A new digital threat is looming over Mexico’s public institutions: a ransomware strain called Lyrix, which could affect over a thousand government offices across the country. This variant was specifically designed to target Windows-based computers and has the potential to cripple key public sector organizations.
So far, at least 1,033 agencies have been identified as vulnerable due to critical system flaws. And these are not minor entities—they include major institutions that handle sensitive data or provide essential services to the public. Here are some examples:
SAT, particularly its electronic invoice verification system.
The Tax Portal of the State of Hidalgo.
The National Water Commission.
The Congressional Channel.
State and municipal governments such as that of Aguascalientes.
INFONAVIT.
The National Institute of Copyright.
The Certification Authority of the Government of Guerrero.
The State Congress of Jalisco, specifically its potable water board.
The educational credit program in Baja California.
The school property registration system in Jalisco.
Potable water agencies in Puebla, Sinaloa, and other regions.
The Fiscal Administration of the State of Coahuila.
The Labor Trials Directorate of the Government of Chihuahua.
The Science and Technology Council of Tabasco, among others.
All of these institutions, because of the type of data they handle (ranging from tax information, copyright, housing, to education) are prime targets for cybercriminals. The goal is clear: encrypt the information, block access, and then demand a ransom in exchange for releasing it.
Lyrix is a type of malware that, like other ransomware, hijacks your data and demands a ransom to return it. What’s particularly striking (and concerning) about this one is that it was created using Python—a very versatile programming language. It was then “packaged” with a tool called PyInstaller, which essentially allows it to run smoothly on Windows computers as if it were just another regular program.
Once it infiltrates a network or system, Lyrix gets to work: it scans everything, hunts for important files, and locks them using extremely strong encryption (AES-256 and RSA-2048, if those sound familiar). What does this mean? That no one can access those files without a special key—one that, of course, only the attackers possess. It’s like putting your data in an indestructible safe... and they keep the key.
But that’s not all. Lyrix is also a chameleon: it constantly changes its code to avoid detection by traditional antivirus software. This technique, known as polymorphic code, makes it very difficult to identify using common security methods, since it doesn’t leave a fixed “fingerprint.”
Lyrix Ransomware Ransom Note
When Lyrix finishes encrypting the files, it changes their extensions (essentially renaming them) and leaves a kind of ransom note on the computer. In that note, the attackers demand payment—usually in cryptocurrency—in exchange for "restoring" access to your own data.
But it’s not just about asking for money. To increase the pressure, they threaten to permanently delete everything or even leak the information publicly if the ransom isn’t paid within a specific timeframe. To make matters worse, Lyrix also deletes backup copies if it detects them, leaving victims with no alternative but to consider paying.
Here are some of the techniques it uses:
In short, Lyrix doesn’t just lock your files—it leaves you without a backup plan and no time to react.
Read more: Comparison of the Leading Backup Solutions 2025
If there’s one thing threats like this make clear, it’s that having “a good antivirus” is no longer enough. Both public and private organizations need to take cybersecurity seriously and strengthen their digital defenses from every angle. How can this be done? Here are some key recommendations:
Lyrix is just another sign that cyberattacks are no longer the stuff of movies. They are real, sophisticated, and increasingly targeted. That’s why prevention is key. Be proactive—don’t wait for disaster to strike. Because when it comes to ransomware, it’s better to prevent than to pay.