Uses AES-256-CTR to encrypt files with Curve25519 + Kyber-1024 quantum encryption to create encryption keys. Likely named after the encryption mechanism Kyber-1024, which is seldom seen or used for ransomware at the time of it's inception.
Known for publishing a well-known US Defense Contractor as first victim.
This entry is under construction. However, we have included some details below.
| Industry Sector | Country | Extortion Date | Amount (USD) |
|---|---|---|---|
| Defense | United States |