic standard developed by the National Institute of Standards and Technology. The ransomware borrows its name from the algorithm’s former moniker, which was also Kyber; for clarity, this article will refer to the malware as Kyber and the algorithm as ML-KEM.

This is largely a marketing play. ML-KEM, or Module Lattice-based Key Encapsulation Mechanism, is an asymmetric encryption method designed for secure key exchange. It relies on mathematical problems involving lattice structures, which quantum computers have no special advantage in solving. In contrast, traditional systems like Elliptic Curve and RSA are built on problems that sufficiently powerful quantum machines could crack. By adopting ML-KEM, Kyber positions itself as a next-generation threat, but experts caution that the move is more about perception than practical necessity. The real danger remains the same: ransomware that locks files and demands payment, now with a futuristic twist in its sales pitch.

(Source: Ars Technica)

Topics

ransomware evolution 95% post-quantum cryptography 92% ml-kem algorithm 90% quantum computing threats 85% encryption marketing 82% nist standards 80% cybersecurity threats 78% asymmetric encryption 75% lattice-based cryptography 73% ransomware families 70%