> Back to All Posts

Kyber Ransomware Hits Windows and VMware With PQC Twist

Kyber Ransomware

A new cyber threat is making waves in the security community — and it comes with a bold claim. Kyber ransomware has emerged as a cross-platform operation hitting both Windows file servers and VMware ESXi infrastructure, with operators advertising post-quantum encryption as part of their attack. The reality, however, is more complicated than the ransom note suggests.

Two Variants, One Coordinated Attack

What makes Kyber ransomware immediately notable is its dual-platform design. Security researchers at Rapid7 recovered two distinct variants during an incident response in March 2026. Both were deployed on the same network. One targeted VMware ESXi infrastructure; the other went after Windows file servers. They share the same campaign identifier and Tor-based ransom infrastructure, which confirms a single affiliate coordinated the attack across both environments.

This approach is deliberate. By hitting both virtual infrastructure and Windows servers at once, the attackers maximize disruption. Organizations that rely on VMware for running core business systems face a near-total operational blackout when both layers are hit simultaneously.

The ESXi variant is purpose-built for VMware environments. It enumerates virtual machines, encrypts datastore files, and defaces ESXi management interfaces with ransom notes. Victims logging into their infrastructure see the ransom demand immediately. The variant can also terminate running virtual machines as part of the attack, leaving nothing operational.

The Windows Variant Goes Further

The Windows variant of Kyber ransomware is written in Rust and takes an aggressive approach to eliminating recovery options. Encrypted files receive the .#~~~ extension. Beyond that, the malware works through a methodical anti-recovery process that goes well beyond simple file encryption.

It deletes shadow copies, disables Windows boot repair, kills SQL Server, Exchange, and backup services, clears event logs, and wipes the Windows Recycle Bin. Each step removes another path a victim might use to restore their data without paying. The variant also includes an experimental feature designed to shut down Hyper-V virtual machines, extending its reach into Microsoft’s own virtualization layer.

Researchers also flagged an unusual detail in the Windows variant. Its mutex — a value used internally by the malware to prevent duplicate processes from running — appears to reference a song on the Boomplay music platform. It is an odd signature, but a distinctive one.

Post-Quantum Encryption: Real, Exaggerated, or Both?

The most discussed aspect of Kyber ransomware is its encryption claims. The name itself borrows from Kyber1024, a post-quantum key encapsulation algorithm standardized by NIST in 2024. Post-quantum cryptography is designed to resist attacks from quantum computers, which could eventually break the encryption methods most systems rely on today.

So what is Kyber ransomware actually doing? The answer depends on which variant you look at.

For the ESXi variant, the post-quantum claims are false. Rapid7’s decompilation of the core encryption logic shows the malware uses ChaCha8 for file encryption and RSA-4096 for key wrapping. No Kyber1024 is present in the Linux encryptor at all. Researchers concluded that the operator likely copied the ransom note from the Windows variant without updating the technical claims to match.

The Windows variant is a different story. Here, Kyber1024 is genuinely implemented — but not for encrypting files. It protects the symmetric key material. AES-CTR handles the actual bulk encryption. So while the post-quantum element is real in the Windows build, it does not change what victims face. Files are locked by AES-CTR. Recovery still requires the attacker’s private key. The encryption used to protect that key is simply harder for future quantum computers to break.

In short: the post-quantum branding is partly real and partly marketing. Either way, it makes no practical difference to victims trying to recover their data.

Why This Matters Beyond One Attack

March 2026 saw over 900 ransomware incidents publicly reported, according to Rapid7’s research. Kyber ransomware is one operation among many, but it represents a direction the threat landscape is moving toward. Ransomware groups are building more specialized tools. Cross-platform capability is no longer unusual — it is becoming expected.

The integration of post-quantum language into ransom notes is also worth watching. Whether the claims are technically accurate or inflated, they signal that ransomware operators are paying attention to the same cryptographic conversations that security teams are having. Some groups will adopt real post-quantum encryption over time. When that happens, the decryption tools that sometimes help victims today will become far less viable.

For businesses running VMware ESXi or Windows Server environments, Kyber ransomware is a reminder that modern attacks do not stop at one platform. Attackers now plan for full infrastructure coverage.

Protecting Your Infrastructure

No single control eliminates ransomware risk, but layered defenses significantly reduce exposure. Offline and immutable backups remain the most reliable recovery option — ones that cannot be deleted or encrypted by malware running on the same network. Shadow copies and on-device backups are no longer sufficient on their own, as Kyber ransomware demonstrates by targeting them directly.

Network segmentation limits how far an attacker can move after an initial compromise. Keeping VMware ESXi management interfaces off public-facing networks reduces the attack surface. Monitoring for unusual service termination, volume shadow copy deletion, and event log clearing can provide early warning that ransomware is executing.

Patching remains essential. Many ransomware affiliates rely on known vulnerabilities to gain initial access. Keeping ESXi hosts, Windows Server, and hypervisor management tools up to date closes doors that operators like those behind Kyber ransomware depend on staying open.

Final Thoughts

Kyber ransomware is not technically groundbreaking. It does not use novel exploits or unprecedented methods. What it does is execute a well-planned, cross-platform attack designed to cause maximum disruption with minimal complexity. The post-quantum angle adds an interesting technical detail, but the real story is the specialization. Ransomware groups are building tools that hit every layer of an organization’s infrastructure at once. That shift demands a defense strategy that matches the same scope.

Janet Andersen

Janet is an experienced content creator with a strong focus on cybersecurity and online privacy. With extensive experience in the field, she’s passionate about crafting in-depth reviews and guides that help readers make informed decisions about digital security tools. When she’s not managing the site, she loves staying on top of the latest trends in the digital world.