Skip to content

ABC Tool

  • Home
  • About / Contect
    • PRIVACY POLICY
In a first, a ransomware family is confirmed to be quantum-safe

In a first, a ransomware family is confirmed to be quantum-safe

Posted on April 24, 2026 By safdargal12 No Comments on In a first, a ransomware family is confirmed to be quantum-safe
Blog

There is no practical benefit for Kyber developers to have chosen a PQC key-exchange algorithm. The Kyber ransom note gives victims one week to respond. Quantum computers capable of running Shor’s algorithm—the series of mathematical equations that allow the breakage of RSA and ECC (elliptic curve cryptography)—are, at a minimum, three years away and likely much further.

A Kyber variant that targets systems running VMware,  meanwhile, claims to use ML-KEM as well. Rapid7 said its look under the hood revealed that, in fact, it uses RSA with 4096-bit keys, a strength that will take even longer for Shor’s algorithm to break. Anna Širokova, a Rapid7 senior security researcher and the author of Tuesday’s post, said the use or claimed use of ML-KEM is likely just a branding gimmick and that implementing it required relatively little work by Kyber developers.

In an email, Širokova wrote:

First, it’s marketing to the victim. “Post-quantum encryption” sounds a lot scarier than “we used AES,” especially to non-technical decision-makers who might be evaluating whether to pay. It’s a psychological trick. They’re not worried about someone breaking the encryption a decade from now. They want payment within 72 hours.

Second, implementation cost is low. Kyber1024 libraries (renamed to ML-KEM) are available and well-documented. Ransomware doesn’t encrypt your files directly with Kyber1024. That would be slow. Instead, it:

  1. Generates a random AES key
  2. Encrypts your files with that AES key (fast)
  3. Encrypts that AES key with Kyber1024 (so only the attacker can decrypt it)

In Rust, there are already libraries that do Kyber1024. The developer just adds it to their dependencies and calls a function to wrap the key.

Despite the hype, Kyber suggests that PQC is attracting the attention of less technically inclined attorneys and executives deciding how to respond to ransom demands. Kyber developers are hoping the impression that the encryption has overwhelming strength will sway people to pay.



Source link

Post Views: 2

Post navigation

❮ Previous Post: Surveys reveal readers are cutting Kindles out of their lives, and a rival is winning them over
Next Post: Honor 600 and Honor 600 Pro land in Europe, here are the prices ❯

You may also like

Two-year-old Surface PCs get 0 price hikes as sub-,000 models go away
Blog
Two-year-old Surface PCs get $300 price hikes as sub-$1,000 models go away
April 14, 2026
Introducing Remote Terminal for Windows
Blog
Introducing Remote Terminal for Windows
April 10, 2026
Today’s NYT Mini Crossword Answers for April 20
Blog
Today’s NYT Mini Crossword Answers for April 20
April 21, 2026
Nothing’s modular CMF Headphone Pro are down to their lowest price to date
Blog
Nothing’s modular CMF Headphone Pro are down to their lowest price to date
April 19, 2026

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • Rocket Report: Artemis III rocket getting ready; SpaceX is now an AI company
  • Uber CTO Praveen Neppalli Naga joins StrictlyVC SF
  • Poco C81 arrives with a 120Hz screen and 6,300 mAh battery, C81x tags along
  • Spotify mobile finally gets playlist folders 15 years after desktop
  • Apple’s Next CEO Has a Different Battle Ahead

Recent Comments

No comments to show.

Archives

  • April 2026

Categories

  • Blog

Copyright © 2026 ABC Tool.

Theme: Oceanly News by ScriptsTown