Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Kyber Ransomware Double Trouble: Windows and ESXi Attacks Explained

0
Medium
Published: Wed Apr 22 2026 (04/22/2026, 12:39:42 UTC)
Source: AlienVault OTX General

Description

Kyber ransomware represents a significant threat through dual-platform deployment capabilities targeting VMware ESXi virtualization infrastructure and Windows file systems. During a March 2026 incident response engagement, two Kyber payloads were recovered from the same environment. The ESXi variant, written in C++, specifically targets VMware environments with datastore encryption, VM termination, and management interface defacement capabilities. The Windows variant, written in Rust, includes experimental Hyper-V targeting features. Both samples share campaign identifiers and Tor-based infrastructure, confirming coordinated cross-platform operations. Despite advertising post-quantum Kyber1024 encryption, the ESXi variant actually uses ChaCha8 with RSA-4096 key wrapping, while the Windows variant implements the claimed AES-256-CTR with Kyber1024 hybrid scheme. The ransomware includes anti-recovery measures, service termination, and effective encryption strategies designed to cause complete operational disr...

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/22/2026, 15:46:53 UTC

Technical Analysis

Kyber ransomware operates with two distinct payloads targeting VMware ESXi and Windows systems within the same environment. The ESXi variant is developed in C++ and focuses on encrypting datastores, terminating running VMs, and defacing management interfaces to disrupt virtualization infrastructure. The Windows variant, written in Rust, includes experimental Hyper-V targeting capabilities. Both variants are linked by shared campaign identifiers and use Tor-based infrastructure for command and control. Despite claims of post-quantum Kyber1024 encryption, the ESXi variant uses ChaCha8 encryption with RSA-4096 key wrapping, while the Windows variant employs AES-256-CTR combined with Kyber1024 hybrid encryption. The ransomware includes multiple anti-recovery and service termination techniques to prevent remediation and recovery. There is no evidence of known exploits in the wild, and no patch or remediation guidance is currently available.

Potential Impact

The ransomware can cause significant operational disruption by encrypting critical VMware ESXi datastores and Windows file systems, terminating virtual machines, and defacing management interfaces. This results in loss of access to virtualized workloads and Windows data, potentially causing downtime and data loss. The use of strong encryption and anti-recovery measures complicates remediation and recovery efforts. The experimental targeting of Hyper-V environments indicates potential expansion of impact to additional virtualization platforms.

Mitigation Recommendations

Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. No official patches or fixes are currently documented for this ransomware. Organizations should monitor for updates from VMware, Microsoft, and security vendors regarding detection and remediation. Incident response should focus on containment, backup restoration, and network segmentation to limit spread. Given the ransomware’s anti-recovery features, maintaining offline backups and tested recovery procedures is critical.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.rapid7.com/blog/post/tr-kyber-ransomware-double-trouble-windows-esxi-attacks-explained/"]
Adversary
Kyber
Pulse Id
69e8c18ece091934fe2136f5
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash18498b1ff111ee9d9a037c280f75b720
hash0e9a47782e39741a2c161bf639252d33ad3a428a
hash45bff0df2c408b3f589aed984cc331b617021ecbea57171dac719b5f545f5e8d
hash4ed176edb75ae2114cda8cfb3f83ac2ecdc4476fa1ef30ad8c81a54c0a223a29
hash6ccacb7567b6c0bd2ca8e68ff59d5ef21e8f47fc1af70d4d88a421f1fc5280fc

Threat ID: 69e8e9b919fe3cd2cdc88293

Added to database: 4/22/2026, 3:31:05 PM

Last enriched: 4/22/2026, 3:46:53 PM

Last updated: 4/23/2026, 1:06:56 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses