CybersecurityNews

With APAC as Quantum Hub, Kaspersky highlights top risks of Quantum Computing 

Sergey Lozhkin, Head of Global Research & Analysis Team for META and APAC at Kaspersky reminds organizations in APAC that quantum computing is the next cyber frontier and how it could not only unlock ground-breaking innovations in the region, but also usher into trepidations of cybersecurity threats.

Fuelled by strong government support and rapid adoption, particularly in finance, pharmaceuticals, and start-up sectors, the quantum computing market in APAC is currently on a steep growth trajectory. But this powerful  technological shift is equipped with a double-edged capability: quantum computers could eventually break many of today’s encryption methods, raising concerns over cybersecurity 

Quantum computing is no longer a concept, it’s here. Are we ready for it? 

The Asia Pacific (APAC) region has long been considered as a fertile breeding ground for the potentially revolutionary technology: quantum computing. Countries such as China, Japan, India, Australia, South Korea, Singapore, and Taiwan are recognized global leaders in this frontier fuelled by strong government support and rapid adoption, particularly in finance, pharmaceuticals, and start-up sectors.  

“Organizations in APAC should remember that quantum computing is the next cyber frontier. It could unlock ground-breaking innovations, but also usher the region to a new era of cybersecurity threats.” 

– Sergey Lozhkin, Head of Global Research & Analysis Team for META and APAC at Kaspersky. 

At the heart of this technological shift lies a powerful and double-edged capability: quantum computers could eventually break many of today’s encryption methods, raising concerns over cybersecurity. Yet, the same technology also holds the promise of creating new, quantum-resistant encryption standards, which can reshape how we secure digital information in the future.  For now, these capabilities exist largely in laboratory settings and proof-of-concept demonstrations, making the timeline for both the threats and benefits uncertain, though the need for preparation remains urgent. 

“The quantum computing market in APAC is currently on a steep growth trajectory. From USD 392.1 million last year, experts foresee a massive growth to USD 1.78 billion by 2032, soaring at a robust CAGR of 24.2%. This is both exciting and worrying. Organizations here should remember that quantum computing is the next cyber frontier. It could unlock ground-breaking innovations, but also usher the region to a new era of cybersecurity threats,” says Sergey Lozhkin, Head of Global Research & Analysis Team for META and APAC at Kaspersky. 

To better understand the scope of the evolving threat, Lozhkin identified three of the most urgent quantum-related risks that demand attention and action from the cybersecurity community during Kaspersky APAC Cyber Security Weekend in Da Nang, Vietnam. 

The top three risks 

Quantum computers could be used to compromise the traditional encryption methods that  

currently protect data in countless digital systems — posing a direct threat to global cybersecurity infrastructures. Threats include the interception and decoding of sensitive diplomatic, military, and financial communications, as well as the real-time decryption of private negotiations – something quantum systems could handle much faster than classical machines, turning secure conversations into open books. 

1. Store now, decrypt later: the key threat of the coming years 

Threat actors are already harvesting encrypted data today, with the intention of decrypting it in the future once quantum capabilities advance. This “store now, decrypt later” tactic could expose sensitive information years after it was originally transmitted — including diplomatic exchanges, financial transactions, and private communications. 

2. Sabotage in blockchain and cryptocurrency 

Blockchain networks are not immune to quantum threats. Bitcoin’s Elliptic Curve Digital Signature Algorithm (ECDSA), which relies on elliptic curve cryptography (ECC), is especially vulnerable. 

Potential risks include forging digital signatures, which threatens Bitcoin, Ethereum, and other cryptocurrencies; attacks on ECDSA that secure crypto wallets; and tampering with blockchain transaction history, undermining trust and integrity. 

3. Quantum-resistant ransomware: a new front 

Looking ahead, developers and operators of advanced ransomware may begin adopting post-quantum cryptography to protect their own malicious payloads. So-called “quantum-resistant” ransomware would be designed to resist decryption by both classical and quantum computers — potentially making recovery without paying a ransom nearly impossible. 

At present, quantum computing does not offer a way to decrypt files locked by current ransomware. Data protection and recovery still rely on traditional security solutions and collaboration among law enforcement agencies, quantum researchers, and international organizations. 

Building quantum-safe defenses 

Quantum computers are not yet a direct threat — but by the time they are, it may be too late to  

respond. Transitioning to post-quantum cryptography will take years. Preparations must begin today. 

The cybersecurity community, IT companies, and governments must coordinate to address the risks ahead. Policymakers should develop clear strategies to migrate to post-quantum algorithms. Businesses and researchers need to begin implementing new security standards now. 

“The most critical risk lies not really in the future, but in the present: encrypted data with long-term value is already at risk from future decryption. While practical quantum computers capable of breaking current encryption don’t yet exist, the threat is real because malicious actors can store encrypted data today and decrypt it once the technology matures.The security decisions we make today will define the resilience of our digital infrastructure for decades. Governments, businesses, and infrastructure providers must begin adapting now, or risk systemic vulnerabilities that cannot be retroactively fixed,” adds Lozhkin. 

Established in 2008, Global Research & Analysis Team (GReAT) operates at the very heart of Kaspersky, uncovering APTs, cyber-espionage campaigns, major malware, ransomware and underground cyber-criminal trends across the world. Today GReAT consists of 30+ experts working globally – in Europe, Russia, Latin America, Asia and the Middle East. Talented security professionals provide company leadership in anti-malware research and innovation, bringing unrivaled expertise, passion and curiosity to the discovery and analysis of cyberthreats. 

Related posts

Tech Mahindra Achieves Premier Consulting Partner Status in the AWS Partner Network

SME Channels

Micron’s New Crucial DDR5 Memory Delivers Blazing Speeds and Massive Bandwidth to Consumers for Next-Gen Desktop PCs

SME Channels

SAP Labs India, Deloitte, and Arise Ventures Launch Women-Led Startup Cohort Ahead of International Women’s Day

SME Channels

Leave a Comment

x