FDI bonanza not trickling down in Vietnam

With some US$ 450 billion in foreign direct investment ( FDI ) being converted into significant gross domestic product ( GDP ) and other gains, Vietnam has become one of the greatest economic success stories in the last 35 years. The nation continues to be a top target for internal FDI, drawing in multinational corporations like Samsung, Intel, LG, Toyota, and Lego.

Because of its beneficial side effects, such as technological advancements, ability transfers, management expertise, and value chain integration, FDI is a desirable mechanism for developing nations. These spillovers take place as a result of interactions with multinational corporations( MNEs ), supplier relationships, and learning and competition in the domestic market. & nbsp,

Local businesses become more competitive over time, which allows them to advance in the value chain and contend with MNEs. However, the evidence at hand suggests that Vietnam hasn’t experienced much of this overflow sensation. & nbsp,

While Vietnam has seen some good externalities over the past five years, such as record-breaking career development and economic growth, these gains have fallen short of expectations and have failed to realize the full potential of the nation.

The market is extremely dependent on FDI for exports because local manufacturing firms have few connections with DFI companies. Over 70 % of Vietnam’s total export value is generated by FDI, indicating that local businesses have not experienced similar growth and development.

When FDI firms are present on the market, home businesses typically struggle to increase andnbsp, their absorption capacity, but it seems the Vietnam case is mainly serious. Limited technology transfers exist between FDI companies and local businesses, and Vietnam’s manufacturing industry has unusually low productivity.

Only & nbsp, a small group of Vietnamese businesses, have been able to advance in the value chain. As a result, their functions are primarily limited to supplying input materials or low-value tasks, which result in to & nbsp, fragmented and ineffective n & m, linkages, and externalities.

A Samsung electronics shop under an official propaganda billboard in the center of Hanoi. Photo: AFP / Hoang Dinh Nam
a Samsung electronics store in the heart of Hanoi that is advertised as standard advertising. Asia Times Files, AFP, and Hoang Dinh Nam are the photographers.

Although such an arrangement can provide significant benefits, just a small portion of Vietnam’s nearly 900,000 businesses can access them, according to ONE senior Vietnamese employee at he was working for Samsung. For instance, Apple purchased AirPods & nbsp in 2020 from 21 local suppliers, but none of them were Vietnamese.

The few spill results from Vietnam’s significant FDI flows are due to a number of factors.

Long ago, it seemed that state policies prioritized quantity over quality. Technology transfer requirements were not completely followed. This has resulted in low-tech FDIs proliferating throughout the business, along with open mismanagement in a number of instances. & nbsp,

Many FDI companies place a high priority on straightforward systems in order to capitalize on Vietnam’s market size, ability, and low labor costs.

The fact that Vietnamese businesses have a relatively brief history of advancement compared to their peers is another factor contributing to the low spill. The growth of the private market was hampered by the implementation of a national control business shortly after the nation’s unification in 1975. & nbsp,

Although the Doi Moi policy was implemented in 1986 to correct this strategic error, Vietnamese businesses also have less market experience than their counterparts in the area, and as a result, their corporate governance is significantly poorer.

Private businesses in Vietnam also face a number of obstacles, most notably & nbsp, when trying to access investment and conventional loans. Some people use more expensive unofficial channels to manage. The competitiveness of local businesses on the international stage is hampered by higher logistics costs and minor corruption with government agencies. & nbsp,

Last but not least, there are still gaps between the common sector’s implementation management reality and government ambitions.

Many of these problems are human-made, and disciplined implementation and powerful policies can help. Vietnam has special advantages, such as its strategic area in Southeast Asia, young, agile people, socially stable environment, remarkable innovation performance, thriving digital economy, and an open economy with numerous free trade agreements.

Hanoi should promote investment in human capital by putting into place a thorough countrywide training programme on digital ability in order to fully capitalize on these benefits and encourage positive externalities, especially in building strong local firms. This will make it easier to implement the national 4.0 strategy andnbsp, and it will support the transformations of the & nBSP, Digital & NbSp and Green & NBSP.

Targeted and extensive investment in energy, online, transportation, and other essential infrastructure will also strengthen home businesses’ competitiveness and inspire the workforce. By encouraging a more effective government through improved give and accountability, this can be improved. & nbsp,

On September 29, 2021, a worker in Hanoi mop the shop’s surface. The market has been severely impacted by evacuations. Asia Times Files, AFP, and Nhac Nguyen

Hanoi may appear to other Asian nations like Malaysia, Singapore, and South Korea to see how digitizing government service can increase productivity and how it will disrupt emerging value chains.

In order to draw MNE offices and research and innovation centers, Vietnam had also enhance the business environment, create laws governing state-owned enterprises, and position itself as a local hub.

Vietnam has been a desirable location for FDI companies, but local businesses have not yet fully benefited from it. With the right plan in place, overcoming these obstacles may enhance local businesses and result in greater success.

At RMIT University Vietnam, Trung Quang Nguyen is the ministry of management’s mind. Interim Manager of the RMIT Vietnam International Business Program is Quyen Dang. Senior Lecturer in International Business at RMIT Vietnam is Erhan Atay.

This andnbsp, post, and was initially published by East Asia Forum and are being reprinted with permission from Creative Commons.

Continue Reading

Achieving SDGs amid global disruptions

The world finds itself at a crossroads, facing a multitude of formidable challenges – repercussions from the Covid-19 pandemic, geopolitical turmoil across the globe, and climate emergencies. The urgency of addressing these issues cannot be overstated.

Governments worldwide stand at a unique juncture where they must chart a course toward sustainable development, simultaneously fostering economic opportunity, averting an ecological collapse, and global well-being improvement. This convergence of priorities brings into sharp focus the 2030 agenda for sustainable development, encapsulating the collective ambition to create a better world.

The UN Sustainable Development Goals (SDGs) consist of 17 interlinked objectives established by the United Nations in 2015. They provide a universal framework for all countries, irrespective of their development status, to address global challenges, enhance well-being, and protect the environment.

These goals serve as a shared blueprint for international peace and prosperity, guiding efforts toward a more equitable and sustainable world by 2030, while encouraging collaboration among governments, organizations and individuals to combat poverty, inequality, environmental degradation, and other pressing global issues.

However, the journey toward realizing these SDGs has been met with unforeseen turbulence, primarily due to the profound impact of the Covid-19 pandemic.

The progress achieved thus far has been dealt a setback of historic proportions, with the COV SARS-2 virus reverberating through global health-care systems and international markets, development finance, undoing breakthroughs and stifling advancements that had been painstakingly forged.

Correlation between Covid-19 Infection Rates (2020) and SDG Index Score Growth Rates (2020 compared with 2019) – for High-Income, Upper-Middle Income, Lower-Middle Income and Low-Income Economies. Source: Sustainable Development Report 2020, Sustainable Development Solutions Network

The Covid-19 pandemic emerged as an unprecedented disruptor, severely damaging the SDG agenda. The effects have been felt across the board, with significant declines in global SDG index scores and a concerning increase in poverty, marking the first instance of such regression in decades – an additional 119 million to 124 million people had been pushed into extreme poverty, where South Asia accounts for 60% of this figure.

One of the most pronounced impacts has been on public health and quality of life. The pandemic’s diversion of medical services and the strain on health-care systems have undone decades of progress toward SDG 3 (Good Health and Well-Being). As a result, achieving improved health and well-being for all is now a more formidable challenge than ever before.

Education suffers

SDG 4 (Quality Education), a fundamental pillar of the sustainable development agenda, has suffered significantly.

In 2020, efforts (which some critics found highly questionable) to slow the spread of the respiratory ailment disrupted the educational journeys of more than 1.52 billion adolescents and children worldwide, erasing nearly two decades of academic progress. The repercussions of this setback will likely be felt for generations.

The economic fallout has been equally severe, with the world grappling with its most significant financial crisis since that of 2007-08. During 2020 the world’s collective GDP fall by 3.4%, indicating a substantial decline in economic output. The second wave of Covid-19 resulted in the loss of about 7.5 million jobs, hitting various sectors hard, and severely threatening SDG 8 (Decent Work and Economic Growth).

Ukraine war

Adding to this conundrum, the already complex geopolitical landscape across the globe has only intensified these challenges. The war between Ukraine and Russia is a stark reminder that conflicts in one corner of the world have far-reaching, global ramifications.

It underscores the inextricable link among peace, territorial harmony, and economic prosperity. Armed conflicts have consequences beyond immediate violence; they often result in widespread agricultural abandonment, severely compromising food security.

To be sure, the conflict has disrupted global energy markets, causing fluctuations in energy prices and supply – household energy costs have nearly doubled due to disruptions in the global energy supply chain.

This disruption has been particularly felt in South Asia, where energy markets have been thrown into crisis due to uncertainty in energy supply and increased prices. The collapse of piped gas supplies from Russia has forced countries, including Europe, to seek energy alternatives, often turning to Asia for energy sourcing.

The impact of such conflicts extends beyond the devastation wrought by war itself. Trade wars between significant economies have inadvertently triggered ecological crises, with instances of deforestation and overuse of agricultural land.

The Ukraine-Russia war, for example, has already caused severe damage and loss of life, expanding its reach from population centres to rural areas, and resulting in massive displacement and loss of livelihoods.

According to the UN Security Council, about 14 million people were displaced by the conflict in Europe. This global issue of migration cuts across the entire spectrum of the 2030 Agenda, influencing all 17 SDGs.

Migration-related targets span labor migration, international student mobility, human trafficking, remittances, etc. Recognizing and addressing these complex interlinkages between migration and each SDG is essential for a comprehensive approach to these challenges.

Governments face a pressing need to enhance the accomplishment of the UN SDGs in the face of complex geopolitical and macroeconomic challenges. In the short term, immediate actions are crucial.

Strengthening health-care infrastructure is vital to withstand future health crises, while restoring lost incomes, especially among vulnerable groups, is essential. Ensuring resource security is paramount, particularly for food, water and energy.

Looking ahead, governments must adopt systematic, long-term strategies for inter-departmental cooperation to address the interconnected nature of the SDGs. Identifying and tackling immediate challenges such as poverty, food security, and resource supply is vital. Simultaneously, fostering scientific progress and communication is essential in the longer horizon.

Continue Reading

Ng Kok Song taking extra security precautions after disruption at campaign walkabout

“DIFFERENCES OF OPINION”

Mr Ng was also asked for his response to another rival candidate Tharman Shanmugaratnam who said on Tuesday evening that the former had misquoted him and made “sweeping statements”.

The to-and-fro, centred on the issue of candidate independence, stemmed from comments that Mr Tharman had made during the presidential forum broadcast by CNA on Monday night.

The three candidates were asked how they could convince voters that they would exercise their powers without fear or favour.

Mr Tharman responded that labelling candidates by their political affiliation would be “extremely simplistic” as that would have ruled out many past presidential candidates, such as former presidents Mr Ong Teng Cheong and Dr Tony Tan.

It would also rule out people who may not be members of a political party but who are senior civil servants who “owe their positions to bosses who are political figures”.

“Are they obligated to their bosses because of that? Not necessarily – it depends on the individual,” Mr Tharman said at the forum.

“Let’s say you have a private company, you have a construction company that depends on government contracts. Or you have a fund management company that depends on government monies. Does that make you not independent? Not necessarily. It depends on your character, your track record,” he continued.

Mr Ng responded with a statement on Tuesday, noting that Mr Tharman’s remark about the fund management company “clearly” referred to him. The 75-year-old, who retired from GIC in 2013 following a 45-year-long career in public service, is now the executive chairman of Avanda Investment Management, an asset management company he co-founded in 2015.

Mr Ng also said that by comparing those with past political affiliations to anyone who is dependent on the government in some way, Mr Tharman was “taking the point too far”.

In response, Mr Tharman said later on Tuesday that he had been misquoted.

When asked by reporters on Wednesday morning, Mr Ng said: “I already said what I said yesterday so I do not want to reopen the subject.”

He added that he has “deep respect” for Mr Tharman, who is a “good” friend with whom he had worked with at the Monetary Authority of Singapore and GIC.

“Our differences are differences of opinion, such as when we speak about the presidency. I was concerned about the system, not the individual,” he said.

“I just wanted our system to be a better system … in terms of having a non-partisan President.”

Another difference lies in political affiliation. “We are different – the difference being the fact that he has belonged to a political party and I did not,” said Mr Ng.

Continue Reading

Setting sights on Southeast Asia | FinanceAsia

Global investors have always been drawn to Southeast Asia’s growth story, as one of the world’s fastest developing economies and home to a relatively youthful population of 600 million.

This year’s Asean Summit chair, Indonesia, pitched that the region would continue its role as an epicentre for expansion. Even amid the backdrop of a challenging external environment – from the Russia-Ukraine war, to rising inflation and interest rate escalation – there is still substance behind the Southeast Asian story.

East Ventures, a venture capital (VC) firm based in the region, raised a total of $835 million in the past year across various strategies, achieving in May the first and final close of its debut Growth Plus fund, at $250 million. The vehicle aims to support innovators within the company’s ecosystem of portfolio companies that demonstrate strong potential.

“The successful fundraise shows that with the right strategy, management team and mandate, capital is still available,” Roderick Purwana, managing partner at East Ventures, told FinanceAsia.

The East Ventures team is experiencing promising traction across its portfolio – 60% of its growth-stage start-ups have delivered a positive earnings before interest, taxes, depreciation and amortisation (Ebitda) or are in the process of doing so; and more than 40% have a secured a cash runway beyond 2025. At the end of May, the company had invested in more than 20 start-ups so far this year, across sectors ranging from waste management and mental health, to digital mortgages.

In total, the firm has $1.5 billion in assets under management (AUM) across 12 funds that are active across Japan and Southeast Asia. In the latter, it has invested in over 300 companies and was an early backer of Indonesian start-ups, Traveloka and Tokopedia, which merged with GoJek, in 2021.

The firm sees particular opportunity in Indonesia and is among the most active in the market, even though Purwana admits that pace of activity has slowed due to market sentiment.

Money continues to flow into Southeast Asia, as evidenced by the accumulation of $10.4 billion in the region’s start-up ecosystem, in 2022. According to Cento Ventures’ recent Tech Investment report, last year marked the strongest performance of the market for three years on record. In spite of a global slowdown, it finished up on par with pre-pandemic investment levels.

“Southeast Asia will face or is already facing a correction, but the ramifications of this are not as profound as those being experienced by other emerging regions like Latin America and India,” Dmitry Levit, partner at Cento Ventures, told FA from Singapore.

“It remains to be seen whether this contraction is justified by the return to a pre-2022 baseline, or overdone, as a result of investor panic; but as a firm, we take the view that when valuations are low enough, we should invest in such a market.”

Financing the future

Levit and his VC peers remain focussed on digital financial services. It is the fintech sector that they view as key for Southeast Asia, having accounted for 46% of overall liquidity in 2022, according to the firm’s report. 

The Cento Ventures team has capitalised on this opportunity through recent investment in Indonesia’s Finfra, which provides embedded finance solutions; and Philippine cross-border payments start-up, Aqwire.

In May, Singapore-based fintech start-up, Jenfi, secured one of the highest fundraising milestones across the region to date, raising $6.6 million in a pre-series B round led by Japan-headquartered Headline Asia. The round also saw participation from existing investors, such as Monk’s Hill Ventures.

“The opportunity in Southeast Asia – especially across traditional working capital and SME loans – is huge. Banks tend to deprioritise this segment as it is riskier, so participation opens up to technology companies like Jenfi, to act as alternative lenders and to offer something that is differentiated but also commercially viable,” said Susli Lie, partner at Monk’s Hill Ventures. She is also the co-founder of ErudiFi, a tech-enabled education financing company.

Jenfi co-founder and CEO, Jeffrey Liu, attributes the firm’s recent successful fundraise to experience. With a background in finance, he founded GuavaPass in 2015, before setting up Jenfi in 2019, alongside Justin Louie. His endeavours in the start-up segment have seen him replicate the process every one to two years.

“I always thought it was a numbers game, but as I’ve built track-record, I’ve realised that it’s more important to focus on quality conversations and connections,” Liu said.

“From start to finish, Jenfi’s pre-Series B capital raise took six months. We had a shortlist of funds that we wanted to talk to from day one, and the fact that investors were already aware of us supported entry into real deal conversations,” he added.

To date, Liu’s firm has raised $40.2 million, which includes $15.2 million in equity, but he thinks it is unlikely that the Jenfi team will fundraise again, before 2024. While he shared that the firm had managed to shield from some of the market challenges during this recent round, unfortunately, this is not the case for the majority of other start-up peers.

Jenfi’s business enables digital native companies – including e-commerce or software-as-a-service (Saas) firms – to scale their ambitions by funding their growth and marketing expansion plans. So far, they have deployed $30 million across 600-plus companies.

“We’ve noticed in the last six months that the VC-backed companies we aim to support are in more challenging positions, in the sense that they have less of a cash runway. We’re hearing that it’s a lot harder for them to secure capital and that there are delays in their overall fundraising processes,” he explained.

Going for growth or pursuing profitability?

This perspective is shared by Lie, whose Southeast Asian VC firm has invested in early-stage technology companies since its foundation in 2014. Reports indicate that Monk’s Hill Ventures has raised at least $380 million across three funds and it has invested in over 40 fast-growing technology companies in Southeast Asia, including Singapore logistics company, NinjaVan; and Indonesian rural e-commerce start-up, Dagangan.

“In this market environment, we see that later-stage deals are taking longer to complete, which means that there is even more of an imperative to ensure as long a cash runway as possible,” she shared.

Before the current cycle, Lie saw deals close in as little as a couple of weeks to a month, but she cautions that this is not the norm. In this environment, she believes that start-ups need cash on balance sheet to support funding for at least 12-months of activity.

“Where our portfolio companies are concerned, the collapse of Silicon Valley Bank (SVB) made indirect impact by way of sentiment. The bank had always been a pioneer in terms of its product offerings and for its activity to be curtailed without anyone else stepping in to take on the whole business, this will alter the flow of capital throughout the entire ecosystem,” said Lie.

“There are fewer investors that are actively deploying compared to the past. For those that are, they want to take a bit more time to conduct due diligence and get to know prospective investments better. Fewer months of runway translates to weaker negotiation power,” she added.

A clear path to profitability is also imperative in this part of a cycle. With it, access to capital remains open; without it, Cento Ventures’ Levit believes that start-ups are exposed to very steep valuation discounts.

Southeast Asia’s top tech companies, Grab and GoTo, which listed in 2021 and 2022 respectively, have yet to show investors that they can stem the red ink. However, this factor is not unique to the region.

“This isn’t a Southeast Asia-specific problem; we see it happening globally, as well. For high-growth tech companies, the path to profitability is a long one,” said Niklas Amundsson, partner at the Hong Kong office of placement agent, Monument Group.

Levit’s perspective indicates that by going for growth, a start-up downplays its push for profitability. However, Purwana believes that both elements are of equal importance and can progress in tandem.

“Sometimes, people think that it’s a question of deciding on growth or profitability, but it shouldn’t be either-or. Ultimately, any company must work to ensure profitability –  whether one year, five years or 10 years into existence. They have to be able to turn a profit eventually,” he shared.

Curiosity and caution

As investors seek exposure to start-ups that can sustain growth momentum and pursue profitability, they are keeping an eye on developments in the generative artificial intelligence (AI) space.

KPMG’s 1Q23 Venture Pulse report highlighted investor interest in AI as being relatively robust in Asia. In particular, the sector drew attention during the first quarter of 2023 on the back of the global buzz generated by ChatGPT.

“AI start-ups that can demonstrate potential at industrial scale or in terms of commercial application and adoption – especially in the areas of advanced manufacturing, transportation, energy management, health tech and process optimisation and productivity – will attract investment dollars,” said Irene Chu, partner and head of the New Economy and Life Sciences division at the Hong Kong base of KPMG China.

She underlined that in light of the current tech talent shortage across Asia, the use of AI to improve productivity is more relevant and encouraged, than ever. But with curiosity, comes caution.

“We are excited about the prospect of generative AI as a transformative technology, but we are also cautious around its capabilities and potential negative ramifications,” said Purwana.

East Ventures has been active in the AI space since August last year, when it invested in the seed round of Bahasa.ai, which aspires to build a natural language processing and understanding engine for the Indonesian language. Since ChatGPT has come onto the scene, it has not completed any new investments in the generative AI space, but the segment is one that remains closely watched.

Levit views the space as the “next wave” – an area of tech that every company will need to consider moving forwards: “I have a feeling we will have to fight long and hard against the false dichotomy around AI-based versus non-AI-based businesses, similar to what we first saw with mobile phones; the offline to online transition; and B2B and B2C. The narrative will be stronger than substance in the short-term, but substance will be stronger than narrative in the long-run.”

To unlock its full potential, the region’s tech industry will need to find a new route to innovation, Purwana suggested.

While some view Southeast Asia as a pioneer in the tech space, he feels that “Southeast Asia will have to grow beyond being a ‘copycat market’ for tech, which is a significant gap to address”. 

However, he shared that it is reassuring to look at China.

“In the early days of its developing tech sector, China turned to the US for inspiration and duplication. But today, this is no longer the case, especially in fintech sector. In this arena, China is probably more advanced than the US,” Purwana added.

Perhaps one of the best illustrations of this point, is China’s success in leapfrogging the use of credit and debit cards to drive a digital payments revolution, via digital wallets and QR codes. Alibaba (through Alipay) and Tencent (through WeChat Pay) are two of the first-movers to gain status in one of the world’s largest and truly digital economies.

Hong Kong’s offer of the missing puzzle piece

The prospects for Southeast Asia’s start-up scene remain bullish. However, the money being deployed into VC funds largely comes from high-net-worth individuals (HNWIs) and family offices. Asia’s deepest pockets – the institutional investor community – have yet to dip their toes in the start-up scene in a meaningful way, Amundsson noted.

For him, the vital, missing component is: the exit. Many of the region’s top tech companies prefer a US versus domestic listing, as the region lacks an obvious, successful IPO route for up-and-coming technology companies. However, Amundsson does see some opportunity in Hong Kong, which he considers to be further ahead of its Southeast Asian peers in this regard, and continues to advance the development of an attractive and liquid capital market.

On March 31st, new listing rules for specialist technology companies came into play in the special administrative region (SAR). The Chapter 18C regime extends to start-ups active in new economy industries such as AI, alternative energy and agritech. While this is set to attract more listings from outside the China region, analysts expect this only to materialise in the next three to five years.

“I am excited about the new 18C regime launched in Hong Kong because it covers sectors that are going to be transformative, with the potential to solve some of the most challenging problems we face, around climate change, food security and clean energy.  Despite the slowdown in IPO activity globally, the new regime offers an attractive platform for those innovative Southeast Asian start-ups that aspire to solve these global issues,” Chu said.

However, while the market capitalisation threshold remains high, it might be some time before these companies list. It also remains to be seen whether Hong Kong’s bourse provides a  realistic and viable route for Southeast Asia’s start-up community.

As Asean focusses on finding its next epicentre of growth, the region’s technology sector offers perhaps the greatest opportunity for investors, as it continues to navigate short-term challenges like the collapse of SVB and works to address concerns around the development of next-generation AI.

Reviewing the region’s potential, Lie concluded, “Most of emerging Southeast Asia is moving away from manufacturing towards the service industries, and this is where we’re going to see the adoption of technology that really drives growt

¬ Haymarket Media Limited. All rights reserved.

Continue Reading

New-gen ransomware gangs have crypto in their sights

In May 2023, the Dallas City Government was hugely disrupted by a ransomware attack. Ransomware attacks are so-called because the hackers behind them encrypt vital data and demand a ransom in order to get the information decrypted.

The attack in Dallas put a halt to hearings, trials and jury duty, and the eventual closure of the Dallas Municipal Court Building. It also had an indirect effect on wider police activities, with stretched resources affecting the ability to deliver, for example, summer youth programmes. The criminals threatened to publish sensitive data, including personal information, court cases, prisoner identities and government documents.

One might imagine an attack on a city government and police force causing widespread and lengthy disruption would be headline news. But ransomware attacks are now so common and routine that most pass with barely a ripple of attention.

One notable exception happened in May and June 2023 when hackers exploited a vulnerability in the Moveit file transfer app which led to data theft from hundreds of organizations around the world. That attack grabbed headlines, perhaps because of the high-profile victims, reported to include British Airways, the BBC and the chemist chain Boots.

According to one recent survey, ransomware payments have nearly doubled to US$1.5 million over the past year, with the highest-earning organizations the most likely to pay attackers. Sophos, a British cybersecurity firm, found that the average ransomware payment rose from $812,000 the previous year. The average payment by UK organizations in 2023 was even higher than the global average, at $2.1 million.

Meanwhile, in 2022 The National Cyber Security Centre (NCSC) issued new guidance urging organizations to bolster their defenses amid fears of more state-sponsored cyber attacks linked to the conflict in Ukraine. It follows a series of cyber attacks in Ukraine which are suspected to have involved Russia, which Moscow denies.

In reality, not a week goes by without attacks affecting governments, schools, hospitals, businesses and charities, all over the world. These attacks have significant financial and societal costs. They can affect small businesses, as well as huge corporations, and can be particularly devastating for those involved.

Ransomware is now widely acknowledged as a major threat and challenge to modern society.

Yet ten years ago it was nothing more than a theoretical possibility and niche threat. The way in which it has quickly evolved, fuelling criminality and causing untold damage should be of major concern. The ransomware “business model” has become increasingly sophisticated with, for instance, advances in malware attack vectors, negotiation strategies and the structure of criminal enterprise itself.

There is every expectation that criminals will continue to adapt their strategies and cause widespread damage for many years to come. That’s why it is vital that we study the ransomware threat and preempt these tactics so as to mitigate the long-term threat – and that is exactly what our research team is doing.

Prediction of global ransomware damage costs – source: Cyber Security Ventures

A graph showing the damges related to ransomware
Alpesh Bhudia, CC BY-ND

For many years our research has looked to preempt this evolving threat by exploring new strategies that ransomware criminals can use to extort victims. The aim is to forewarn, and be ahead of the game, without identifying specifics that could be used by criminals.

In our latest research, which has been peer-reviewed and will be published as part of the International Conference on Availability, Reliability and Security (ARES), we have identified a novel threat that exploits vulnerabilities in cryptocurrencies.

What is ransomware?

Ransomware can mean subtly different things in different contexts. In 1996, Adam Young and Mordechai “Moti” Yung at Columbia University described the basic form of a ransomware attack as follows:

Criminals breach the cybersecurity defenses of the victim (either through tactics like phishing emails or using an insider/rogue employee). Once the criminals have breached the victim’s defences they deploy the ransomware.

The main function of which is to encrypt the victim’s files with a private key (which can be thought of as a long string of characters) to lock the victim out of their files. The third stage of an attack now begins with the criminal demanding a ransom for the private key.

The simple reality is that many victims pay the ransom, with ransoms potentially into the millions of dollars.

Using this basic characterisation of ransomware it is possible to distinguish different types of attack. At one extreme we there are the “low level” attacks where files are not encrypted or criminals do not attempt to extract ransoms. But at the other extreme attackers make considerable efforts to maximize disruption and extract a ransom.

The WannaCry ransomware attack in May 2017 is such an example. The attack, linked to the North Korean government, made no real attempt to extract ransoms from victims. Nevertheless, it led to widespread disruption across the world, including to the UK’s NHS, with some cybersecurity risk-modelling organizations even saying the global economic losses are going into the billions.

It is difficult to discern motive in this case, but, generally speaking, political intent, or simple error on the part of the attackers may contribute to the lack of coherent value-extraction through extortion.

Our research focuses on the second extreme of ransomware attacks in which criminals look to coerce money from their victims. This does not preclude a political motive. Indeed, there is evidence of links between major ransomware groups and the Russian state.

We can distinguish the degree to which ransomware attacks are motivated by financial gain by observing the effort invested in negotiation, a willingness to support or facilitate payment of the ransom, and the presence of money laundering services.

By investing in tools and services which facilitate payment of the ransom, and its conversion to fiat currency, the attackers signal their financial motives.

The impact of attacks

As the attack on the Dallas City Government shows, the financial and social impacts of ransomware attacks can be diverse and severe.

High-impact ransomware attacks, such as the one which targeted Colonial Oil in May 2021 and took a major US fuel pipeline offline, are obviously dangerous to the continuity of vital services.

In January 2023, there was a ransomware attack on the Royal Mail in the UK that led to the suspension of international deliveries. It took over a month for service levels to get back to normal. This attack would have had a significant direct impact on the Royal Mail’s revenue and reputation. But, perhaps more importantly, it impacted all the small businesses and people who rely on it.

In May 2021, the Irish NHS was hit by a ransomware attack. This affected every aspect of patient care with widespread cancellation of appointments. The Taoiseach Micheál Martin said: “It’s a shocking attack on a health service, but fundamentally on the patients and the Irish public.”

Sensitive data was also reportedly leaked. The financial impact of the attack could be as high as 100 million euros. This, however, does not account for the health and psychological impact on patients and medics affected by the disruption.

As well as health services, education has also been a prime target. For instance, in January 2023 a school in Guilford, UK, suffered an attack with the criminals threatening to publish sensitive data including safeguarding reports and information about vulnerable children.

Attacks are also timed to maximize disruption. For instance, an attack in June 2023 on a school in Dorchester, UK, left the school unable to use email or access services during the main exam period. This can have a profound impact on children’s well-being and educational achievement.

These examples are by no means exhaustive. Many attacks, for instance, directly target businesses and charities that are too small to attract attention. The impact on a small business, in terms of business disruption, lost reputation and the psychological cost of facing the consequences of an attack can be devastating.

As an example, a survey in 2021 found that 34% of UK businesses that suffered a ransomware attack subsequently closed down. And, many of the businesses that continued operation still had to lay off staff.

It began with floppy disks

The origins of ransomware are usually traced back to the AIDS or PC Cyborg Trojan virus in the 1980s. In this case, victims who inserted a floppy disk in their computer would find their files subsequently encrypted and a payment requested.

Disks were distributed to attendees and people interested in specific conferences, who would then attempt to access the disk to complete a survey – instead becoming infected with the trojan.

Files on affected computers were encrypted using a key stored locally on each target machine. A victim could, in principle, have restored access to their files by using this key. The victim, though, may not have known that they could do this, as even now, technical knowledge of cryptography is not common among most PC users.

Eventually, law enforcement traced the floppy disks to a Harvard-taught evolutionary biologist named Joseph Popp, who was conducting AIDS research at the time. He was arrested and charged with multiple counts of blackmail, and has been credited by some with being the inventor of ransomware.

No one knows exactly what provoked Popp to do what he did.

Early form of white computer text on red background
The on-screen message after the AIDS Trojan Horse ransomware was activated. Wikipedia

Many early versions of ransomware were quite basic cryptographic systems which suffered from various issues surrounding how easy it was to find the key information the criminal was trying to hide from the victim. This is one reason why ransomware really came of age with the CryptoLocker attack in 2013 and 2014.

CryptoLocker was the first technically sound ransomware attack virus to be distributed en masse. Thousands of victims saw their files encrypted by ransomware that could not be reverse-engineered. The private keys, used in encryption, were held by the attacker and victims could not restore access to their files without them.

Ransoms of around $300-600 were demanded and it is estimated the criminals got away with around $3 million. Cryptolocker was eventually shut down in 2014 following an operation involving multiple, international law enforcement agencies.

CryptoLocker was pivotal in showing proof of concept that criminals could earn large amounts of money from ransomware. Subsequently, there was an explosion of new variants and new types. There was also significant evolution in the strategies used by criminals.

Off-the-shelf and double extortion

One important development was the emergence of ransomware-as-a-service. This is a term for markets on the dark web through which criminals can obtain and use “off-the-shelf” ransomware without the need for advanced computing skills while the ransomware providers take a cut of the profits.

Research has shown how the dark web is the “unregulated Wild West of the internet” and a safe haven for criminals to communicate and exchange of illegal goods and services. It is easily accessible and with the help of anonymization technology and digital currencies, there is a global black economy thriving there. An estimated $1 billion was spent there during the first nine months of 2019 alone, according to the European Union Agency for Law Enforcement.

With ransomware as a service (Raas) the barrier to entry for aspiring cyber criminals, in terms of both cost and skill, was lowered.

Under the Raas model, expertise is provided by vendors who develop the malware while the attackers themselves may be relatively unskilled. This also has the effect of compartmentalizing risk – the arrest of cyber criminals using ransomware no longer threatens the entire supply chain, allowing attacks launched by other groups to continue.

We have also seen a movement away from mass phishing attacks, like CryptoLocker, which reached more than 250,000 systems, to more targeted attacks. That has meant an increasing focus on organizations with the revenue to pay large ransoms. Multinational organizations, legal firms, schools, universities, hospitals and healthcare providers have all become prime targets, as well as many small and micro businesses and charities.

A more recent development in ransomware, such as Netwalker, REvil/Sodinokibi, has been the threat of double extortion. This is where the criminals not only encrypt files but also exfiltrate data by copying the files. They then have the potential to leak or post potentially sensitive and important information.

An example of this occurred in 2020, when one of the largest software companies, Software AG, was hit with a double extortion ransomware called Clop. It was reported that the attackers had requested an exceptionally high ransom payment of $20 million, which Software AG refused to pay.

This led to attackers releasing confidential company data on the dark web. This provides criminals with two sources of leverage: they can ransom for the private key to decrypt files and they can ransom to stop publication of sensitive data.

Double extortion changes the business model of ransomware in interesting ways. In particular, with standard ransomware, there is a relatively straightforward incentive for a victim to pay a ransom for access to the private key if that would allow decryption of the files, and they cannot access the files through any other means.

The victim “only” needs to trust the cybercriminal will give them the key and that the key will work.

‘Honor’ among thieves?

But with data exfiltration, by contrast, it is not obvious what the victim gets in return for paying the ransom. The criminals still have the sensitive data and could still publish it any time they want. They could, indeed, ask for subsequent ransoms to not publish the files.

Therefore, for data exfiltration to be a viable business strategy the criminals need to build a credible reputation of “honoring” ransom payments. This has arguably led to a normalized ransomware ecosystem.

For instance, ransom negotiators are private contractors and in some cases are required as part of a cyber insurance agreement to provide expertise in the managing of crisis situations involving ransomware. Where instructed, they will facilitate negotiated ransom payments. Within this ecosystem, some ransomware criminal gangs have developed a reputation for not publishing data (or at least delaying publication) if a ransom is paid.

More generally, the encryption, decryption or exfiltration of files is typically a difficult and costly task for criminals to pull off. It is far simpler to delete the files and then claim they have been encrypted or exfiltrated and demand a ransom.

However, if the victims suspect that they won’t be getting the decryption key or encrypted data back then they won’t pay the ransom.

And those that do pay a ransom and get nothing in return may disclose that fact. This is likely to impact the attacker’s “reputation” and the likelihood of future ransom payments. Simply put, it pays to play “fair” in the world of extortion and ransom attacks.

So in less than ten years we have seen the ransomware threat evolve enormously from the relatively low-scale CryptoLocker, to a multi-million dollar business involving organized criminal gangs and sophisticated strategies.

From 2020 onwards the incidents of ransomware, and consequent losses, have seemingly increased by another order of magnitude. Ransomware has become too big to ignore and is now a major concern for governments and law enforcement.

Crypto extortion threats

Devastating though ransomware has become, the threat will inevitably evolve further, as criminals develop new techniques for extortion. As mentioned already, a key theme in our collective research over the last ten years has been to try and preempt the likely strategies that criminals can employ so as to be ahead of the game.

Our research is now focused on the next generation of ransomware, which we believe will include variants focused on cryptocurrency, and the “consensus mechanisms” used within them.

A consensus mechanism is any method (usually algorithmic) used to achieve agreement, trust and security across a decentralized computer network.

Financial business concept, bitcoin, etheruem, litecoin
The next target could by crypto. Photo: Shutterstock via The Conversation / sundaemorning

Specifically, cryptocurrencies are increasingly using a so-called “proof-of-stake” consensus mechanism, in which investors stake significant sums of currency to validate crypto transactions. These stakes are vulnerable to extortion by ransomware criminals.

Cryptocurrencies rely on a decentralized blockchain that provides a transparent record of all the transactions that have taken place using that currency. The blockchain is maintained by a peer-to-peer network rather than a central authority (as with conventional currency).

In principle, the transaction records included in the blockchain are immutable, verifiable and securely distributed across the network, giving users full ownership and visibility into the transaction data.

These properties of blockchain rely on a secure and non-manipulable “consensus mechanism” in which the independent nodes in the network “approve” or “agree” which transactions to add to the blockchain.

Until now, cryptocurrencies like Bitcoin have relied on a so-called “proof-of-work” consensus mechanism in which the authorization of transactions involves the solving of complex mathematical problems (the work). In the long term, this approach is unsustainable because it results in duplication of effort and avoidable large-scale energy use.

The alternative, which is now becoming a reality, is a “proof-of-stake” consensus mechanism. Here, transactions are approved by validators who have staked money and are financially rewarded for validating transactions. The role of inefficient work is replaced by a financial stake. While this addresses the energy problem, it means that large amounts of staked money becomes involved in validating crypto transactions.

Ethereum

The existence of this staked money provides a novel threat to some proof-of-stake cryptocurrencies. We have focussed our attention on Ethereum, a decentralized cryptocurrency that establishes a peer-to-peer network to securely execute and verify application code, known as a smart contract.

Ethereum is powered by the Ether (ETH) token that allows users to transact with each other through the use of these smart contracts. The Ethereum project was co-founded by Vitalik Buterin in 2013 to overcome shortcomings with Bitcoin. On September 15, 2022, The Merge, moved the Ethereum network from proof-of-work to proof-of-stake, making it one of the first prominent proof-of-stake cryptocurrencies.

The proof-of-stake consensus mechanism in Ethereum relies on “validators” to approve transactions. To set up a validator there needs to be a minimum stake of 32ETH, which is currently around $60,000. Validators can then earn a financial return on their stake from operating a validator in accordance with Ethereum rules. At the time of writing there are around 850,000 validators.

A lot of hope is being pinned on the “stake” solution of validation – but hackers are sure to be looking into how they can infiltrate the system.

In our project, which was funded by the Ethereum Foundation, we identified ways in which ransomware groups could exploit the new proof-of-stake mechanism for extortion.

Slashing

We found that attackers could exploit validators through a process called “slashing”. While validators receive rewards for obeying the rules, there are financial penalties for validators that are seen to act maliciously. The basic objective of penalties is to prevent exploitation of the decentralized blockchain.

There are two forms of penalties, the most severe of which is slashing. Slashing occurs for actions that should not happen by accident and could jeopardize the blockchain, such as proposing conflicting blocks are added to the blockchain, or trying to change history.

Slashing penalties are relatively severe with the validator losing a significant share of their stake, at least 1ETH. Indeed, in the most extreme case the validator could lose all of their stake (32ETH). The validator will also be forced to exit and no longer act as a validator. In short, if a validator is slashed there are big financial consequences.

To perform actions, validators are assigned unique signing keys, that, in essence, prove who they are to the network. Suppose that a criminal got hold of the signing key? Then, they could blackmail the victim into paying a ransom.

Flow diagram showing just how complicated it gets when there is an extortion attack against proof-of-stake validators, such as Ethereum

Flow chart showing what happens when ransomware attacks infiltrate crypto.
Alpesh Bhudia, CC BY-ND

A ‘smart contract’

The victim may be reluctant to pay the ransom unless there is a guarantee that the criminals will not take their money and fail to return/release the key. After all, what is to stop the criminals asking for another ransom?

One solution we have found – which harks back to the fact that ransomware has in fact become a kind of business operated by criminals who want proof they have an “honest” reputation – is a smart contract.

This automated contract can be written so that the process only works if both sides “honor” their side of the bargain. So, the victim could pay the ransom and be confident that this will resolve the direct extortion threat. This is possible through Ethereum because all the steps required are publicly observable on the blockchain – the deposit, the sign to exit, the absence of slashing and the return of the stake.

Functionally, these smart contracts are an escrow system in which money may be held until pre-agreed conditions are met. For instance, if the criminals force slashing before the validator has fully exited, then the contract will ensure that the ransom amount is returned to the victim.

Such contracts are, however, open to abuse, and there’s no guarantee that an attacker-authored contract can be trusted. There is potential for the contract to be automated in a fully trusted way, but we have yet to observe such behavior and systems emerge.

The staking pools threat

This type of “pay and exit” strategy is an effective way for criminals to extort victims if they can obtain the validator signing keys.

So how much damage would a ransomware attack like this do to Ethereum? If a single validator is compromised then the slashing penalty – and so maximum ransom demand – would be in the region of 1ETH, which is around $1,800. To leverage larger amounts of money the criminals, therefore, need to target organizations or staking pools that are responsible for managing large numbers of validators.

Remember, that given the high entry costs for individual investors, most of the validating on Ethereum will be run under “staking pools” in which multiple investors can collectively stake money.

To put this in perspective, Lido is the largest staking pool in Ethereum with around 127,000 validators and 18% of the total stake; Coinbase is the second largest with 40,000 validators and 6% of the total stake. In total, there are 21 staking pools operating more than a 1,000 validators. Any one of these staking pools is responsible for tens of millions of dollars of stake and so viable ransom demands could also be in the millions of dollars.

Proof-of-stake consensus mechanisms are too young for us to know whether extortion of staking pools will become an active reality. But the general lesson of ransomware’s evolution is that the criminals tend to gravitate towards strategies that incentivize payment and increase their illicit gains.

The most straightforward way that investors and staking pool operators can mitigate the extortion threat we have identified is by protecting their signing keys. If the criminals cannot access the signing keys then there is no threat. If the criminals can only access some of the keys (for operators with multiple validators) then the threat may fail to be lucrative.

So staking pools need to take measures to secure signing keys. This would involve a range of actions including: partitioning validators so that a breach only impacts a small subset; step up cyber security to prevent intrusion, and robust internal processes to limit the insider threat of an employee divulging signing keys.

Concept using blocks with locks and keys printed on them to show encryption keys being compromised.
What happens when hackers gain access to secret keys? Photo: Shutterstock via The Conversation / Andrii Yalanskyi

The staking pool market for cryptocurrencies like Ethereum is competitive. There are many staking pools, all offering relatively similar services, and competing on price to attract investors. These competitive forces, and the need to cut costs, may lead to relatively lax security measures. Some staking pools may, therefore, prove a relatively easy target for criminals.

Ultimately, this can only be solved with regulation, greater awareness and for investors in staking pools to demand high levels of security to protect their stake.

Unfortunately, the history of ransomware suggests that high-profile attacks will need to be seen before the threat is taken seriously enough. It is interesting to contemplate the consequences of a significant breach of a staking pool.

The reputation of the staking pool would presumably be badly affected and so the staking pool’s viability in a competitive market is questionable. An attack may also have implications for the reputation of the currency.

At the most serious, it could lead to a currency collapsing. When that happens – as it did with FTX in 2022 following another hacking attack, there are knock-on effects to the global economy.

Here to stay

Ransomware will be a challenge for years, if not decades, to come.

One potential vision of the future is that ransomware just becomes part of normal economic life with organizations facing the constant threat of attack, with few consequences for the largely anonymous gangs of cyber criminals behind the scams.

To preempt such negative consequences we need greater awareness of the threat. Then investors can make more informed decisions over which staking pools and currencies to invest in. It also makes sense to have a market with many staking pools, rather than a market dominated by just a few large ones, as this could insulate the currency from possible attacks.

Beyond crypto, preemption involves investment in cyber security across a range of forms – from staff training and an organizational culture that supports reporting of incidents. It also involves investment in recovery options, such as effective back-ups, in-house expertise, insurance and tried and tested contingency plans.

Unfortunately, cyber security practices are not improving as one might hope in many organizations and this is leaving the door open for cyber criminals. Essentially, everyone needs to get better at hiding, and protecting, their digital keys and sensitive information if we are to stand a chance against the next generation of ransomware attackers.

Alpesh Bhudia is Doctoral Researcher in Cyber Security, Royal Holloway University of London; Anna Cartwright is Principal Lecturer in Accounting, Finance and Economics, Oxford Brookes University; Darren Hurley-Smith is Senior Lecturer in Information Security, Royal Holloway University of London, and Edward Cartwright is Professor of Economics, De Montfort University

This article is republished from The Conversation under a Creative Commons license. Read the original article.

Continue Reading

Toyota halts all Japan assembly plants due to glitch

Toyota worker at assembly plant in Japan.Toyota

Japanese car making giant Toyota has suspended operations at all of its assembly plants in its home country due to a glitch in its production system.

The move is likely to bring domestic output of the world’s biggest car maker by sales to a standstill.

The malfunction has meant the firm has not been able to order components.

A spokesperson told the BBC that the firm is trying to find the cause of the problem but does not currently believe it is due to a cyber attack.

On Tuesday morning, Toyota suspended operations at 12 of its 14 assembly plants in Japan.

Later in the day a spokesperson said production at all 14 facilities would be suspended.

The company has not yet said when it plans to restart the operations or how much production is expected to be lost due to the stoppage.

In total, the 14 plants are estimated to account for around a third of Toyota’s global production.

The suspension comes as Toyota’s production in Japan had been recovering after a series of issues.

Its operations were hit last year after one of its suppliers was affected by a cyber attack.

The one-day disruption caused an output loss of around 13,000 cars.

Also last year, Toyota suspended operations at some of its production lines in Japan due to the coronavirus lockdown in China’s economic hub Shanghai.

“Due to the impact of the semiconductor shortage, we announced our revised production plan for May,” Toyota said at the time.

Toyota is a pioneer of the so-called “just-in-time” production system, which keeps costs down but can be vulnerable to problems if deliveries of components are disrupted.

Related Topics

Continue Reading

Chevron: Workers at major Australia gas facilities to strike

A Chevron Wheatstone LNG cargo ship departs Western Australia for Japan.Chevron

Workers at two large liquefied natural gas (LNG) plants in Australia, operated by US energy giant Chevron, are set to go on strike from 7 September, in a move that could drive up global prices.

This follows weeks of negotiations with unions over pay and working conditions.

Chevron told the BBC it would “continue to take steps to maintain safe and reliable operations in the event of disruption at our facilities”.

The Wheatstone and Gorgon sites produce more than 5% of the world’s LNG.

Fears of strikes recently pushed up wholesale gas prices in Europe.

Around 500 workers are currently employed at the two Chevron facilities in Western Australia.

“While we don’t believe that industrial action is necessary for agreement to be reached, we recognise employees have the right to take protected industrial action,” Chevron said in a statement on Tuesday.

It added that it would “continue to work through the bargaining process as we seek outcomes that are in the interests of both employees and the company.”

The Offshore Alliance – which is a partnership of two unions representing energy workers, including those at Chevron – said it had been trying to reach an agreement with the company on “several key” issues including pay, job security, rosters and training standards.

It added that workers had been “consistently disappointed with the company’s approach to negotiations with the union and Chevron not accepting that an industry standard agreement should apply to the work they perform for the company”.

“We may see work stoppages for short periods of the day, and bans on specific work like helicopter unloadings. These actions create inefficiencies and could lead to minor production disruptions,” energy analyst Saul Kavonic said.

Mr Kavonic currently expects the strike to have a limited impact on global gas prices. However, he warned that energy prices could surge if the industrial action was stepped up.

“In the very unlikely event of a prolonged large scale supply disruption, prices could head back towards crisis levels witnessed last year [after Russia’s invasion of Ukraine],” he added.

In the last week, wholesale gas prices in Europe jumped on concerns of a disruption to supply at Chevron and another Australian LNG plant, run by Woodside Energy.

On Thursday, Woodside said it had reached an agreement in principle with unions representing workers at its North West Shelf plant.

Together, the Woodside and Chevron plants make up around 10% of the world’s supply of LNG.

Map

Russia slashed supplies of natural gas to Europe after the start of the Ukraine war in 2022.

That pushed up prices around the world and led countries to seek out alternative sources of energy, such as LNG.

Australia is one of the world’s biggest LNG exporters and its supplies have helped to cool global energy prices.

LNG is methane, or methane mixed with ethane, cleansed of impurities and cooled to approximately -160C.

This turns the gas into a liquid and it can then be shipped in pressurised tankers.

At its destination, LNG is turned back into gas and used, like any other natural gas, for heating, cooking and power.

Continue Reading