
With technological advancements, cybersecurity has become a frequent concern. As researchers work on cryptography resistant to quantum computers, some reports indicate that cybercriminals are also preparing to use these technologies in more advanced attacks.
According to a report from Kaspersky, there are signs that ransomware, malware that “hijacks” information, could take advantage of post-quantum encryption in the future, making enterprise security and data recovery even more difficult.
The term “quantum computers” refers to machines that use the laws of quantum mechanics to process information, potentially breaking the encryption of traditional computers. This is a developing field, which is not yet integrated into the daily life of society. Post-quantum cryptography is the set of digital security techniques and algorithms created to resist attacks from quantum computers.
“The most immediate risk is not the quantum attack itself, but the strategic capture of data that is happening now. Malicious groups are already doing what is called ‘harvest now, decrypt later’ (collect now, decrypt later). That is, they store encrypted information today waiting for the moment when quantum computers will be able to break current algorithms,” explains Daniel Parra. He is the founder of DPARRA Tecnologia, a company specializing in IT solutions.
The executive emphasizes that no one currently has a quantum computer capable of carrying out real attacks, but the most advanced groups are already preparing for this future. He points out that the techniques used by cybercriminals are increasingly sophisticated, supported by artificial intelligence (AI) and automation.
Over the past three years, worldwide, cyberattacks have generated an average cost of 3.32 million US dollars (17.7 million reais, at current prices) for businesses. In Brazil alone, a third of companies suffered losses of at least US$1 million (5.3 million reais). The data comes from a PwC survey and was provided by CNN Brazil.
The same survey also indicates that globally, only 2% of organizations have implemented cyber protection actions, a figure that Daniel Parra finds worrying.
“The post-quantum era should not be treated as a problem for tomorrow, it is a strategic transformation that requires action today. The central point is simple: companies that start now will make an organized, safe and less costly transition,” he warns.
To mitigate the risks of a scenario in which attacks are even more advanced, the expert recommends three essential actions: create a complete cryptographic inventory; prioritize the protection of long-retention data, which will be more vulnerable in the post-quantum era; and build operational resilience with immutable backups, segmentation, and constant recovery testing.
“Effective defense begins long before the attack exists,” says the executive. He considers hybrid schemes – combining traditional and post-quantum cryptography – to be the safest and most realistic strategy at the moment. They allow you to incorporate post-quantum protection without breaking existing integrations, ensuring operational continuity.
Additionally, they reduce the risk of premature choices, because algorithms can evolve. With the hybrid model, the company is already protected while saving time to test, validate and gradually adapt everything, explains Daniel Parra.
The most pressing challenge, he says, is preparing organizations so that sensitive data expected to last for years or decades remains protected when quantum capacity comes to market.
“The recommendation is clear: immediately start crypto inventory, map risks, test post-quantum algorithms in controlled environments, and involve management and vendors in building a long-term transition plan. This is what differentiates resilient organizations from vulnerable organizations,” comments the founder of DPARRA Tecnologia.