Connect with us

Cyber Security

Can Quantum Computers Be Hacked? New Research Identifies Top Threats

Published

on

The study was presented during the cyber festival Positive Hack Days 2 taking place on May 23–26 at the Luzhniki sports complex in Moscow

Reporting from Moscow, Russia: Gartner predicts nearly half of large enterprises will be exploring it by 2025, and investment is surging (reaching a record $2.35 billion in 2023 according to McKinsey). But this exciting field isn’t just attracting legitimate players. A new study by Positive Technologies, QBoard, QApp, and the Russian Quantum Center highlights the top cybersecurity threats to quantum technologies. Information theft, software vulnerabilities, and attacks targeting the quantum internet are the most concerning areas.

The study identifies five key vulnerabilities, with the first four targeting quantum computers specifically and the final one impacting quantum communication channels:

  1. Physical threats related to the instability and sensitivity of qubits (quantum bits). Experts believe that attackers can carry out denial-of-service (DoS) attacks: for example, by heating up quantum computers and causing interference to corrupt data. At present, such attacks are possible because the equipment is highly sensitive to the external environment, which may allow attackers to cause equipment malfunction.
  2. Theft of confidential information. Experts predict that the stolen results of quantum computing will be highly valued by attackers, as the quantum systems and the calculations based on them are very expensive.
  3. Vulnerabilities in software designed for quantum computing will also pose a serious threat. They have already been found in some underlying solutions. For example, two high-severity vulnerabilities have been discovered in the NVIDIA cuQuantum Appliance: CVE-2023-36632 and CVE-2018-20225. Another high-severity vulnerability was found in the Quantum Development Kit library for Visual Studio Code: CVE-2021-27082. In the future, the exploitation of quantum software vulnerabilities could lead to leakage of sensitive information, hijacking of hardware resources, and disabling equipment.
  4. Threat to cloud computing. The development of cloud-based quantum solutions is likely to encourage attackers to actively search for vulnerabilities in solutions of various vendors and attack IT companies that provide quantum-based services. Typical cyber threats here include improper configuration of cloud services, vulnerabilities in cloud services, insecure data storage, insecure data processing by service providers, and denial-of-service attacks. These issues also pose a threat to Quantum Computing-as-a-Service (QCaaS) infrastructures.
  5. Attacks against the quantum internet. Attacks against the quantum internet pursue goals similar to those of attacks on conventional networks: stealing information, disrupting the integrity or availability of quantum nodes or quantum networks, and hijacking quantum connections or computational resources.

“The emergence of a truly powerful quantum computer, capable of solving mathematical problems that are unsolvable today, will take the race between the tech giants to a new level. Computation results will become more valuable to competitors and hackers alike. And safeguarding the results of quantum computing will be a major function of cybersecurity,” comments Ekaterina Snegireva, Senior Analyst at Positive Technologies. “The usual race between cyberattackers and defenders will also move to a new level with the advent of quantum computers.”

According to the experts, the threats to post-quantum cryptography are no less significant. As noted in the study, the “store now, decrypt later” tactic will allow attackers to decrypt the stolen data in the future, using a more powerful quantum computer. As a result, a lot of sensitive data is already at risk. To protect themselves, some companies are starting to implement the so-called post-quantum cryptography methods.

“Quantum technologies will enter a phase of complex development efforts in 2025–2030 and beyond. New high-tech products and services will be created by combining quantum technology with adjacent and complementary technologies such as biomedical engineering, new materials, artificial intelligence, and more. These products and services are expected to be implemented in the high-priority sectors of the economy,” says Yaroslav Borisov, Head of New Projects at Kvant Joint Venture, LLC. “As a result, a new high-tech industry will emerge, offering market-driven solutions, products, and services for various needs, including cybersecurity.”

“Due to the rapid development of quantum technologies and the emergence of the quantum industry, we must start thinking about their possible implications as soon as possible,” mentions Aleksey Fedorov, Head of the Science Team at the Russian Quantum Center. “Along with obvious advantages, quantum computers create a threat to information infrastructures which are based on conventional cryptographic algorithms. Now is the time to embrace quantum-resistant solutions. In addition, quantum computing services themselves may be targeted, given their importance for various tasks. To fully integrate quantum computing into business processes, we need to anticipate possible attack scenarios and eliminate weaknesses that would enable such attacks.”

“Middleware and end-user software based on post-quantum algorithms can improve the cybersecurity of a wide range of solutions, including those leveraging quantum technologies. Technology synergies with quantum communications solutions have been identified and are being tested, and work is underway in other areas,” comments Anton Guglya, CEO of QApp.

However, due to the high variability of emerging quantum tech-based products, there are currently no comprehensive cybersecurity tools for quantum technology in the market. Some vendors, including Positive Technologies, see the launch of new bug bounty programs to find vulnerabilities in quantum systems as a promising option. Another important step for the future of cybersecurity is quantum key distribution. Many research centres are now working on this concept, with the expectation of creating more secure communication channels.

Cyber Security

GISEC Global 2025: Phishing, Data Breaches, Ransomware, and Supply Chain Attacks Causing Challenges

Published

on

Maher Jadallah, the Vice President for Middle East and North Africa at Tenable, says effective exposure management requires a unified view of the entire attack surface (more…)

Continue Reading

Cyber Security

GISEC Global 2025: A Place Where Innovation, Partnerships, and Leadership Come Together

Published

on

Meriam ElOuazzani, the Senior Regional Director for META at SentinelOne, says, the company will showcase its latest developments in AI-powered security solutions, reinforcing its position as a leader in this area (more…)

Continue Reading

Artificial Intelligence

Cequence Intros Security Layer to Protect Agentic AI Interactions

Published

on

Cequence Security has announced significant enhancements to its Unified API Protection (UAP) platform to deliver a comprehensive security solution for agentic AI development, usage, and connectivity. This enhancement empowers organizations to secure every AI agent interaction, regardless of the development framework. By implementing robust guardrails, the solution protects both enterprise-hosted AI applications and external AI APIs, preventing sensitive data exfiltration through business logic abuse and ensuring regulatory compliance.

There is no AI without APIs, and the rapid growth of agentic AI applications has amplified concerns about securing sensitive data during their interactions. These AI-driven exchanges can inadvertently expose internal systems, create significant vulnerabilities, and jeopardize valuable data assets. Recognising this critical challenge, Cequence has expanded its UAP platform, introducing an enhanced security layer to govern interactions between AI agents and backend services specifically. This new layer of security enables customers to detect and prevent AI bots such as ChatGPT from OpenAI and Perplexity from harvesting organizational data.

Internal telemetry across Global 2000 deployments shows that the overwhelming majority of AI-related bot traffic, nearly 88%, originates from large language model infrastructure, with most requests obfuscated behind generic or unidentified user agents. Less than 4% of this traffic is transparently attributed to bots like GPTBot or Gemini. Over 97% of it comes from U.S.-based IP addresses, highlighting the concentration of risk in North American enterprises. Cequence’s ability to detect and govern this traffic in real time, despite the lack of clear identifiers, reinforces the platform’s unmatched readiness for securing agentic AI in the wild.

Key enhancements to Cequence’s UAP platform include:

  • Block unauthorized AI data harvesting: Understanding that external AI often seeks to learn by broadly collecting data without obtaining permission, Cequence provides organizations with the critical capability to manage which AI, if any, can interact with their proprietary information.
  • Detect and prevent sensitive data exposure: Empowers organizations to effectively detect and prevent sensitive data exposure across all forms of agentic AI. This includes safeguarding against external AI harvesting attempts and securing data within internal AI applications. The platform’s intelligent analysis automatically differentiates between legitimate data access during normal application usage and anomalous activities signaling sensitive data exfiltration, ensuring comprehensive protection against AI-related data loss.
  • Discover and manage shadow AI: Automatically discovers and classifies APIs from agentic AI tools like Microsoft Copilot and Salesforce Agentforce, presenting a unified view alongside customers’ internal and third-party APIs. This comprehensive visibility empowers organizations to easily manage these interactions and effectively detect and block sensitive data leaks, whether from external AI harvesting or internal AI usage.
  • Seamless integration: Integrates easily into DevOps frameworks for discovering internal AI applications and generates OpenAPI specifications that detail API schemas and security mechanisms, including strong authentication and security policies. Cequence delivers powerful protection without relying on third-party tools, while seamlessly integrating with the customer’s existing cybersecurity ecosystem. This simplifies management and security enforcement.

“Gartner predicts that by 2028, 33% of enterprise software applications will include agentic AI, up from less than 1% in 2024, enabling 15% of day-to-day work decisions to be made autonomously. We’ve taken immediate action to extend our market-leading API security and bot management capabilities,” said Ameya Talwalkar, CEO of Cequence. “Agentic AI introduces a new layer of complexity, where every agent behaves like a bidirectional API. That’s our wheelhouse. Our platform helps organizations embrace innovation at scale without sacrificing governance, compliance, or control.”

These extended capabilities will be generally available in June.

Continue Reading
Advertisement

Follow Us

Trending

Copyright © 2021 Security Review Magazine. Rysha Media LLC. All Rights Reserved.