{"id":504715,"date":"2026-04-14T18:19:46","date_gmt":"2026-04-14T22:19:46","guid":{"rendered":"https:\/\/deultimominuto.net\/en\/uncategorized\/cybercriminals-already-steal-and-store-data-to-decrypt-it-in-the-future\/"},"modified":"2026-04-14T18:19:46","modified_gmt":"2026-04-14T22:19:46","slug":"cybercriminals-already-steal-and-store-data-to-decrypt-it-in-the-future","status":"publish","type":"post","link":"https:\/\/deultimominuto.net\/en\/uncategorized\/cybercriminals-already-steal-and-store-data-to-decrypt-it-in-the-future\/","title":{"rendered":"Cybercriminals already steal and store data to decrypt it in the future"},"content":{"rendered":"\n<p><strong>Madrid .- <\/strong>\u2018Steal now to decrypt later\u2019; is the new tactic that cybercriminals are already using, who would be stealing and \u2018freezing\u2019 large volumes of data that are encrypted and inaccessible, but that they do hope to be able to unravel in the future thanks to the development of new technologies, including quantum computing.<\/p>\n\n\nCybersecurity companies have warned of the real risks of this tactic ('store now, decrypt later') and some experts have stated that before the year 2030, sufficient technological capacity could be reached to break the mathematical and cryptographic algorithms that currently protect communications, financial transactions, or numerous databases.\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/i0.wp.com\/efe.com\/wp-content\/uploads\/2024\/12\/Ciberdelincuencia-portatil-fondo-verde1-ESPIONAJE.jpg?resize=900%2C600&amp;ssl=1\" alt=\"\" class=\"wp-image-1559201\" title=\"\"><figcaption class=\"wp-element-caption\">Una persona utiliza un ordenador port\u00e1til en una imagen de archivo. EFE\/Sascha Steinbach<\/figcaption><\/figure>\n\n\nAnd so they await what experts have dubbed the 'Q day', the day when quantum computing reaches a phase of commercial and operational development sufficient to breach and break current systems, which puts at risk - experts warn - those critical data (such as medical records, industrial secrets, financial or national security information) whose useful life and need for confidentiality extends for many years.\n\nThose threats and the risk they entail have been evident in numerous studies carried out by companies specializing in cybersecurity, and also in a report recently approved by the Joint Commission (Congress and Senate) on National Security after analyzing the threats in cyberspace within the context of <a href=\"https:\/\/efe.com\/noticias\/inteligencia-artificial\/\" target=\"_blank\" rel=\"noreferrer noopener\">artificial intelligence<\/a> and quantum computing.\n\n\n<h4 class=\"wp-block-heading\" id=\"h-una-tactica-que-ya-emplean-estados-y-grupos-de-espionaje\"><strong>A tactic already used by states and espionage groups<\/strong><\/h4>\n\n\nIt's not a fictional scenario, but a real one that has already been documented, according to experts consulted by EFE, who have observed that the cycles of technological renewal in many companies and critical infrastructures are relatively slow - between 6 and 10 years - which means that some of&nbsp;<a href=\"https:\/\/efe.com\/ciencia-y-tecnologia\/ciberdelitos-cibercriminalidad-estafas-fraudes-victimas\/\" target=\"_blank\" rel=\"noreferrer noopener\">current security technologies<\/a>&nbsp;will still be operational when quantum computing becomes a reality.\n\nThe key idea: \"it is not enough to protect data against current threats, but against future capabilities, even if those capabilities are not yet commercially available,\" said Alejandro Rebolledo, a solutions consultant engineer at the multinational NetApp -specialized in the storage and protection of large data volumes- for Spain and Portugal.\n\nIn statements to EFE, Rebolledo has assured that there is already evidence that some actors, especially states and espionage groups, are employing this tactic and that they are capturing and \"kidnapping\" large volumes of data and communications encrypted with classical algorithms to decrypt the information when quantum computing reaches a certain level of maturity.\n\nMany data points are very ephemeral and lack long-term value, but in some sectors - such as defense, health, finance, or industrial property - they do maintain their strategic value for decades, this expert has assured, and in that sense, he has referred to design plans, formulas, market strategies, contracts, or production information, which attackers can \"freeze\" today to use in the future.\n\n\n<h4 class=\"wp-block-heading\" id=\"h-una-amenaza-retrospectiva\"><strong>A Retrospective Threat<\/strong><\/h4>\n\n\nIn the same vein, \u00c1ngel Serrano, head of Technical Solutions for Iberia at the American multinational Palo Alto -specializing in cybersecurity-, has stated that \"the quantum threat is already here\" and poses a \"retroactive\" threat, and has warned that the security breaches that will allow criminals to decipher that information \"are happening now\".\n\n\u00abIt's as if an adversary were robbing all the closed safes today, knowing that they will soon have a master key to open them,\u00bb Serrano pointed out to EFE, and noted that some companies have pointed to 2029 as the moment when conventional cryptography could begin to be insecure and the moment when hostile nation-states could militarize quantum technology.\n\n\n<p>The intelligence unit data from this company reveals that the average time to infiltrate and steal data has been reduced to just 25 minutes and attacks now last only 72 minutes from initial access to extraction, which means they are four times faster than last year; \"at that speed, attackers do not distinguish between encrypted and unencrypted data\".<\/p>\n\n\nThe two experts have framed in this tactic ('steal now to decipher tomorrow') some of the attacks and massive data theft that have occurred in recent years but have not had an immediate impact despite the significant media coverage, convinced that the 'bad guys' already have frozen huge amounts of encrypted data waiting to have the technology that will allow them to access it.","protected":false},"excerpt":{"rendered":"<p>Madrid .- \u2018Steal now to decrypt later\u2019; is the new tactic that cybercriminals are already using, who would be stealing and \u2018freezing\u2019 large volumes of data that are encrypted and inaccessible, but that they do hope to be able to unravel in the future thanks to the development of new technologies, including quantum computing. Cybersecurity [&hellip;]<\/p>\n","protected":false},"author":111,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-504715","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-uncategorized"},"acf":[],"jetpack_featured_media_url":"","dum_api":{"author_name":"Ana Laura L\u00f3pez","author_image":"https:\/\/deultimominuto.net\/wp-content\/uploads\/2025\/01\/cropped-WhatsApp-Image-2025-01-29-at-1.45.56-PM-96x96.jpeg","categories_name":["Uncategorized"],"featured_media_url":null},"_links":{"self":[{"href":"https:\/\/deultimominuto.net\/en\/wp-json\/wp\/v2\/posts\/504715","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/deultimominuto.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/deultimominuto.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/deultimominuto.net\/en\/wp-json\/wp\/v2\/users\/111"}],"replies":[{"embeddable":true,"href":"https:\/\/deultimominuto.net\/en\/wp-json\/wp\/v2\/comments?post=504715"}],"version-history":[{"count":0,"href":"https:\/\/deultimominuto.net\/en\/wp-json\/wp\/v2\/posts\/504715\/revisions"}],"wp:attachment":[{"href":"https:\/\/deultimominuto.net\/en\/wp-json\/wp\/v2\/media?parent=504715"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/deultimominuto.net\/en\/wp-json\/wp\/v2\/categories?post=504715"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/deultimominuto.net\/en\/wp-json\/wp\/v2\/tags?post=504715"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}