The Asia Pacific (APAC) region has long been considered as a fertile breeding ground for the potentially revolutionary technology: quantum computing. Countries such as China, Japan, India, Australia, South Korea, Singapore, and Taiwan are recognized global leaders in this frontier fuelled by strong government support and rapid adoption, particularly in finance, pharmaceuticals, and start-up sectors.

At the heart of this technological shift lies a powerful and double-edged capability: quantum computers could eventually break many of today’s encryption methods, raising concerns over cybersecurity. Yet, the same technology also holds the promise of creating new, quantum-resistant encryption standards, which can reshape how we secure digital information in the future. For now, these capabilities exist largely in laboratory settings and proof-of-concept demonstrations, making the timeline for both the threats and benefits uncertain, though the need for preparation remains urgent.
“The quantum computing market in APAC is currently on a steep growth trajectory. From USD 392.1 million last year, experts foresee a massive growth to USD 1.78 billion by 2032, soaring at a robust CAGR of 24.2%. This is both exciting and worrying. Organizations here should remember that quantum computing is the next cyber frontier. It could unlock ground-breaking innovations, but also usher the region to a new era of cybersecurity threats,” says Sergey Lozhkin, Head of Global Research & Analysis Team for META and APAC at Kaspersky.
To better understand the scope of the evolving threat, Lozhkin identified three of the most urgent quantum-related risks that demand attention and action.
The top three risks
Quantum computers could be used to compromise the traditional encryption methods that
currently protect data in countless digital systems — posing a direct threat to global cybersecurity infrastructures. Threats include the interception and decoding of sensitive diplomatic, military, and financial communications, as well as the real-time decryption of private negotiations – something quantum systems could handle much faster than classical machines, turning secure conversations into open books.
1. Store now, decrypt later: the key threat of the coming years
Threat actors are already harvesting encrypted data today, with the intention of decrypting it in the future once quantum capabilities advance. This “store now, decrypt later” tactic could expose sensitive information years after it was originally transmitted — including diplomatic exchanges, financial transactions, and private communications.
2. Sabotage in blockchain and cryptocurrency
Blockchain networks are not immune to quantum threats. Bitcoin’s Elliptic Curve Digital Signature Algorithm (ECDSA), which relies on elliptic curve cryptography (ECC), is especially vulnerable.
Potential risks include forging digital signatures, which threatens Bitcoin, Ethereum, and other cryptocurrencies; attacks on ECDSA that secure crypto wallets; and tampering with blockchain transaction history, undermining trust and integrity.
3. Quantum-resistant ransomware: a new front
Looking ahead, developers and operators of advanced ransomware may begin adopting post-quantum cryptography to protect their own malicious payloads. So-called “quantum-resistant” ransomware would be designed to resist decryption by both classical and quantum computers — potentially making recovery without paying a ransom nearly impossible.
At present, quantum computing does not offer a way to decrypt files locked by current ransomware. Data protection and recovery still rely on traditional security solutions and collaboration among law enforcement agencies, quantum researchers, and international organizations.
Building quantum-safe defenses
Quantum computers are not yet a direct threat — but by the time they are, it may be too late to
respond. Transitioning to post-quantum cryptography will take years. Preparations must begin today.
The cybersecurity community, IT companies, and governments must coordinate to address the risks ahead. Policymakers should develop clear strategies to migrate to post-quantum algorithms. Businesses and researchers need to begin implementing new security standards now.
“The most critical risk lies not really in the future, but in the present: encrypted data with long-term value is already at risk from future decryption. While practical quantum computers capable of breaking current encryption don’t yet exist, the threat is real because malicious actors can store encrypted data today and decrypt it once the technology matures. The security decisions we make today will define the resilience of our digital infrastructure for decades. Governments, businesses, and infrastructure providers must begin adapting now, or risk systemic vulnerabilities that cannot be retroactively fixed,” adds Lozhkin.
To learn more about the latest threats, visit www.kaspersky.com.