‘Harvest now, decrypt later’: Why hackers are ready for quantum computing

‘Harvest now, decrypt later’: Why hackers are ready for quantum computing
‘Harvest now, decrypt later’: Why hackers are ready for quantum computing

Be part of our every day and weekly newsletters for the newest updates and unique content material on industry-leading AI protection. Learn More


Hackers are ready for the second quantum computing breaks cryptography and allows the mass decryption of years of stolen data. In preparation, they’re harvesting much more encrypted knowledge than ordinary. Here’s what companies can do in response.

Why are hackers harvesting encrypted knowledge?

Most trendy organizations encrypt a number of crucial elements of their operations. In reality, about eight in 10 businesses extensively or partially use enterprise-level encryption for databases, archives, inner networks and web communications. In any case, it’s a cybersecurity best practice.

Alarmingly, cybersecurity consultants are rising more and more involved that cybercriminals are stealing encrypted knowledge and ready for the appropriate time to strike. Their worries will not be unfounded — greater than 70% of ransomware attacks now exfiltrate data earlier than encryption. 

The “harvest now, decrypt later” phenomenon in cyberattacks — the place attackers steal encrypted information within the hopes they’ll ultimately be capable of decrypt it — is turning into frequent. As quantum computing expertise develops, it can solely develop extra prevalent.

How ‘harvest now, decrypt later’ works

Quantum computer systems make the “harvest now, decrypt later” phenomenon attainable. Prior to now, encryption was sufficient to discourage cybercriminals — or not less than make their efforts pointless. Sadly, that’s not the case.

Whereas classical computer systems function utilizing binary digits — bits — that may both be a one or a zero, their quantum counterparts use quantum bits known as qubits. Qubits can exist in two states concurrently, due to superposition. 

Since qubits could also be a one and a zero, quantum computer systems’ processing speeds far outpace the competitors. Cybersecurity consultants are apprehensive they’ll make trendy ciphers — which means encryption algorithms — ineffective, which has impressed exfiltration-driven cyberattacks. 

Encryption turns knowledge, also referred to as plaintext, right into a string of random, undecipherable code known as ciphertext. Ciphers do that utilizing complicated mathematical formulation which can be technically not possible to decode with no decryption key. Nonetheless, quantum computing modifications issues.

Whereas a classical pc would take 300 trillion years or extra to decrypt a 2,048-bit Rivest-Shamir-Adleman encryption, a quantum one may crack it in seconds, due to qubits. The catch is that this expertise isn’t extensively out there — solely locations like analysis establishments and authorities labs can afford it.

That doesn’t deter cybercriminals, as quantum computing expertise may turn out to be accessible inside a decade. In preparation, they use cyberattacks to steal encrypted knowledge and plan to decrypt it later.

What kinds of knowledge are hackers harvesting?

Hackers often steal personally identifiable data like names, addresses, job titles and social safety numbers as a result of they permit id theft. Account knowledge — like firm bank card numbers or checking account credentials — are additionally extremely sought-after.

With quantum computing, hackers can entry something encrypted — knowledge storage techniques are not their major focus. They will snoop on the connection between an internet browser and a server, learn cross-program communication or intercept data in transit. 

Human sources, IT and accounting departments are nonetheless excessive dangers for the common enterprise. Nonetheless, they have to additionally fear about their infrastructure, distributors and communication protocols. In any case, each shopper and server-side encryption will quickly be honest sport.

The implications of qubits cracking encryption

Corporations could not even understand they’ve been affected by a knowledge breach till the attackers use quantum computing to decrypt the stolen data. It could be enterprise as ordinary till a sudden surge in account takeovers, id theft, cyberattacks and phishing makes an attempt. 

Authorized points and regulatory fines would doubtless observe. Contemplating the common knowledge breach rose from $4.35 million in 2022 to $4.45 million in 2023 — a 2.3% year-over-year enhance — the monetary losses could possibly be devastating. 

Within the wake of quantum computing, companies can not depend on ciphers to speak securely, share recordsdata, retailer knowledge or use the cloud. Their databases, archives, digital signatures, web communications, laborious drives, e-mail and inner networks will quickly be susceptible. Except they discover another, they might need to revert to paper-based techniques.

Why put together if quantum isn’t right here but?

Whereas the potential for damaged cryptography is alarming, decision-makers mustn’t panic. The common hacker will be unable to get a quantum pc for years — perhaps even a long time — as a result of they’re extremely expensive, resource-intensive, delicate and liable to errors if they aren’t saved in supreme circumstances.

To make clear, these delicate machines should keep simply above absolute zero (459 degrees Fahrenheit to be actual) as a result of thermal noise can intrude with their operations. 

Nonetheless, quantum computing expertise is advancing every day. Researchers try to make these computer systems smaller, simpler to make use of and extra dependable. Quickly, they might turn out to be accessible sufficient that the common particular person can personal one. 

Already, a startup based mostly in China just lately unveiled the world’s first consumer-grade transportable quantum computer systems. The Triangulum — the most costly mannequin — gives the power of three qubits for roughly $58,000. The 2 cheaper two-qubit variations retail for lower than $10,000.

Whereas these machines pale compared to the powerhouse computer systems present in analysis establishments and government-funded labs, they show that the world shouldn’t be far-off from mass-market quantum computing expertise. In different phrases, decision-makers should act now as an alternative of ready till it’s too late. 

Apart from, the common hacker shouldn’t be the one corporations ought to fear about — well-funded risk teams pose a a lot bigger risk. A world the place a nation-state or enterprise competitor pays for quantum computing as a service to steal mental property, monetary knowledge or commerce secrets and techniques could quickly be a actuality. 

What can enterprises do to guard themselves?

There are a number of steps enterprise leaders ought to soak up preparation for quantum computing cracking cryptography. 

1. Undertake post-quantum ciphers

The Cybersecurity and Infrastructure Safety Company (CISA) and the Nationwide Institute of Requirements and Know-how (NIST) quickly plan to launch post-quantum cryptographic standards. The businesses are leveraging the newest methods to make ciphers quantum computer systems can’t crack. Corporations can be clever to undertake them upon launch. 

2. Improve breach detection

Indicators of compromise — indicators that present a community or system intrusion occurred — will help safety professionals react to knowledge breaches swiftly, doubtlessly making knowledge ineffective to the attackers. For instance, they will instantly change all staff’ passwords in the event that they discover hackers have stolen account credentials.

3. Use a quantum-safe VPN

A quantum-safe digital non-public community (VPN) protects knowledge in transit, stopping exfiltration and eavesdropping. One knowledgeable claims customers ought to anticipate them quickly, stating they are in the testing phase as of 2024. Corporations can be clever to undertake options like these.

4. Transfer delicate knowledge

Determination-makers ought to ask themselves whether or not the knowledge dangerous actors steal will nonetheless be related when it’s decrypted. They need to additionally contemplate the worst-case state of affairs to know the chance stage. From there, they will determine whether or not or to not transfer delicate knowledge. 

One possibility is to switch the info to a closely guarded or continuously monitored paper-based submitting system, stopping cyberattacks fully. The extra possible resolution is to retailer it on an area community not related to the general public web, segmenting it with safety and authorization controls.

Determination-makers ought to start getting ready now

Though quantum-based cryptography cracking continues to be years — perhaps a long time — away, it can have disastrous results as soon as it arrives. Enterprise leaders ought to develop a post-quantum plan now to make sure they aren’t caught unexpectedly. 

Zac Amos is options editor at ReHack.

DataDecisionMakers

Welcome to the VentureBeat neighborhood!

DataDecisionMakers is the place consultants, together with the technical individuals doing knowledge work, can share data-related insights and innovation.

If you wish to examine cutting-edge concepts and up-to-date data, finest practices, and the way forward for knowledge and knowledge tech, be part of us at DataDecisionMakers.

You would possibly even contemplate contributing an article of your personal!

Read More From DataDecisionMakers


Leave a Reply

Your email address will not be published. Required fields are marked *