\n\n\n\n Criminals Got to Quantum-Safe Encryption Before Most Banks Did - Agent 101 \n

Criminals Got to Quantum-Safe Encryption Before Most Banks Did

📖 4 min read706 wordsUpdated May 2, 2026

A Lock That Even Tomorrow’s Computers Can’t Break

Imagine a thief who breaks into your house, steals your valuables, and then seals them inside a safe so advanced that no locksmith alive — or yet to be born — can crack it. That’s essentially what a ransomware group called Kyber has done to its victims’ files. And it’s a first.

Security researchers at Rapid7 confirmed this week that a ransomware family named Kyber is using quantum-safe encryption to lock victims’ files. This marks the first confirmed case of criminals adopting post-quantum cryptography — a type of encryption designed to resist attacks from quantum computers, which are expected to eventually make today’s standard encryption methods obsolete.

Wait, What Even Is Quantum-Safe Encryption?

Let’s back up for a second. Most encryption today works by creating math problems that are incredibly hard for regular computers to solve. Think of it like a combination lock with a trillion possible combinations — a normal computer would take centuries to guess the right one.

Quantum computers are different. They process information in a fundamentally different way, and for certain types of math problems, they could crack those same locks in minutes. That’s a big deal for banks, governments, hospitals, and anyone else who relies on encryption to keep data private.

Post-quantum cryptography — sometimes called quantum-safe encryption — is the field of building new locks that even quantum computers can’t easily break. Governments and tech companies have been racing to develop and adopt these new standards. The U.S. National Institute of Standards and Technology (NIST) has been leading that effort for years.

One of the leading algorithms to emerge from that process is called ML-KEM1024. And that’s exactly what the Kyber ransomware group is now using.

How the Kyber Ransomware Actually Works

Here’s where the technical picture gets interesting — and a little nuanced. According to Rapid7’s findings, Kyber’s Windows variant wraps its AES-256 file-encryption keys with ML-KEM1024. In plain English: the ransomware uses a well-established encryption method (AES-256) to scramble your files, and then it uses the quantum-safe algorithm to lock up the key that could unscramble them.

AES-256 is actually already considered quantum-resistant on its own — symmetric encryption algorithms like it hold up reasonably well against quantum attacks. So in a strict technical sense, some researchers have pointed out that all modern ransomware is already “quantum safe” at the file level.

But what Kyber is doing differently is protecting the encryption key itself with ML-KEM1024. This closes a potential future vulnerability in the key exchange process — the part of the system that quantum computers could theoretically target. It’s a more thorough approach, and it signals that this group is paying close attention to where cryptography is heading.

Why Should Non-Technical People Care?

Because this is a signal, not just a story.

Ransomware groups are criminal organizations, but they’re also surprisingly sophisticated ones. They track security research, adapt their tools, and invest in whatever gives them an edge. The fact that a ransomware gang has adopted post-quantum cryptography before many legitimate organizations have finished planning their own transitions says something uncomfortable about the state of the space.

For everyday people, the immediate risk is the same as it’s always been with ransomware: your files get locked, and you’re asked to pay to get them back. Quantum-safe encryption doesn’t change that experience. What it does change is the long-term picture for law enforcement and security researchers who might otherwise hope to decrypt victims’ files years down the line using future quantum tools.

With ML-KEM1024 in the mix, that future backdoor gets a lot harder to imagine.

The Uncomfortable Takeaway

There’s something almost darkly impressive about a criminal group being an early adopter of a security standard that most enterprises are still treating as a future concern. It’s a reminder that the people building threats to our digital lives are not standing still.

For organizations still treating post-quantum cryptography as a “we’ll get to it eventually” item on the roadmap, Kyber ransomware is a concrete reason to move that conversation forward. The latest encryption standards aren’t just for defending against nation-state hackers with quantum computers. Apparently, they’re already being used against regular businesses and individuals right now.

The criminals upgraded. The question is whether everyone else will too.

🕒 Published:

🎓
Written by Jake Chen

AI educator passionate about making complex agent technology accessible. Created online courses reaching 10,000+ students.

Learn more →
Browse Topics: Beginner Guides | Explainers | Guides | Opinion | Safety & Ethics
Scroll to Top