Ransomware - Kyber

Kyber (Active)
Description

Uses AES-256-CTR to encrypt files with Curve25519 + Kyber-1024 quantum encryption to create encryption keys. Likely named after the encryption mechanism Kyber-1024, which is seldom seen or used for ransomware at the time of it's inception.

Known for publishing a well-known US Defense Contractor as first victim.

This entry is under construction. However, we have included some details below.

Ransomware Type
Crypto-Ransomware
Data Broker
First Seen
Extortion Types
Direct Extortion
Double Extortion
Free Data Leaks
Communication
Medium
Identifier
TOR
Encryption
Type
Hybrid
Files
AES-256-CTR
Key
Kyber-1024
Additional Encryption
Curve25519
File Extension
<file name>.<file extension>.#~~~
Ransom Note Name
READ_ME_NOW.txt
lockerlog_<YYYY.DD.MM_hh.mm.ss>.log
Samples (SHA-256)
4ed176edb75ae2114cda8cfb3f83ac2ecdc4476fa1ef30ad8c81a54c0a223a29
Known Victims
Industry Sector Country Extortion Date Amount (USD)
Defense United States