Secplicity Blog

Cybersecurity Headlines & Trends Explained

New Kyber Ransomware Posts U.S. Defense Contractor As First Victim

A new ransomware operation known as Kyber has emerged. Their first and current only posted victim is L3Harris, a major defense contractor in the United States.

Kyber.png
Kyber Dark Web Data Leak Site (DLS)

The operators have provided a timer that ends around 6 PM EST on Sunday, October 19. The group claims to have stolen over 300 GB of data, including source code for VCS21 (Voice Communication Systems for the 21st Century), various Microsoft Access database files (.mdb), and what appears to be an entire GitHub repository related to ‘LS3’, which isn’t a product or service provided by L3Harris that we could find. However, the sample data provided resembles what a GitHub directory would look like, .git and .vscode files included.

L3Harris operates in all domains: space, air, land, sea, cyber, and various systems that cover multiple domains. They create software, cyber, and robotic solutions, electronic warfare, missile and missile warning systems, autonomous systems, and copious other defense-related solutions specifically pertaining to communications between these systems. Source code leaks of any of these could pose a national security threat, among other things, but we’re waiting for the countdown to see what this group will do to make any assumptions.

Aside from a malware sample of the ransomware encryptor, nothing is known about Kyber at the time of writing. We’ve published all known technical information and everything else on our Ransomware Tracker entry for Kyber, located here:

https://www.watchguard.com/wgrd-security-hub/ransomware-tracker/kyber

L3Harris-Kyber-2.png
L3Harris Victim Post and Data Sample
L3Harris-Kyber-3.png
L3Harris Victim Post Data Sample
Filed under: Ransomware, Research