Attacks/Breaches

10/31/2018
02:30 PM
Rodney Joffe
Rodney Joffe
Commentary
Connect Directly
Twitter
LinkedIn
RSS
E-Mail vvv
50%
50%

How the Power of Quantum Can Be Used Against Us

There has been a palpable shift from volumetric attacks to "quantum attacks," and they look to be one of the biggest cybersecurity challenges on the rise today.

Quantum computing has the ability to shape our global information technology. Every day, enterprises are edging closer to harnessing the true power of quantum computing. Now that the technology is moving from research to practice, governments are getting involved too. In late September, the Department of Energy announced $218 million in funding for 85 quantum projects, while the National Science Foundation awarded $31 million for quantum research. Even with these developments, there is not yet a fully functioning quantum computer that can perform all standard computing tasks.

The processing power of quantum computers will fundamentally change the way we approach things. This new approach to processing data may one day lead to revolutionary breakthroughs within and across nations, and industries, solving problems we might not even consider problems today.

However, with any major technology innovation, quantum introduces risks to our current IT infrastructure. For example, quantum can render encryption useless. With encryption ineffective, sensitive data from financial institutions or governments could be made easily accessible. While these threats are not imminent, because quantum computers are still in the making, entire industries need to prepare for what the National Institute of Standards and Technology (NIST) calls the "era of post-quantum cryptography."

The Current Threat
There has been a palpable shift from volumetric attacks to "quantum attacks," and they are looking to be one of the biggest cybersecurity challenges on the rise today. The cybercriminals behind quantum attacks may start off small, but the attacks can quickly become highly complex by adding attack vectors, botnets, and ports.

Current quantum attacks are relatively small. An anomaly of 300 Mbps may probably not even be noticed by a company that is running hundreds of applications in the cloud, and such an attack won't trigger cloud failover. Attackers are familiar with this open window and they try to bypass security endpoints to avoid triggering cloud failover mitigation. These stronger attacks require quantum resources that have not been developed yet, which buys organizations some time. However, the faster quantum computing develops, the more complex attacks will become — and the challenges for companies working to defend against them increases as well. Consequently, it is important for security teams to update and develop a quantum security strategy.

The Future of the Enterprise
In order to understand how cybercriminals can utilize quantum technology to gain sensitive data, let's look at an example in "What Is Quantum Computing?" by the Information Technology & Innovation Foundation. Imagine a phonebook with 10 million entries. A standard search algorithm would have to try an average of 5 million times to find the entry it is looking for. A quantum computer only needs 1,000 operations — and hence is 5,000 times faster.

We don't know when the first major company or country will announce a fully functioning quantum computer, but we know it's not some farfetched fantasy. A quantum computer in the hands of a malicious attacker will be able to decrypt sensitive data currently protected by corporations and governments. So, despite all the current issues security teams are working on every day, it's not too soon to start planning for the post-quantum computing world.

Getting Quantum on Your Radar
To start, IT security professionals should begin monitoring quantum computing updates, trends, attacks, international quantum security standards, and protocols. Next, IT leaders should work together with experienced and reputable partners to help optimize organizations' IT environments and protect their data. NIST and others in the security industry have started to conduct research about quantum-safe cryptographies for classical computers that are capable of resisting quantum attacks. In addition, make sure your services and systems are continuously and fully updated. Only allow services to operate within your organization that are required, and don't leave unneeded services running — they could be a window for quantum attacks if not properly maintained.

It is time for governments and organizations to face the very real threats that come with the introduction of a revolutionary new technology like quantum computing. This isn't an easy problem to solve. Global IT experts will need to invent an entirely new approach to information security, and it will not happen overnight. But acknowledging that these threats are looming is the first step. Then comes action.

Related Content:

 

Black Hat Europe returns to London Dec. 3-6, 2018, with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions, and service providers in the Business Hall. Click for information on the conference and to register.

Rodney Joffe has been a sought-after cybersecurity expert who, among other notable accomplishments, leads the Conficker Working Group to protect the world from the Conficker worm. Providing guidance and knowledge to organizations from the United States government to the ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
High Stress Levels Impacting CISOs Physically, Mentally
Jai Vijayan, Freelance writer,  2/14/2019
Valentine's Emails Laced with Gandcrab Ransomware
Kelly Sheridan, Staff Editor, Dark Reading,  2/14/2019
Making the Case for a Cybersecurity Moon Shot
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  2/19/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-15380
PUBLISHED: 2019-02-20
A vulnerability in the cluster service manager of Cisco HyperFlex Software could allow an unauthenticated, adjacent attacker to execute commands as the root user. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by connecting to the cluster serv...
CVE-2019-3474
PUBLISHED: 2019-02-20
A path traversal vulnerability in the web application component of Micro Focus Filr 3.x allows a remote attacker authenticated as a low privilege user to download arbitrary files from the Filr server. This vulnerability affects all versions of Filr 3.x prior to Security Update 6.
CVE-2019-3475
PUBLISHED: 2019-02-20
A local privilege escalation vulnerability in the famtd component of Micro Focus Filr 3.0 allows a local attacker authenticated as a low privilege user to escalate to root. This vulnerability affects all versions of Filr 3.x prior to Security Update 6.
CVE-2019-10030
PUBLISHED: 2019-02-20
A sandbox bypass vulnerability exists in Jenkins Script Security Plugin 1.52 and earlier in RejectASTTransformsCustomizer.java that allows attackers with Overall/Read permission to provide a Groovy script to an HTTP endpoint that can result in arbitrary code execution on the Jenkins master JVM.
CVE-2019-10030
PUBLISHED: 2019-02-20
A exposure of sensitive information vulnerability exists in Jenkins Cloud Foundry Plugin 2.3.1 and earlier in AbstractCloudFoundryPushDescriptor.java that allows attackers with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through anoth...