Wednesday, April 15, 2026

Cybercriminals already steal and store data to decrypt it in the future

  • aplicacion - banner 728px

Madrid .- ‘Steal now to decrypt later’; is the new tactic that cybercriminals are already using, who would be stealing and ‘freezing’ large volumes of data that are encrypted and inaccessible, but that they do hope to be able to unravel in the future thanks to the development of new technologies, including quantum computing.

Cybersecurity companies have warned of the real risks of this tactic ('store now, decrypt later') and some experts have stated that before the year 2030, sufficient technological capacity could be reached to break the mathematical and cryptographic algorithms that currently protect communications, financial transactions, or numerous databases.
Cybercriminals already steal and store data to decrypt it in the future | De Último Minuto English
Una persona utiliza un ordenador portátil en una imagen de archivo. EFE/Sascha Steinbach
And so they await what experts have dubbed the 'Q day', the day when quantum computing reaches a phase of commercial and operational development sufficient to breach and break current systems, which puts at risk - experts warn - those critical data (such as medical records, industrial secrets, financial or national security information) whose useful life and need for confidentiality extends for many years. Those threats and the risk they entail have been evident in numerous studies carried out by companies specializing in cybersecurity, and also in a report recently approved by the Joint Commission (Congress and Senate) on National Security after analyzing the threats in cyberspace within the context of artificial intelligence and quantum computing.

A tactic already used by states and espionage groups

It's not a fictional scenario, but a real one that has already been documented, according to experts consulted by EFE, who have observed that the cycles of technological renewal in many companies and critical infrastructures are relatively slow - between 6 and 10 years - which means that some of current security technologies will still be operational when quantum computing becomes a reality. The key idea: "it is not enough to protect data against current threats, but against future capabilities, even if those capabilities are not yet commercially available," said Alejandro Rebolledo, a solutions consultant engineer at the multinational NetApp -specialized in the storage and protection of large data volumes- for Spain and Portugal. In statements to EFE, Rebolledo has assured that there is already evidence that some actors, especially states and espionage groups, are employing this tactic and that they are capturing and "kidnapping" large volumes of data and communications encrypted with classical algorithms to decrypt the information when quantum computing reaches a certain level of maturity. Many data points are very ephemeral and lack long-term value, but in some sectors - such as defense, health, finance, or industrial property - they do maintain their strategic value for decades, this expert has assured, and in that sense, he has referred to design plans, formulas, market strategies, contracts, or production information, which attackers can "freeze" today to use in the future.

A Retrospective Threat

In the same vein, Ángel Serrano, head of Technical Solutions for Iberia at the American multinational Palo Alto -specializing in cybersecurity-, has stated that "the quantum threat is already here" and poses a "retroactive" threat, and has warned that the security breaches that will allow criminals to decipher that information "are happening now". «It's as if an adversary were robbing all the closed safes today, knowing that they will soon have a master key to open them,» Serrano pointed out to EFE, and noted that some companies have pointed to 2029 as the moment when conventional cryptography could begin to be insecure and the moment when hostile nation-states could militarize quantum technology.

The intelligence unit data from this company reveals that the average time to infiltrate and steal data has been reduced to just 25 minutes and attacks now last only 72 minutes from initial access to extraction, which means they are four times faster than last year; "at that speed, attackers do not distinguish between encrypted and unencrypted data".

The two experts have framed in this tactic ('steal now to decipher tomorrow') some of the attacks and massive data theft that have occurred in recent years but have not had an immediate impact despite the significant media coverage, convinced that the 'bad guys' already have frozen huge amounts of encrypted data waiting to have the technology that will allow them to access it.

In the spotlight

  • aplicacion - banner 300px

  • banner altices 300x250 junio 2025

Explore more

Industrial credit portfolio grew 9.5% and reaches RD$164 billion

The Dominican banking sector continues to support the development of the national industry, with a credit portfolio that reached RD$164,194 million in December 2025, according to the Report on banking and the national industry 2026, published by the Superintendency of Banks (SB). The publication highlights that the industrial portfolio grew 9.5% last year, equivalent to […]

Rafa Rosario says that with the death of Carlos Batista he lost a great friend

Santo Domingo, RD.- The leader of the group Los Hermanos Rosario, Rafa Rosario was visibly affected during the funeral of the communicator Carlos Batista, where he went on Tuesday night to say goodbye to the person he described as a close friend and a key figure in his personal and professional life. Upon his arrival […]

Candidate Roberto Sánchez rejects fraud and calls for respect for the vote of "deep Peru"

Lima .- Left-wing presidential candidate Roberto Sánchez rejected on Tuesday the accusation that he is preparing a "forazo" (electoral fraud) in the general elections of Peru, and, instead, asked for respect for the popular vote of "deep Peru" which, according to his calculations, places him in a second round with right-wing candidate Keiko Fujimori. The […]

Idelsa Núñez highlights Carlos Batista Matos' legacy during wake

Santo Domingo.– The communicator Idelsa Núñez went to the Blandino funeral home to support the family of the communicator Carlos Batista Matos, who passed away on Monday afternoon. Núñez revealed how difficult it was for her to receive the news, highlighting that she always received good advice from Batista Matos, describing him as a noble […]

Belkys Concepción on Carlos Batista Matos: “He left me the best gift of my life, my daughter”

Santo Domingo, RD.- Merengue singer Belkys Concepción expressed deep sorrow over the death of the renowned communicator Carlos Batista Matos, assuring that his departure leaves an irreparable void in her personal and family life. The artist, mother of one of the veteran journalist's daughters, shared emotional words during a conversation with the press, in which […]

Luis Polonia Jr. assumes as general manager of the Dominican team for Santo Domingo 2026

Santo Domingo.– Dominican leader and former player Luis Polonia Jr. has been appointed as general manager of the national baseball team that will represent the country in the Central American and Caribbean Games Santo Domingo 2026. The designation of Poland Jr. is part of the efforts to strengthen the structure of the Dominican team with […]