Skip to content

ABC Tool

  • Home
  • About / Contect
    • PRIVACY POLICY
In a first, a ransomware family is confirmed to be quantum-safe

In a first, a ransomware family is confirmed to be quantum-safe

Posted on April 24, 2026 By safdargal12 No Comments on In a first, a ransomware family is confirmed to be quantum-safe
Blog

There is no practical benefit for Kyber developers to have chosen a PQC key-exchange algorithm. The Kyber ransom note gives victims one week to respond. Quantum computers capable of running Shor’s algorithm—the series of mathematical equations that allow the breakage of RSA and ECC (elliptic curve cryptography)—are, at a minimum, three years away and likely much further.

A Kyber variant that targets systems running VMware,  meanwhile, claims to use ML-KEM as well. Rapid7 said its look under the hood revealed that, in fact, it uses RSA with 4096-bit keys, a strength that will take even longer for Shor’s algorithm to break. Anna Širokova, a Rapid7 senior security researcher and the author of Tuesday’s post, said the use or claimed use of ML-KEM is likely just a branding gimmick and that implementing it required relatively little work by Kyber developers.

In an email, Širokova wrote:

First, it’s marketing to the victim. “Post-quantum encryption” sounds a lot scarier than “we used AES,” especially to non-technical decision-makers who might be evaluating whether to pay. It’s a psychological trick. They’re not worried about someone breaking the encryption a decade from now. They want payment within 72 hours.

Second, implementation cost is low. Kyber1024 libraries (renamed to ML-KEM) are available and well-documented. Ransomware doesn’t encrypt your files directly with Kyber1024. That would be slow. Instead, it:

  1. Generates a random AES key
  2. Encrypts your files with that AES key (fast)
  3. Encrypts that AES key with Kyber1024 (so only the attacker can decrypt it)

In Rust, there are already libraries that do Kyber1024. The developer just adds it to their dependencies and calls a function to wrap the key.

Despite the hype, Kyber suggests that PQC is attracting the attention of less technically inclined attorneys and executives deciding how to respond to ransom demands. Kyber developers are hoping the impression that the encryption has overwhelming strength will sway people to pay.



Source link

Post Views: 1

Post navigation

❮ Previous Post: Surveys reveal readers are cutting Kindles out of their lives, and a rival is winning them over
Next Post: Honor 600 and Honor 600 Pro land in Europe, here are the prices ❯

You may also like

Nothing unveils Warp app for easy transfers between Android and your computer
Blog
Nothing unveils Warp app for easy transfers between Android and your computer
April 17, 2026
ChatGPT 5.5 Is All About Math, Science and AI Research
Blog
ChatGPT 5.5 Is All About Math, Science and AI Research
April 24, 2026
FUCK THE CLOUD « ASCII by Jason Scott
Blog
FUCK THE CLOUD « ASCII by Jason Scott
April 15, 2026
Huawei Pura 90 Pro series launch date and design revealed
Blog
Huawei Pura 90 Pro series launch date and design revealed
April 13, 2026

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • Elon Musk and Sam Altman’s court showdown will dish the dirt
  • Amazon’s new Fire TV adapter sounds fast, but it faces a limitation
  • Kids, Social Media and Safety: Why a Years-Long Battle Has No End in Sight
  • AndrewVos/endless-toil: Hear your agent suffer through your code · GitHub
  • Motorola Razr 70 Ultra emerges in official-looking renders

Recent Comments

No comments to show.

Archives

  • April 2026

Categories

  • Blog

Copyright © 2026 ABC Tool.

Theme: Oceanly News by ScriptsTown