slug: quantum-safe-ransomware
summary: Security researchers discovered ransomware using ML-KEM1024 — the same post-quantum cryptography standard that protects your iMessages. The twist: it’s not a threat to victims. It’s threat actors protecting themselves from future decryption.
description: A ransomware family used post-quantum encryption for the first time. Criminals are getting serious about defenses.
coverImage: cover.png
author: Sun Jie
date: 2026-04-24
tags: ["Ransomware", "Post-Quantum Cryptography", "ML-KEM", "Kyber", "Cybersecurity", "NIST"]
The First Ransomware That Uses Quantum Encryption Has Arrived. Do Not Panic Yet.
There is a new ransomware family making the rounds, and its cryptographic choices are drawing attention from security researchers. It uses ML-KEM1024 — the same post-quantum key encapsulation mechanism that protects your iMessages, your Google Chrome sessions, and Signal calls. Security analysts at Emsisoft confirmed it is the first verified case of ransomware using post-quantum cryptography.
Before you panic: this is not a quantum computer pointed at your data. No quantum computer today can break RSA or elliptic curve cryptography. The group using ML-KEM is not doing it to threaten victims. They are doing it to protect their own encryption keys from being cracked by law enforcement or security researchers five or ten years from now.
What the Ransomware Actually Does
The ransomware — internally named "Kyber" — uses a two-layer encryption approach. It generates an AES-256 symmetric key to actually encrypt your files. Then it uses ML-KEM1024 to wrap that AES key in a post-quantum protective shell. The AES key is what locks your files. The ML-KEM wrapping is what protects the AES key from being recovered by anyone who does not have the attacker's private key.
This is the same architecture that Apple uses for PQ3 in iMessage, that Google uses for post-quantum TLS in Chrome, and that Signal uses for its messaging encryption. The ransomware authors chose to use the same standard that governments and major tech companies consider the appropriate level of protection for sensitive communications.
They are not wrong about the math. ML-KEM1024 is based on the Module Learning With Errors problem over structured lattices — a mathematical problem for which no efficient quantum or classical algorithm is known. If you want to protect an encryption key from future decryption attempts, ML-KEM is a reasonable choice.

Why Now, and Why Not a Real Quantum Threat
The timing is interesting. NIST finalized the ML-KEM standard in August 2024. The ransomware appeared in late 2025 or early 2026, and security researchers reverse-engineered it in April 2026. That is roughly 18 months from standard publication to criminal deployment — a surprisingly short lag for a sophisticated cryptographic implementation.
The reason it is not a genuine quantum threat is simple: no quantum computer today is large enough to break RSA or ECC. Credible estimates for when a quantum computer could run Shor's algorithm against 2048-bit RSA put viable cryptanalysis at 10-20 years away. The ransomware also gives victims a one-week ransom window — far too short for any quantum advantage to matter.
So the ML-KEM usage is not about threatening victims with quantum decryption. It is about ensuring that even if mathematical advances over the next decade make AES-256 weaker, or if law enforcement develops novel decryption techniques, the key encapsulation layer still protects the attackers' ability to decrypt.
Think of it as criminal operational security. The ransomware authors are protecting themselves from future-proof decryption attempts by the people trying to help victims recover their files.
Why This Matters Anyway
The real significance is not that criminals have quantum computers. They do not. The significance is that criminal hacking groups are tracking and implementing the same cryptographic standards as the US government and Fortune 500 companies.
This is a new phase in the cryptographic arms race. Until now, the assumption was that criminal ransomware groups used standard cryptographic libraries — AES-256, RSA, the same tools everyone else uses. The Kyber ransomware suggests that sophisticated threat actors are no longer relying on the same tools as everyone else. They are hardening their operations against future cryptographic advances.
Brett Callow of Emsisoft, who confirmed the finding, put it plainly: this is the first verified case of ransomware using post-quantum cryptography. That framing — "first verified case" — implies there will be others. When criminal groups see that one ransomware family is using NIST-standardized PQC, the competitive pressure to match will increase.
The Hybrid Approach Is Standard
The Kyber ransomware does not abandon classical cryptography. It uses ML-KEM to wrap an AES-256 key. This is the hybrid approach recommended by cryptographers for organizations transitioning to post-quantum security: use the best available classical and post-quantum algorithms together, so that breaking the encryption requires defeating both.
Apple's iMessage does this. Google's Chrome does this. The US government recommends this approach for sensitive communications. The ransomware authors followed the same principle — use both AES-256 (classical, well-understood) and ML-KEM-1024 (post-quantum, future-proof) to create a two-layer defense.
This is actually more reassuring than the alternative would be. It means the criminals are following the same defensive playbook as major tech companies, not inventing new cryptographic vulnerabilities. Their encryption is likely solid, not riddled with implementation bugs that would make decryption easier.
What This Means for Defenders
The uncomfortable implication is that the gap between criminal sophistication and legitimate security practice is narrowing. For years, the advice for organizations worried about ransomware was "use strong encryption, keep backups, train employees." That advice still stands. But the people you are defending against are now reading the same NIST publications and implementing the same standards.
For enterprise security teams, the Kyber ransomware is a signal that you should be planning for a post-quantum world — not because quantum computers are a current threat, but because your adversaries are planning for it. The cryptographic standards that protect your most sensitive data today may be tomorrow's liability. Migrating to hybrid post-quantum schemes, the same ones the ransomware uses for protection, is a reasonable long-term step.
The National Institute of Standards and Technology finalized ML-KEM, ML-DSA, and SLH-DSA in August 2024. The US government and major tech companies are already in the process of migrating. Your adversaries are now joining that migration.
The ransomware is not a crisis. It is a preview of what sophisticated threat actors will increasingly look like.



