The 2025 Retail Cyberstorm: How Post-Quantum Cryptography Could Have Prevented Major Breaches
The 2025 Retail Cyberstorm: How Post-Quantum Cryptography Could Have Prevented Major Breaches
May 29, 2025
In a digital economy where trust is currency, the spring of 2025 dealt a crushing blow to consumer confidence in some of the world’s most recognized retail brands. A coordinated wave of cyberattacks impacted major players like Victoria's Secret, Britain's Marks & Spencer (M&S), Harrods, Adidas, and others. The breaches not only disrupted online services but exposed personal customer data, crippled loyalty programs, and revealed glaring weaknesses in the cybersecurity infrastructures of these corporations.
This new era of cyber threats signals that traditional cryptographic defenses are no longer sufficient—and it brings post-quantum cryptography (PQC) into sharp focus as a critical security solution.
Read QuantumGenie's other industry insights here.
A Wake-Up Call for the Retail Industry
Retailers operate at the intersection of customer experience and sensitive data. Every transaction involves personal information, payment credentials, and behavioral analytics. This makes retailers prime targets for cybercriminals who now leverage increasingly advanced techniques—ranging from social engineering and ransomware to zero-day exploits and backdoor malware.
In April and May 2025, several breaches made headlines:
Victoria’s Secret temporarily shut down its website due to a cyberattack that compromised backend systems. The company responded quickly, bringing in forensic investigators, but the outage lasted days—costing untold revenue and shaking customer loyalty.
Marks & Spencer (M&S) suffered an attack allegedly linked to the hacker group “Scattered Spider,” which infiltrated the system via a third-party contractor. As a result, in-store inventory syncing failed, online orders stalled, and the popular Sparks loyalty scheme was disrupted. Early estimates suggest the breach could cost M&S upwards of £300 million in lost revenue and remediation.
Adidas, Harrods, and several grocery and fashion retailers also reported simultaneous or near-simultaneous cyber incidents, adding to speculation that these attacks were part of a broader coordinated offensive.
The scale and precision of these breaches suggest an evolution in cyberattack sophistication—one that current encryption methods may no longer be able to withstand.
Read QuantumGenie's other industry insights here.
The Cryptographic Weak Link
Much of today's internet security relies on classical public-key cryptography—specifically RSA, ECC (Elliptic Curve Cryptography), and DH (Diffie-Hellman). These systems are considered secure only under the assumption that adversaries use classical computers. However, with advancements in quantum computing—still nascent but rapidly progressing—those assumptions are becoming obsolete.
Quantum computers, once fully capable, could break RSA-2048 encryption in hours or even minutes using algorithms like Shor’s. While large-scale quantum computers aren't mainstream yet, attackers can exploit a “harvest now, decrypt later” strategy—stealing encrypted data today with the intention of decrypting it once quantum computing becomes viable.
This means even if customer data stolen in these attacks wasn’t decrypted in 2025, it could be in 2028 or 2030—when that data might still be valid and valuable.
Read QuantumGenie's other industry insights here.
How Post-Quantum Cryptography Can Help
Post-Quantum Cryptography refers to cryptographic algorithms designed to resist attacks from both classical and quantum computers. These algorithms, such as ML-KEM (Kyber) and ML-DSA (Dilithium), have already been standardized (or are in the process of standardization) by the National Institute of Standards and Technology (NIST).
Here’s how PQC could have made a difference in the recent retail cyberattacks:
1. Resilient Data Protection
Retailers store vast amounts of sensitive data—from payment card info to purchase histories and home addresses. PQC-based encryption can secure this data even against adversaries with access to future quantum computing resources.
2. Secure Third-Party Integrations
The M&S breach originated from a third-party contractor—an increasingly common attack vector. PQC can encrypt API calls, credential exchanges, and inter-service communications with algorithms immune to both current and future cryptanalytic techniques.
3. Quantum-Safe Identity Verification
Using digital signature algorithms like Dilithium can improve the robustness of authentication and prevent credential spoofing, one of the primary ways hackers gain unauthorized access.
4. Long-Term Data Confidentiality
Even if retailers rotate their encryption keys regularly, any stolen encrypted data could be compromised in the future if it's protected by traditional cryptography. PQC ensures that such data remains safe indefinitely.
Read QuantumGenie's other industry insights here.
Challenges in Implementing PQC
While PQC holds enormous promise, it also introduces new challenges:
Larger Key Sizes: PQC algorithms typically use larger keys and signatures, which can strain system performance and increase storage requirements.
Backward Compatibility: Integrating PQC into legacy systems requires careful planning to ensure compatibility across diverse devices and platforms.
Education and Awareness: IT teams need to be trained on these new cryptographic paradigms to deploy and maintain them effectively.
Despite these hurdles, many platforms—including Windows, Linux, and major cloud providers—have begun rolling out support for PQC algorithms, enabling organizations to test and gradually integrate them into production systems.
The Road Ahead: What Retailers Must Do Now
To prevent future breaches of this magnitude, especially as quantum computing draws nearer, the retail sector must take the initiative. Here are practical steps companies should begin today:
Inventory Cryptographic Assets Audit all encryption and key management systems to understand where vulnerabilities may lie.
Implement Hybrid Cryptography Use hybrid algorithms that combine classical and post-quantum methods, offering protection during the transition period.
Collaborate With Cybersecurity Experts Partner with vendors and advisors who are actively engaged in PQC research and deployment.
Plan for Migration Develop a phased roadmap for adopting PQC, including pilot testing, performance benchmarking, and long-term scaling.
Participate in Standards Development Engage with industry consortia and public-private partnerships working on PQC implementation to stay aligned with evolving best practices.
Read QuantumGenie's other industry insights here.
Conclusion
The 2025 wave of retail cyberattacks is a wake-up call not only for the industry but for all sectors reliant on digital infrastructure. As the threats become more advanced and quantum computing looms on the horizon, traditional defenses are no longer enough.
Post-Quantum Cryptography offers a lifeline—one that retailers must urgently begin to explore and adopt. The cost of inaction isn't just lost revenue or downtime; it's the long-term erosion of trust in digital commerce.
Retailers who act now will not only better protect their customers—they will lead the industry into a safer, quantum-secure future.
May 29, 2025
Quantum Insights



Securing the Internet of Things: Why Post-Quantum Cryptography Is Critical for IoT's Future
May 30, 2025



Nord Quantique’s Multimode Qubit Breakthrough: A Leap Toward Scalable Quantum Computing
May 30, 2025



The 2025 Retail Cyberstorm: How Post-Quantum Cryptography Could Have Prevented Major Breaches
May 29, 2025



Microsoft’s Quantum Leap: Inside the Majorana Chip That Could Revolutionize Computing
May 29, 2025



Should Post-Quantum Cryptography Start Now? The Clock Is Ticking
May 28, 2025



Cracking RSA with Fewer Qubits: What Google's New Quantum Factoring Estimate Means for Cybersecurity
May 28, 2025



Quantum Arms Race: U.S. Defense Intelligence Flags Rivals’ Growing Military Use of Quantum Tech
May 27, 2025



Quantum Threats and Bitcoin: Why BlackRock’s Warning Matters for the Future of Crypto Security
May 27, 2025



Sudbury's SNOLAB Ventures into Quantum Computing Research
May 26, 2025



Lockheed Martin and IBM Pioneer Quantum-Classical Hybrid Computing for Complex Molecular Simulations
May 23, 2025



Why the Moon Matters for Quantum Computing: From Helium-3 to Off-Planet Quantum Networks
May 23, 2025



NIST Approves Three Post-Quantum Cryptography Standards: A Milestone for Digital Security
May 22, 2025



Scientists Connect Quantum Processors via Fiber Optic Cable for the First Time
May 21, 2025



Quantum Computing and Encryption Breakthroughs in 2025: A New Era of Innovation
May 21, 2025



How CISOs Can Defend Against the “Harvest Now, Decrypt Later” Threat
May 20, 2025



NVIDIA Expands Quantum and AI Ecosystem in Taiwan Through Strategic Partnerships and Supercomputing Initiatives
May 19, 2025



Quantum Annealing Breakthrough: Quantum Computer Outperforms Fastest Supercomputers
May 18, 2025



Quantum Computing's New Frontier: How the $1.4 Trillion US–UAE Investment Deal is Shaping the Industry
May 16, 2025



Quantum Computing Meets Cancer Research: A New Frontier in Drug Discovery
May 16, 2025



Quantum Industry Leaders Urge Congress to Reauthorize and Expand National Quantum Initiative
May 15, 2025



Honeywell's Quantinuum and Qatar's Al Rabban Capital Forge $1 Billion Quantum Computing Joint Venture
May 15, 2025



Advancing Quantum Machine Learning with Multi-Chip Ensemble Architectures
May 14, 2025



How will the new US-Saudi Arabia AI deal effect the Quantum Computing industry?
May 14, 2025



Saudi Arabia's $600 Billion AI Push: Amazon, Nvidia, and Global Tech Giants Lead the Charge
May 14, 2025



Quantum Computing Breakthrough: Diamond Qubits Achieve Unprecedented Precision
Apr 28, 2025



Australia’s Quantum Cryptography Roadmap: Preparing for a Post-Quantum Future
Apr 26, 2025



Harvest Now, Decrypt later
Apr 25, 2025



NIST’s New Quantum Cryptography Standards: What You Need to Know
Apr 25, 2025
Read our latest commentary and research on the post-quantum encryption space
Read our latest commentary and research on the post-quantum encryption space


Securing the Internet of Things: Why Post-Quantum Cryptography Is Critical for IoT's Future


Nord Quantique’s Multimode Qubit Breakthrough: A Leap Toward Scalable Quantum Computing


The 2025 Retail Cyberstorm: How Post-Quantum Cryptography Could Have Prevented Major Breaches


Microsoft’s Quantum Leap: Inside the Majorana Chip That Could Revolutionize Computing


Should Post-Quantum Cryptography Start Now? The Clock Is Ticking


Cracking RSA with Fewer Qubits: What Google's New Quantum Factoring Estimate Means for Cybersecurity


Quantum Arms Race: U.S. Defense Intelligence Flags Rivals’ Growing Military Use of Quantum Tech


Quantum Threats and Bitcoin: Why BlackRock’s Warning Matters for the Future of Crypto Security


Sudbury's SNOLAB Ventures into Quantum Computing Research


Lockheed Martin and IBM Pioneer Quantum-Classical Hybrid Computing for Complex Molecular Simulations


Why the Moon Matters for Quantum Computing: From Helium-3 to Off-Planet Quantum Networks


NIST Approves Three Post-Quantum Cryptography Standards: A Milestone for Digital Security


Scientists Connect Quantum Processors via Fiber Optic Cable for the First Time


Quantum Computing and Encryption Breakthroughs in 2025: A New Era of Innovation


How CISOs Can Defend Against the “Harvest Now, Decrypt Later” Threat

Securing the Internet of Things: Why Post-Quantum Cryptography Is Critical for IoT's Future

Nord Quantique’s Multimode Qubit Breakthrough: A Leap Toward Scalable Quantum Computing

The 2025 Retail Cyberstorm: How Post-Quantum Cryptography Could Have Prevented Major Breaches

Microsoft’s Quantum Leap: Inside the Majorana Chip That Could Revolutionize Computing

Should Post-Quantum Cryptography Start Now? The Clock Is Ticking

Cracking RSA with Fewer Qubits: What Google's New Quantum Factoring Estimate Means for Cybersecurity

Quantum Arms Race: U.S. Defense Intelligence Flags Rivals’ Growing Military Use of Quantum Tech

Quantum Threats and Bitcoin: Why BlackRock’s Warning Matters for the Future of Crypto Security

Sudbury's SNOLAB Ventures into Quantum Computing Research

Lockheed Martin and IBM Pioneer Quantum-Classical Hybrid Computing for Complex Molecular Simulations

Why the Moon Matters for Quantum Computing: From Helium-3 to Off-Planet Quantum Networks

NIST Approves Three Post-Quantum Cryptography Standards: A Milestone for Digital Security

Scientists Connect Quantum Processors via Fiber Optic Cable for the First Time

Quantum Computing and Encryption Breakthroughs in 2025: A New Era of Innovation

How CISOs Can Defend Against the “Harvest Now, Decrypt Later” Threat
In a digital economy where trust is currency, the spring of 2025 dealt a crushing blow to consumer confidence in some of the world’s most recognized retail brands. A coordinated wave of cyberattacks impacted major players like Victoria's Secret, Britain's Marks & Spencer (M&S), Harrods, Adidas, and others. The breaches not only disrupted online services but exposed personal customer data, crippled loyalty programs, and revealed glaring weaknesses in the cybersecurity infrastructures of these corporations.
This new era of cyber threats signals that traditional cryptographic defenses are no longer sufficient—and it brings post-quantum cryptography (PQC) into sharp focus as a critical security solution.
Read QuantumGenie's other industry insights here.
A Wake-Up Call for the Retail Industry
Retailers operate at the intersection of customer experience and sensitive data. Every transaction involves personal information, payment credentials, and behavioral analytics. This makes retailers prime targets for cybercriminals who now leverage increasingly advanced techniques—ranging from social engineering and ransomware to zero-day exploits and backdoor malware.
In April and May 2025, several breaches made headlines:
Victoria’s Secret temporarily shut down its website due to a cyberattack that compromised backend systems. The company responded quickly, bringing in forensic investigators, but the outage lasted days—costing untold revenue and shaking customer loyalty.
Marks & Spencer (M&S) suffered an attack allegedly linked to the hacker group “Scattered Spider,” which infiltrated the system via a third-party contractor. As a result, in-store inventory syncing failed, online orders stalled, and the popular Sparks loyalty scheme was disrupted. Early estimates suggest the breach could cost M&S upwards of £300 million in lost revenue and remediation.
Adidas, Harrods, and several grocery and fashion retailers also reported simultaneous or near-simultaneous cyber incidents, adding to speculation that these attacks were part of a broader coordinated offensive.
The scale and precision of these breaches suggest an evolution in cyberattack sophistication—one that current encryption methods may no longer be able to withstand.
Read QuantumGenie's other industry insights here.
The Cryptographic Weak Link
Much of today's internet security relies on classical public-key cryptography—specifically RSA, ECC (Elliptic Curve Cryptography), and DH (Diffie-Hellman). These systems are considered secure only under the assumption that adversaries use classical computers. However, with advancements in quantum computing—still nascent but rapidly progressing—those assumptions are becoming obsolete.
Quantum computers, once fully capable, could break RSA-2048 encryption in hours or even minutes using algorithms like Shor’s. While large-scale quantum computers aren't mainstream yet, attackers can exploit a “harvest now, decrypt later” strategy—stealing encrypted data today with the intention of decrypting it once quantum computing becomes viable.
This means even if customer data stolen in these attacks wasn’t decrypted in 2025, it could be in 2028 or 2030—when that data might still be valid and valuable.
Read QuantumGenie's other industry insights here.
How Post-Quantum Cryptography Can Help
Post-Quantum Cryptography refers to cryptographic algorithms designed to resist attacks from both classical and quantum computers. These algorithms, such as ML-KEM (Kyber) and ML-DSA (Dilithium), have already been standardized (or are in the process of standardization) by the National Institute of Standards and Technology (NIST).
Here’s how PQC could have made a difference in the recent retail cyberattacks:
1. Resilient Data Protection
Retailers store vast amounts of sensitive data—from payment card info to purchase histories and home addresses. PQC-based encryption can secure this data even against adversaries with access to future quantum computing resources.
2. Secure Third-Party Integrations
The M&S breach originated from a third-party contractor—an increasingly common attack vector. PQC can encrypt API calls, credential exchanges, and inter-service communications with algorithms immune to both current and future cryptanalytic techniques.
3. Quantum-Safe Identity Verification
Using digital signature algorithms like Dilithium can improve the robustness of authentication and prevent credential spoofing, one of the primary ways hackers gain unauthorized access.
4. Long-Term Data Confidentiality
Even if retailers rotate their encryption keys regularly, any stolen encrypted data could be compromised in the future if it's protected by traditional cryptography. PQC ensures that such data remains safe indefinitely.
Read QuantumGenie's other industry insights here.
Challenges in Implementing PQC
While PQC holds enormous promise, it also introduces new challenges:
Larger Key Sizes: PQC algorithms typically use larger keys and signatures, which can strain system performance and increase storage requirements.
Backward Compatibility: Integrating PQC into legacy systems requires careful planning to ensure compatibility across diverse devices and platforms.
Education and Awareness: IT teams need to be trained on these new cryptographic paradigms to deploy and maintain them effectively.
Despite these hurdles, many platforms—including Windows, Linux, and major cloud providers—have begun rolling out support for PQC algorithms, enabling organizations to test and gradually integrate them into production systems.
The Road Ahead: What Retailers Must Do Now
To prevent future breaches of this magnitude, especially as quantum computing draws nearer, the retail sector must take the initiative. Here are practical steps companies should begin today:
Inventory Cryptographic Assets Audit all encryption and key management systems to understand where vulnerabilities may lie.
Implement Hybrid Cryptography Use hybrid algorithms that combine classical and post-quantum methods, offering protection during the transition period.
Collaborate With Cybersecurity Experts Partner with vendors and advisors who are actively engaged in PQC research and deployment.
Plan for Migration Develop a phased roadmap for adopting PQC, including pilot testing, performance benchmarking, and long-term scaling.
Participate in Standards Development Engage with industry consortia and public-private partnerships working on PQC implementation to stay aligned with evolving best practices.
Read QuantumGenie's other industry insights here.
Conclusion
The 2025 wave of retail cyberattacks is a wake-up call not only for the industry but for all sectors reliant on digital infrastructure. As the threats become more advanced and quantum computing looms on the horizon, traditional defenses are no longer enough.
Post-Quantum Cryptography offers a lifeline—one that retailers must urgently begin to explore and adopt. The cost of inaction isn't just lost revenue or downtime; it's the long-term erosion of trust in digital commerce.
Retailers who act now will not only better protect their customers—they will lead the industry into a safer, quantum-secure future.
Let's talk!
Office:
1535 Broadway
New York, NY 10036
USA
Local time:
19:50:47
Let's talk!
Office:
1535 Broadway
New York, NY 10036
USA
Local time:
19:50:47