Then doesn't that mean the "you need ECDSA, and a Quantum Signature to move it" scheme is irrelevant from the viewpoint of the attacker?
It is relevant, because the attacker would be able to break only ECDSA, but not the quantum part, which could require for example knowing the seed.
If it could crack one address derived from the seed, then it could crack all addresses derived from that seed.
Of course. But the attacker still wouldn't know the seed. And if it will be required in that "quantum part", then only the real owner would be able to make it.
Think about it for a moment: if the real owner knows the seed, and the attacker cannot get it, without breaking hash functions behind it (which is different case than breaking elliptic curves), then it can be used to check, if a given signature is made by the attacker, or by the real owner.
Thats practically saying it could just crack one address
No, because if committing to the seed will be part of the "quantum path", then only the real owner would be able to do that.
In general, the main downside of using that approach, is that not all public keys are derived from seeds, some of them are just randomly generated, if some user is not using any kind of HD wallet. If not that, then it would be much easier to reach consensus here, and simply require committing to the seed for all old addresses. But because there are non-HD keys in use, that approach would make them unspendable (or rather: as hard to spend as "bitcoin eater", and similar addresses: it would simply require breaking the cryptography behind converting seeds to keys).