Cybersecurity

In a first, a ransomware family is confirmed to be quantum-safe

Published byAIDaily Editorial Team
3 min read
Original source author: Dan Goodin

Technically speaking, there's no practical benefit to use PQC. So why is it being used?

Share:
In a first, a ransomware family is confirmed to be quantum-safe

Technically speaking, there’s no practical benefit to use PQC. So why is it being used?

A relatively new ransomware family is using a novel approach to hype the strength of the encryption used to scramble files—making, or at least claiming, that it is protected against attacks by quantum computers.

Kyber, as the ransomware is called, has been around since at least last September and quickly attracted attention for the claim that it used ML-KEM , short for Module Lattice-based Key Encapsulation Mechanism and is a standard shepherded by the National Institute of Standards and Technology. The Kyber ransomware name comes from the alternate name for ML-KEM, which is also Kyber. For the rest of the article, Kyber refers to the ransomware; the algorithm is referred to as ML-KEM.

ML-KEM is an asymmetric encryption method for exchanging keys. It involves problems based on lattices, a structure in mathematics that quantum computers have no advantage in solving over classic computing. ML-KEM is designed to replace Elliptic Curve and RSA cryptosystems, both of which are based on problems that quantum computers with sufficient strength can tackle.

On Tuesday, security firm Rapid7 said it reverse-engineered Kyber and found that the Windows variant used ML-KEM1024, the highest strength version of the PQC (post-quantum cryptography) standard. Kyber was using ML-KEM to conceal the key used to encrypt victims’ data with AES-256, a symmetric cryptographic standard that is also quantum-proof. (As reported previously , AES-128 would have sufficed in withstanding a quantum attack.) Brett Callow, a threat analyst at security firm Emsisoft, said it’s the first confirmed case of ransomware using PQC.

There is no practical benefit for Kyber developers to have chosen a PQC key-exchange algorithm. The Kyber ransom note gives victims one week to respond. Quantum computers capable of running Shor’s algorithm —the series of mathematical equations that allow the breakage of RSA and ECC (elliptic curve cryptography)—are, at a minimum, three years away and likely much further.

A Kyber variant that targets systems running VMware, meanwhile, claims to use ML-KEM as well. Rapid7 said its look under the hood revealed that, in fact, it uses RSA with 4096-bit keys, a strength that will take even longer for Shor’s algorithm to break. Anna Širokova, a Rapid7 senior security researcher and the author of Tuesday’s post, said the use or claimed use of ML-KEM is likely just a branding gimmick and that implementing it required relatively little work by Kyber developers.

First, it’s marketing to the victim. “Post-quantum encryption” sounds a lot scarier than “we used AES,” especially to non-technical decision-makers who might be evaluating whether to pay. It’s a psychological trick. They’re not worried about someone breaking the encryption a decade from now. They want payment within 72 hours.

Second, implementation cost is low. Kyber1024 libraries (renamed to ML-KEM ) are available and well-documented. Ransomware doesn’t encrypt your files directly with Kyber1024. That would be slow. Instead, it:

Encrypts your files with that AES key (fast)

Encrypts that AES key with Kyber1024 (so only the attacker can decrypt it)

In Rust, there are already libraries that do Kyber1024. The developer just adds it to their dependencies and calls a function to wrap the key.

Despite the hype, Kyber suggests that PQC is attracting the attention of less technically inclined attorneys and executives deciding how to respond to ransom demands. Kyber developers are hoping the impression that the encryption has overwhelming strength will sway people to pay.

Key takeaways

  • The use of post-quantum cryptography by ransomware indicates an evolution in cybercriminal tactics.
  • The use of PQC may be a marketing strategy to intimidate victims and enhance the perception of security.
  • Brazilian companies must rigorously evaluate security technologies, considering the rationale behind their implementation.

Editorial analysis

The confirmation that a ransomware family, such as Kyber, is utilizing post-quantum cryptography (PQC) raises significant questions about the evolution of cyber threats. For the Brazilian tech sector, this serves as a wake-up call regarding the need for constant updates to security practices. Although quantum computing technology is still under development, the adoption of algorithms like ML-KEM indicates that cybercriminals are preparing for a future where traditional security may be compromised.

Moreover, the use of PQC by ransomware can be seen as a marketing strategy to enhance the perception of security among potential targets. This suggests that the cybersecurity market should brace for an increase in the sophistication of ransomware campaigns, where the narrative surrounding security can be manipulated to intimidate victims. For Brazilian companies, this implies the need to invest not only in security technology but also in education and awareness about the manipulation tactics used by cybercriminals.

The fact that the implementation of PQC does not offer any immediate practical benefit to Kyber's developers also raises questions about the effectiveness of current security measures. As Brazilian companies adopt security solutions, it is crucial that they evaluate not only the technology itself but also the rationale behind its implementation. The choice of encryption algorithms should be based on a rigorous analysis of real threats, rather than merely market trends.

Finally, this situation demands that Brazil, as part of the global tech ecosystem, stay informed about emerging trends in cybersecurity. Collaboration between companies, governments, and research institutions will be essential to develop solutions that not only respond to current threats but also anticipate future ones, especially with the advent of quantum computing. What we are witnessing now is just the tip of the iceberg in a scenario that promises to become increasingly complex and challenging.

What this coverage includes

  • Clear source attribution and link to the original publication.
  • Editorial framing about relevance, impact, and likely next developments.
  • Review for readability, context, and duplication before publication.

Original source:

Ars Technica AI

About this article

This article was curated and published by AIDaily as part of our editorial coverage of artificial intelligence developments. The content is based on the original source cited below, enriched with editorial context and analysis. Automated tools may assist with translation and initial structuring, but publication decisions, factual review, and contextual framing remain editorial responsibilities.

Learn more about our editorial process