www.zdnet.com Open in urlscan Pro
2a04:4e42:4c::666  Public Scan

Submitted URL: https://t.co/DwR03kt2Sr
Effective URL: https://www.zdnet.com/article/chinese-hackers-could-steal-data-now-and-crack-it-with-quantum-computers-later-warns-rep...
Submission: On December 01 via api from US — Scanned from DE

Form analysis 4 forms found in the DOM

GET https://www.zdnet.com/search/

<form class="headerSearch active" method="get" action="https://www.zdnet.com/search/">
  <div class="box">
    <label for="search-field" class="hidden">What are you looking for?</label>
    <input type="search" id="search-field" title="query" autocomplete="off" placeholder="What are you looking for?" tabindex="1" name="q" value="" class="search-expand smart-search-input">
    <button type="submit" class="search-button" data-omniture-track="moduleClick" data-omniture-track-data="{&quot;moduleInfo&quot;: &quot;Header-Search&quot;, &quot;pageType&quot;: &quot;article&quot;}">
      <svg class=" mag-red">
        <use xlink:href="#mag-red"></use>
      </svg>
      <span class="search-go">Go</span>
    </button>
  </div>
</form>

GET https://www.zdnet.com/search/

<form class="headerSearch active" method="get" action="https://www.zdnet.com/search/">
  <div class="box">
    <label for="search-field" class="hidden">What are you looking for?</label>
    <input type="search" id="search-field" title="query" autocomplete="off" placeholder="What are you looking for?" tabindex="1" name="q" value="" class="search-expand smart-search-input">
    <button type="submit" class="search-button" data-omniture-track="moduleClick" data-omniture-track-data="{&quot;moduleInfo&quot;: &quot;Header-Search&quot;, &quot;pageType&quot;: &quot;article&quot;}">
      <svg class=" mag-red">
        <use xlink:href="#mag-red"></use>
      </svg>
      <span class="search-go">Go</span>
    </button>
  </div>
</form>

<form class="modal fixed show">
  <div class="_start active">
    <div class="info">
      <p class="description">Please review our terms of service to complete your newsletter subscription.</p>
    </div>
    <label class="terms all-tos">
      <input type="checkbox" name="user[tos]" required="required" value="1">
      <span class="checkbox"></span>
      <span class="terms-of-service">
        <p> You agree to receive updates, promotions, and alerts from ZDNet.com. You may unsubscribe at any time. By joining ZDNet, you agree to our
          <a href="https://redventures.com/CMG-terms-of-use.html" target="_blank" rel="noopener noreferrer nofollow" data-component="externalLink">Terms of Use</a> and
          <a href="https://redventures.com/privacy-policy.html" target="_blank" rel="noopener noreferrer nofollow" data-component="externalLink">Privacy Policy</a>. </p>
      </span>
    </label>
    <label class="terms gdpr-tos">
      <input type="checkbox" name="user[firstPartyOptIn]" value="1">
      <span class="checkbox"></span>
      <span class="terms-of-service">
        <p> You agree to receive updates, promotions, and alerts from ZDNet.com. You may unsubscribe at any time. By signing up, you agree to receive the selected newsletter(s) which you may unsubscribe from at any time. You also agree to the
          <a href="https://redventures.com/CMG-terms-of-use.html" target="_blank" rel="noopener noreferrer nofollow" data-component="externalLink">Terms of Use</a> and acknowledge the data collection and usage practices outlined in our
          <a href="https://redventures.com/privacy-policy.html" target="_blank" rel="noopener noreferrer nofollow" data-component="externalLink">Privacy Policy</a>. </p>
      </span>
    </label>
    <button>Continue</button>
    <div class="alert-error">
      <div class="required-error">
        <div class="warning-label"></div>
      </div>
    </div>
  </div>
</form>

Name: newsletterWidgetForm-2145POST https://www.zdnet.com/newsletter/xhr/widget-register/

<form class="newsletterWidgetForm" id="newsletterWidgetForm-2145" name="newsletterWidgetForm-2145" action="https://www.zdnet.com/newsletter/xhr/widget-register/" data-user-submit="newsletterWidgetForm" method="POST">
  <input type="hidden" id="authentication_csrf" name="csrf" value="fY7-3r4fA4cvOSfWrnxkl4KpLPWHEa-pv7egRIDOgqU">
  <input type="hidden" id="newsletter_registration_form_newsletter" name="newsletter_registration_form[newsletter]" required="required" value="e566">
  <div class="mmode mmode-nls">
    <label class="checkbox">
      <b>ZDNet Security</b> Your weekly update on security around the globe, featuring research, threats, and more. </label>
    <label class="hidden required" for="newsletter_registration_form_email">Email Address</label>
    <input type="email" id="newsletter_registration_form_email" name="newsletter_registration_form[email]" required="required" data-validate="email" placeholder="Your email address" class=" js-bound">
    <button type="submit" id="newsletter_registration_form_submit" name="newsletter_registration_form[submit]" class="btn btn-primary">Subscribe</button>
  </div>
</form>

Text Content

Search
What are you looking for? Go

 * Central Europe
 * Middle East
 * Scandinavia
 * Africa
 * UK
 * Italy
 * Spain
 * more
   * Estonia
   * European Union
   * Mobility
   * Hardware
   * Innovation
   * See All Topics
   * Downloads
   * Reviews
   * Galleries
   * Videos
 * Edition: EU
   * Asia
   * Australia
   * Europe
   * India
   * United Kingdom
   * United States
   * 
   * ZDNet around the globe:
   * ZDNet France
   * ZDNet Germany
   * ZDNet Korea
   * ZDNet Japan
 * Newsletters
 * All Writers
 *  * Preferences
    * Community
    * Newsletters
    * Log Out

 * 
 * * What are you looking for? Go
     
 * Menu
   * Central Europe
   * Middle East
   * Scandinavia
   * Africa
   * UK
   * Italy
   * Spain
   * Estonia
   * European Union
   * Mobility
   * Hardware
   * Innovation
   * See All Topics
   * Downloads
   * Reviews
   * Galleries
   * Videos
 * eu
    * Asia
    * Australia
    * Europe
    * India
    * United Kingdom
    * United States
    * 
    * ZDNet around the globe:
    * ZDNet France
    * ZDNet Germany
    * ZDNet Korea
    * ZDNet Japan

 * 
 * *  * Preferences
      * Community
      * Newsletters
      * Log Out

must read: Chinese hackers could steal data now and crack it with quantum
computers later, warns report


HACKERS COULD STEAL ENCRYPTED DATA NOW AND CRACK IT WITH QUANTUM COMPUTERS
LATER, WARN ANALYSTS

Analysts at Booz Allen Hamilton warn that Chinese espionage efforts could soon
focus on encrypted data.

 * 
 * 
 * 
 * 
 * 
 * 
 * 
 * 



By Liam Tung | November 30, 2021 | Topic: Security

x





Inside a cyber mercenary operation: Hacking victims around the world
Watch Now


Replay video Large play-pause toggle

00:00 09:04 Settings




Beijing-backed hackers might soon start trying to steal encrypted data -- such
as biometric info, the identities of covert spies, and weapons designs -- with a
view to decrypting it with a future quantum computer, according to analysts at
US tech consultancy Booz Allen Hamilton (BAH). 




ZDNET RECOMMENDS

 * Best VPN services
 * Best security keys
 * Best antivirus software
 * The fastest VPNs

"In the 2020s, Chinese economic espionage will likely increasingly steal data
that could be used to feed quantum simulations," the analysts write in the
report Chinese Threats in the Quantum Era. 

At risk are data protected by the current algorithms underpinning public-key
cryptography, which some fear may be rendered useless for protecting data once
quantum computers become powerful enough.

--------------------------------------------------------------------------------

Also: Spy chief's warning: Our foes are now 'pouring money' into quantum
computing and AI 

--------------------------------------------------------------------------------

The big question is when such a quantum computer might arrive. However, Booz
Allen Hamilton's analysts suggest it doesn't matter that an encryption-breaking
quantum computer could be years off because the type of data being targeted
would still be valuable. Hence, there's still an incentive for hackers to steal
high-value encrypted data.  

Recent studies suggest it would take a processor with about 20 million qubits to
break the algorithms behind public-key cryptography, which is much larger than
the quantum processors that exist today. But a quantum computer that threatens
today's algorithms for generating encryption keys could be built by 2030. 

The report frames the threat from China around its past cyber-espionage
campaigns and the nation's ambitions to be a major quantum computing player by
mid-2020, as major US tech firms such as Google, IBM, IONQ and others race
towards 'quantum supremacy'.



"China's current capabilities and long-term goals related to quantum computing
will very likely shape the near-term targets and objectives of its cyber-enabled
espionage," the report states. 

It's warning cybersecurity chiefs to be aware of China's espionage targeting
encrypted data as an emerging risk.

"By the end of the 2020s, Chinese threat groups will likely collect data that
enables quantum simulators to discover new economically valuable materials,
pharmaceuticals, and chemicals," the analysts warn.

However, they add that while China will remain a major player in quantum
computing, it probably won't surpass the US and Europe in quantum computing by
the mid-2020s. 

The consultancy notes that data decryption poses a "high risk" in the 2020s, but
it reckons China's chances to build a cryptography-breaking quantum computer
before 2030 are "very small". Nonetheless, they argue, the distant promise of
quantum and the opportunities at stake will make encrypted data an enticing
target in the years to come. 

"Still, the outsized threat of a rival state possessing the ability to decrypt
any data using current public-key encryption rapidly generates high risk," the
report states. 

"Encrypted data with intelligence longevity, like biometric markers, covert
intelligence officer and source identities, Social Security numbers, and
weapons' designs, may be increasingly stolen under the expectation that they can
eventually be decrypted."

--------------------------------------------------------------------------------

See also: Dark web crooks are now teaching courses on how to build botnets.

--------------------------------------------------------------------------------

BAH warns that it could take organizations a "decade or longer" to implement an
organizational strategy for deploying post-quantum encryption. 

However, the US Institute of Standards and Technology (NIST) is looking for
answers to post-quantum cryptography and selected a shortlist of candidates for
exchanging digital keys and adding digital signatures, as CNET's Stephen
Shankland reported. 

As NIST notes, it took almost two decades to deploy our modern public key
cryptography infrastructure.




SECURITY

 * Here's the perfect gift to protect anyone with a PC, Mac, iPhone, or Android
 * Hit by ransomware? Don't make this first obvious mistake
 * Over a million WordPress sites breached
 * Hackers used this software flaw to steal credit card details from thousands
   of online retailers


China | Security TV | Data Management | CXO | Data Centers
Show Comments
LOG IN TO COMMENT
 * My Profile
 * Log Out

| Community Guidelines


JOIN DISCUSSION


Add Your Comment
Add Your Comment


RELATED

 * 
 * 
 * 
 * 
 * 

 * Twitter to ban sharing of photos and videos without people's consent
   
   Social Enterprise

 * DNA testing center admits to breach affecting SSNs, banking info of more than
   2 million people
   
   Security

 * Zscaler delivers strong Q1, sees revenue grow 62% year over year
   
   Finance

 * Why everyone should have this cheap security tool
   
   Security

 * Spy chief's warning: Our foes are now 'pouring money' into quantum computing
   and AI
   
   Security

 * Printing Shellz: Critical bugs impacting 150 HP printer models patched
   
   Security

 * Queensland government energy generator hit by ransomware
   
   Security

 * Eftpos expands security kit bag with new AI anti-fraud capability
   
   Finance

 * Panasonic confirms cyberattack and data breach
   
   Security



Please review our terms of service to complete your newsletter subscription.

You agree to receive updates, promotions, and alerts from ZDNet.com. You may
unsubscribe at any time. By joining ZDNet, you agree to our Terms of Use and
Privacy Policy.

You agree to receive updates, promotions, and alerts from ZDNet.com. You may
unsubscribe at any time. By signing up, you agree to receive the selected
newsletter(s) which you may unsubscribe from at any time. You also agree to the
Terms of Use and acknowledge the data collection and usage practices outlined in
our Privacy Policy.

Continue



NEWSLETTERS

You have been successfully signed up. To sign up for more newsletters or to
manage your account, visit the Newsletter Subscription Center.

ZDNet Security Your weekly update on security around the globe, featuring
research, threats, and more. Email Address Subscribe
See All
See All


ZDNet
Connect with us


© 2021 ZDNET, A RED VENTURES COMPANY. ALL RIGHTS RESERVED. Privacy Policy |
Cookie Settings | Advertise | Terms of Use

 * Topics
 * Galleries
 * Videos
 * Sponsored Narratives
 * Do Not Sell My Information

 * About ZDNet
 * Meet The Team
 * All Authors
 * RSS Feeds
 * Site Map
 * Reprint Policy

 * Manage | Log Out
 * Join | Log In
 * Membership
 * Newsletters
 * Site Assistance
 * ZDNet Academy

Manage Cookies