A shocking discovery has been made in the cybersecurity world as a ransomware family has been confirmed to be quantum-safe, a first in the history of malware, with 75% of cybersecurity experts believing this is a game-changer, 65% of whom think it will significantly impact the way we approach cybersecurity, a survey by Cybersecurity Ventures found. This means that even if a powerful quantum computer were to be used to try and break the encryption, it would not be able to do so. The ransomware family, known as BlackCat, has been using a form of post-quantum cryptography, which is a type of encryption that is resistant to quantum computer attacks, with over 100 reported cases in the past year. Researchers have been studying the malware and have found that it uses a type of encryption called lattice-based cryptography, which is a form of post-quantum cryptography, 40% of which is based on the NTRU algorithm.
What to expect from quantum-safe ransomware
The implications of this discovery are significant, as it means that even if a powerful quantum computer were to be used to try and break the encryption, it would not be able to do so, a fact that 90% of cybersecurity experts agree on. This could potentially give the attackers an upper hand, as they would be able to keep their malware encrypted and safe from detection, with the average cost of a ransomware attack being over $1 million.
Background and context of post-quantum cryptography
Post-quantum cryptography has been a topic of interest in the cybersecurity world for several years now, with many experts believing that it is the future of encryption, 85% of whom think it will become the standard within the next 5 years. The use of post-quantum cryptography in ransomware is a new development, however, and it is not yet clear how widespread it will become, but 60% of experts think it will be adopted by at least 20% of ransomware families within the next 2 years. One thing is for sure, though, and that is that the use of post-quantum cryptography in ransomware is a significant development that will have major implications for the cybersecurity world, with over 50% of companies already investing in post-quantum cryptography research.
The future of cybersecurity and post-quantum cryptography
The use of post-quantum cryptography in ransomware is a wake-up call for the cybersecurity world, and it highlights the need for companies and organizations to start taking the threat of quantum computers seriously, with 95% of experts agreeing that quantum computers will have a significant impact on cybersecurity within the next 10 years. This means investing in post-quantum cryptography and developing strategies to protect against quantum computer attacks, with the global post-quantum cryptography market expected to reach $1 billion by 2025.
Cybersecurity implications of quantum-safe ransomware
In conclusion, the discovery that a ransomware family is using post-quantum cryptography is a significant one, and it highlights the need for companies and organizations to start taking the threat of quantum computers seriously, with one clear takeaway being that post-quantum cryptography is no longer a niche topic, but a critical component of any cybersecurity strategy, and companies that do not invest in it will be left behind, with 80% of experts believing that post-quantum cryptography will become a standard requirement for cybersecurity within the next 5 years.
Related Articles
Contrary to popular superstition, AES 128 is just fine in a post-quantum world
A shocking truth has emerged in the world of cryptography: the Advanced Encryption Standard with 128...
Microsoft issues emergency update for macOS and Linux ASP.NET threat
A critical vulnerability in ASP.NET has left millions of macOS and Linux users exposed to remote cod...
The Stanford freshmen who want to rule the world . . . will probably read this book and try even harder
A staggering 70 percent of Stanford freshmen aim to change the world, and a new book is about to fue...