Ng Kok Song taking extra security precautions after disruption at campaign walkabout

“DIFFERENCES OF OPINION”

Mr Ng was also asked for his response to another rival candidate Tharman Shanmugaratnam who said on Tuesday evening that the former had misquoted him and made “sweeping statements”.

The to-and-fro, centred on the issue of candidate independence, stemmed from comments that Mr Tharman had made during the presidential forum broadcast by CNA on Monday night.

The three candidates were asked how they could convince voters that they would exercise their powers without fear or favour.

Mr Tharman responded that labelling candidates by their political affiliation would be “extremely simplistic” as that would have ruled out many past presidential candidates, such as former presidents Mr Ong Teng Cheong and Dr Tony Tan.

It would also rule out people who may not be members of a political party but who are senior civil servants who “owe their positions to bosses who are political figures”.

“Are they obligated to their bosses because of that? Not necessarily – it depends on the individual,” Mr Tharman said at the forum.

“Let’s say you have a private company, you have a construction company that depends on government contracts. Or you have a fund management company that depends on government monies. Does that make you not independent? Not necessarily. It depends on your character, your track record,” he continued.

Mr Ng responded with a statement on Tuesday, noting that Mr Tharman’s remark about the fund management company “clearly” referred to him. The 75-year-old, who retired from GIC in 2013 following a 45-year-long career in public service, is now the executive chairman of Avanda Investment Management, an asset management company he co-founded in 2015.

Mr Ng also said that by comparing those with past political affiliations to anyone who is dependent on the government in some way, Mr Tharman was “taking the point too far”.

In response, Mr Tharman said later on Tuesday that he had been misquoted.

When asked by reporters on Wednesday morning, Mr Ng said: “I already said what I said yesterday so I do not want to reopen the subject.”

He added that he has “deep respect” for Mr Tharman, who is a “good” friend with whom he had worked with at the Monetary Authority of Singapore and GIC.

“Our differences are differences of opinion, such as when we speak about the presidency. I was concerned about the system, not the individual,” he said.

“I just wanted our system to be a better system … in terms of having a non-partisan President.”

Another difference lies in political affiliation. “We are different – the difference being the fact that he has belonged to a political party and I did not,” said Mr Ng.

Continue Reading

Setting sights on Southeast Asia | FinanceAsia

Global investors have always been drawn to Southeast Asia’s growth story, as one of the world’s fastest developing economies and home to a relatively youthful population of 600 million.

This year’s Asean Summit chair, Indonesia, pitched that the region would continue its role as an epicentre for expansion. Even amid the backdrop of a challenging external environment – from the Russia-Ukraine war, to rising inflation and interest rate escalation – there is still substance behind the Southeast Asian story.

East Ventures, a venture capital (VC) firm based in the region, raised a total of $835 million in the past year across various strategies, achieving in May the first and final close of its debut Growth Plus fund, at $250 million. The vehicle aims to support innovators within the company’s ecosystem of portfolio companies that demonstrate strong potential.

“The successful fundraise shows that with the right strategy, management team and mandate, capital is still available,” Roderick Purwana, managing partner at East Ventures, told FinanceAsia.

The East Ventures team is experiencing promising traction across its portfolio – 60% of its growth-stage start-ups have delivered a positive earnings before interest, taxes, depreciation and amortisation (Ebitda) or are in the process of doing so; and more than 40% have a secured a cash runway beyond 2025. At the end of May, the company had invested in more than 20 start-ups so far this year, across sectors ranging from waste management and mental health, to digital mortgages.

In total, the firm has $1.5 billion in assets under management (AUM) across 12 funds that are active across Japan and Southeast Asia. In the latter, it has invested in over 300 companies and was an early backer of Indonesian start-ups, Traveloka and Tokopedia, which merged with GoJek, in 2021.

The firm sees particular opportunity in Indonesia and is among the most active in the market, even though Purwana admits that pace of activity has slowed due to market sentiment.

Money continues to flow into Southeast Asia, as evidenced by the accumulation of $10.4 billion in the region’s start-up ecosystem, in 2022. According to Cento Ventures’ recent Tech Investment report, last year marked the strongest performance of the market for three years on record. In spite of a global slowdown, it finished up on par with pre-pandemic investment levels.

“Southeast Asia will face or is already facing a correction, but the ramifications of this are not as profound as those being experienced by other emerging regions like Latin America and India,” Dmitry Levit, partner at Cento Ventures, told FA from Singapore.

“It remains to be seen whether this contraction is justified by the return to a pre-2022 baseline, or overdone, as a result of investor panic; but as a firm, we take the view that when valuations are low enough, we should invest in such a market.”

Financing the future

Levit and his VC peers remain focussed on digital financial services. It is the fintech sector that they view as key for Southeast Asia, having accounted for 46% of overall liquidity in 2022, according to the firm’s report. 

The Cento Ventures team has capitalised on this opportunity through recent investment in Indonesia’s Finfra, which provides embedded finance solutions; and Philippine cross-border payments start-up, Aqwire.

In May, Singapore-based fintech start-up, Jenfi, secured one of the highest fundraising milestones across the region to date, raising $6.6 million in a pre-series B round led by Japan-headquartered Headline Asia. The round also saw participation from existing investors, such as Monk’s Hill Ventures.

“The opportunity in Southeast Asia – especially across traditional working capital and SME loans – is huge. Banks tend to deprioritise this segment as it is riskier, so participation opens up to technology companies like Jenfi, to act as alternative lenders and to offer something that is differentiated but also commercially viable,” said Susli Lie, partner at Monk’s Hill Ventures. She is also the co-founder of ErudiFi, a tech-enabled education financing company.

Jenfi co-founder and CEO, Jeffrey Liu, attributes the firm’s recent successful fundraise to experience. With a background in finance, he founded GuavaPass in 2015, before setting up Jenfi in 2019, alongside Justin Louie. His endeavours in the start-up segment have seen him replicate the process every one to two years.

“I always thought it was a numbers game, but as I’ve built track-record, I’ve realised that it’s more important to focus on quality conversations and connections,” Liu said.

“From start to finish, Jenfi’s pre-Series B capital raise took six months. We had a shortlist of funds that we wanted to talk to from day one, and the fact that investors were already aware of us supported entry into real deal conversations,” he added.

To date, Liu’s firm has raised $40.2 million, which includes $15.2 million in equity, but he thinks it is unlikely that the Jenfi team will fundraise again, before 2024. While he shared that the firm had managed to shield from some of the market challenges during this recent round, unfortunately, this is not the case for the majority of other start-up peers.

Jenfi’s business enables digital native companies – including e-commerce or software-as-a-service (Saas) firms – to scale their ambitions by funding their growth and marketing expansion plans. So far, they have deployed $30 million across 600-plus companies.

“We’ve noticed in the last six months that the VC-backed companies we aim to support are in more challenging positions, in the sense that they have less of a cash runway. We’re hearing that it’s a lot harder for them to secure capital and that there are delays in their overall fundraising processes,” he explained.

Going for growth or pursuing profitability?

This perspective is shared by Lie, whose Southeast Asian VC firm has invested in early-stage technology companies since its foundation in 2014. Reports indicate that Monk’s Hill Ventures has raised at least $380 million across three funds and it has invested in over 40 fast-growing technology companies in Southeast Asia, including Singapore logistics company, NinjaVan; and Indonesian rural e-commerce start-up, Dagangan.

“In this market environment, we see that later-stage deals are taking longer to complete, which means that there is even more of an imperative to ensure as long a cash runway as possible,” she shared.

Before the current cycle, Lie saw deals close in as little as a couple of weeks to a month, but she cautions that this is not the norm. In this environment, she believes that start-ups need cash on balance sheet to support funding for at least 12-months of activity.

“Where our portfolio companies are concerned, the collapse of Silicon Valley Bank (SVB) made indirect impact by way of sentiment. The bank had always been a pioneer in terms of its product offerings and for its activity to be curtailed without anyone else stepping in to take on the whole business, this will alter the flow of capital throughout the entire ecosystem,” said Lie.

“There are fewer investors that are actively deploying compared to the past. For those that are, they want to take a bit more time to conduct due diligence and get to know prospective investments better. Fewer months of runway translates to weaker negotiation power,” she added.

A clear path to profitability is also imperative in this part of a cycle. With it, access to capital remains open; without it, Cento Ventures’ Levit believes that start-ups are exposed to very steep valuation discounts.

Southeast Asia’s top tech companies, Grab and GoTo, which listed in 2021 and 2022 respectively, have yet to show investors that they can stem the red ink. However, this factor is not unique to the region.

“This isn’t a Southeast Asia-specific problem; we see it happening globally, as well. For high-growth tech companies, the path to profitability is a long one,” said Niklas Amundsson, partner at the Hong Kong office of placement agent, Monument Group.

Levit’s perspective indicates that by going for growth, a start-up downplays its push for profitability. However, Purwana believes that both elements are of equal importance and can progress in tandem.

“Sometimes, people think that it’s a question of deciding on growth or profitability, but it shouldn’t be either-or. Ultimately, any company must work to ensure profitability –  whether one year, five years or 10 years into existence. They have to be able to turn a profit eventually,” he shared.

Curiosity and caution

As investors seek exposure to start-ups that can sustain growth momentum and pursue profitability, they are keeping an eye on developments in the generative artificial intelligence (AI) space.

KPMG’s 1Q23 Venture Pulse report highlighted investor interest in AI as being relatively robust in Asia. In particular, the sector drew attention during the first quarter of 2023 on the back of the global buzz generated by ChatGPT.

“AI start-ups that can demonstrate potential at industrial scale or in terms of commercial application and adoption – especially in the areas of advanced manufacturing, transportation, energy management, health tech and process optimisation and productivity – will attract investment dollars,” said Irene Chu, partner and head of the New Economy and Life Sciences division at the Hong Kong base of KPMG China.

She underlined that in light of the current tech talent shortage across Asia, the use of AI to improve productivity is more relevant and encouraged, than ever. But with curiosity, comes caution.

“We are excited about the prospect of generative AI as a transformative technology, but we are also cautious around its capabilities and potential negative ramifications,” said Purwana.

East Ventures has been active in the AI space since August last year, when it invested in the seed round of Bahasa.ai, which aspires to build a natural language processing and understanding engine for the Indonesian language. Since ChatGPT has come onto the scene, it has not completed any new investments in the generative AI space, but the segment is one that remains closely watched.

Levit views the space as the “next wave” – an area of tech that every company will need to consider moving forwards: “I have a feeling we will have to fight long and hard against the false dichotomy around AI-based versus non-AI-based businesses, similar to what we first saw with mobile phones; the offline to online transition; and B2B and B2C. The narrative will be stronger than substance in the short-term, but substance will be stronger than narrative in the long-run.”

To unlock its full potential, the region’s tech industry will need to find a new route to innovation, Purwana suggested.

While some view Southeast Asia as a pioneer in the tech space, he feels that “Southeast Asia will have to grow beyond being a ‘copycat market’ for tech, which is a significant gap to address”. 

However, he shared that it is reassuring to look at China.

“In the early days of its developing tech sector, China turned to the US for inspiration and duplication. But today, this is no longer the case, especially in fintech sector. In this arena, China is probably more advanced than the US,” Purwana added.

Perhaps one of the best illustrations of this point, is China’s success in leapfrogging the use of credit and debit cards to drive a digital payments revolution, via digital wallets and QR codes. Alibaba (through Alipay) and Tencent (through WeChat Pay) are two of the first-movers to gain status in one of the world’s largest and truly digital economies.

Hong Kong’s offer of the missing puzzle piece

The prospects for Southeast Asia’s start-up scene remain bullish. However, the money being deployed into VC funds largely comes from high-net-worth individuals (HNWIs) and family offices. Asia’s deepest pockets – the institutional investor community – have yet to dip their toes in the start-up scene in a meaningful way, Amundsson noted.

For him, the vital, missing component is: the exit. Many of the region’s top tech companies prefer a US versus domestic listing, as the region lacks an obvious, successful IPO route for up-and-coming technology companies. However, Amundsson does see some opportunity in Hong Kong, which he considers to be further ahead of its Southeast Asian peers in this regard, and continues to advance the development of an attractive and liquid capital market.

On March 31st, new listing rules for specialist technology companies came into play in the special administrative region (SAR). The Chapter 18C regime extends to start-ups active in new economy industries such as AI, alternative energy and agritech. While this is set to attract more listings from outside the China region, analysts expect this only to materialise in the next three to five years.

“I am excited about the new 18C regime launched in Hong Kong because it covers sectors that are going to be transformative, with the potential to solve some of the most challenging problems we face, around climate change, food security and clean energy.  Despite the slowdown in IPO activity globally, the new regime offers an attractive platform for those innovative Southeast Asian start-ups that aspire to solve these global issues,” Chu said.

However, while the market capitalisation threshold remains high, it might be some time before these companies list. It also remains to be seen whether Hong Kong’s bourse provides a  realistic and viable route for Southeast Asia’s start-up community.

As Asean focusses on finding its next epicentre of growth, the region’s technology sector offers perhaps the greatest opportunity for investors, as it continues to navigate short-term challenges like the collapse of SVB and works to address concerns around the development of next-generation AI.

Reviewing the region’s potential, Lie concluded, “Most of emerging Southeast Asia is moving away from manufacturing towards the service industries, and this is where we’re going to see the adoption of technology that really drives growt

¬ Haymarket Media Limited. All rights reserved.

Continue Reading

New-gen ransomware gangs have crypto in their sights

In May 2023, the Dallas City Government was hugely disrupted by a ransomware attack. Ransomware attacks are so-called because the hackers behind them encrypt vital data and demand a ransom in order to get the information decrypted.

The attack in Dallas put a halt to hearings, trials and jury duty, and the eventual closure of the Dallas Municipal Court Building. It also had an indirect effect on wider police activities, with stretched resources affecting the ability to deliver, for example, summer youth programmes. The criminals threatened to publish sensitive data, including personal information, court cases, prisoner identities and government documents.

One might imagine an attack on a city government and police force causing widespread and lengthy disruption would be headline news. But ransomware attacks are now so common and routine that most pass with barely a ripple of attention.

One notable exception happened in May and June 2023 when hackers exploited a vulnerability in the Moveit file transfer app which led to data theft from hundreds of organizations around the world. That attack grabbed headlines, perhaps because of the high-profile victims, reported to include British Airways, the BBC and the chemist chain Boots.

According to one recent survey, ransomware payments have nearly doubled to US$1.5 million over the past year, with the highest-earning organizations the most likely to pay attackers. Sophos, a British cybersecurity firm, found that the average ransomware payment rose from $812,000 the previous year. The average payment by UK organizations in 2023 was even higher than the global average, at $2.1 million.

Meanwhile, in 2022 The National Cyber Security Centre (NCSC) issued new guidance urging organizations to bolster their defenses amid fears of more state-sponsored cyber attacks linked to the conflict in Ukraine. It follows a series of cyber attacks in Ukraine which are suspected to have involved Russia, which Moscow denies.

In reality, not a week goes by without attacks affecting governments, schools, hospitals, businesses and charities, all over the world. These attacks have significant financial and societal costs. They can affect small businesses, as well as huge corporations, and can be particularly devastating for those involved.

Ransomware is now widely acknowledged as a major threat and challenge to modern society.

Yet ten years ago it was nothing more than a theoretical possibility and niche threat. The way in which it has quickly evolved, fuelling criminality and causing untold damage should be of major concern. The ransomware “business model” has become increasingly sophisticated with, for instance, advances in malware attack vectors, negotiation strategies and the structure of criminal enterprise itself.

There is every expectation that criminals will continue to adapt their strategies and cause widespread damage for many years to come. That’s why it is vital that we study the ransomware threat and preempt these tactics so as to mitigate the long-term threat – and that is exactly what our research team is doing.

Prediction of global ransomware damage costs – source: Cyber Security Ventures

A graph showing the damges related to ransomware
Alpesh Bhudia, CC BY-ND

For many years our research has looked to preempt this evolving threat by exploring new strategies that ransomware criminals can use to extort victims. The aim is to forewarn, and be ahead of the game, without identifying specifics that could be used by criminals.

In our latest research, which has been peer-reviewed and will be published as part of the International Conference on Availability, Reliability and Security (ARES), we have identified a novel threat that exploits vulnerabilities in cryptocurrencies.

What is ransomware?

Ransomware can mean subtly different things in different contexts. In 1996, Adam Young and Mordechai “Moti” Yung at Columbia University described the basic form of a ransomware attack as follows:

Criminals breach the cybersecurity defenses of the victim (either through tactics like phishing emails or using an insider/rogue employee). Once the criminals have breached the victim’s defences they deploy the ransomware.

The main function of which is to encrypt the victim’s files with a private key (which can be thought of as a long string of characters) to lock the victim out of their files. The third stage of an attack now begins with the criminal demanding a ransom for the private key.

The simple reality is that many victims pay the ransom, with ransoms potentially into the millions of dollars.

Using this basic characterisation of ransomware it is possible to distinguish different types of attack. At one extreme we there are the “low level” attacks where files are not encrypted or criminals do not attempt to extract ransoms. But at the other extreme attackers make considerable efforts to maximize disruption and extract a ransom.

The WannaCry ransomware attack in May 2017 is such an example. The attack, linked to the North Korean government, made no real attempt to extract ransoms from victims. Nevertheless, it led to widespread disruption across the world, including to the UK’s NHS, with some cybersecurity risk-modelling organizations even saying the global economic losses are going into the billions.

It is difficult to discern motive in this case, but, generally speaking, political intent, or simple error on the part of the attackers may contribute to the lack of coherent value-extraction through extortion.

Our research focuses on the second extreme of ransomware attacks in which criminals look to coerce money from their victims. This does not preclude a political motive. Indeed, there is evidence of links between major ransomware groups and the Russian state.

We can distinguish the degree to which ransomware attacks are motivated by financial gain by observing the effort invested in negotiation, a willingness to support or facilitate payment of the ransom, and the presence of money laundering services.

By investing in tools and services which facilitate payment of the ransom, and its conversion to fiat currency, the attackers signal their financial motives.

The impact of attacks

As the attack on the Dallas City Government shows, the financial and social impacts of ransomware attacks can be diverse and severe.

High-impact ransomware attacks, such as the one which targeted Colonial Oil in May 2021 and took a major US fuel pipeline offline, are obviously dangerous to the continuity of vital services.

In January 2023, there was a ransomware attack on the Royal Mail in the UK that led to the suspension of international deliveries. It took over a month for service levels to get back to normal. This attack would have had a significant direct impact on the Royal Mail’s revenue and reputation. But, perhaps more importantly, it impacted all the small businesses and people who rely on it.

In May 2021, the Irish NHS was hit by a ransomware attack. This affected every aspect of patient care with widespread cancellation of appointments. The Taoiseach Micheál Martin said: “It’s a shocking attack on a health service, but fundamentally on the patients and the Irish public.”

Sensitive data was also reportedly leaked. The financial impact of the attack could be as high as 100 million euros. This, however, does not account for the health and psychological impact on patients and medics affected by the disruption.

As well as health services, education has also been a prime target. For instance, in January 2023 a school in Guilford, UK, suffered an attack with the criminals threatening to publish sensitive data including safeguarding reports and information about vulnerable children.

Attacks are also timed to maximize disruption. For instance, an attack in June 2023 on a school in Dorchester, UK, left the school unable to use email or access services during the main exam period. This can have a profound impact on children’s well-being and educational achievement.

These examples are by no means exhaustive. Many attacks, for instance, directly target businesses and charities that are too small to attract attention. The impact on a small business, in terms of business disruption, lost reputation and the psychological cost of facing the consequences of an attack can be devastating.

As an example, a survey in 2021 found that 34% of UK businesses that suffered a ransomware attack subsequently closed down. And, many of the businesses that continued operation still had to lay off staff.

It began with floppy disks

The origins of ransomware are usually traced back to the AIDS or PC Cyborg Trojan virus in the 1980s. In this case, victims who inserted a floppy disk in their computer would find their files subsequently encrypted and a payment requested.

Disks were distributed to attendees and people interested in specific conferences, who would then attempt to access the disk to complete a survey – instead becoming infected with the trojan.

Files on affected computers were encrypted using a key stored locally on each target machine. A victim could, in principle, have restored access to their files by using this key. The victim, though, may not have known that they could do this, as even now, technical knowledge of cryptography is not common among most PC users.

Eventually, law enforcement traced the floppy disks to a Harvard-taught evolutionary biologist named Joseph Popp, who was conducting AIDS research at the time. He was arrested and charged with multiple counts of blackmail, and has been credited by some with being the inventor of ransomware.

No one knows exactly what provoked Popp to do what he did.

Early form of white computer text on red background
The on-screen message after the AIDS Trojan Horse ransomware was activated. Wikipedia

Many early versions of ransomware were quite basic cryptographic systems which suffered from various issues surrounding how easy it was to find the key information the criminal was trying to hide from the victim. This is one reason why ransomware really came of age with the CryptoLocker attack in 2013 and 2014.

CryptoLocker was the first technically sound ransomware attack virus to be distributed en masse. Thousands of victims saw their files encrypted by ransomware that could not be reverse-engineered. The private keys, used in encryption, were held by the attacker and victims could not restore access to their files without them.

Ransoms of around $300-600 were demanded and it is estimated the criminals got away with around $3 million. Cryptolocker was eventually shut down in 2014 following an operation involving multiple, international law enforcement agencies.

CryptoLocker was pivotal in showing proof of concept that criminals could earn large amounts of money from ransomware. Subsequently, there was an explosion of new variants and new types. There was also significant evolution in the strategies used by criminals.

Off-the-shelf and double extortion

One important development was the emergence of ransomware-as-a-service. This is a term for markets on the dark web through which criminals can obtain and use “off-the-shelf” ransomware without the need for advanced computing skills while the ransomware providers take a cut of the profits.

Research has shown how the dark web is the “unregulated Wild West of the internet” and a safe haven for criminals to communicate and exchange of illegal goods and services. It is easily accessible and with the help of anonymization technology and digital currencies, there is a global black economy thriving there. An estimated $1 billion was spent there during the first nine months of 2019 alone, according to the European Union Agency for Law Enforcement.

With ransomware as a service (Raas) the barrier to entry for aspiring cyber criminals, in terms of both cost and skill, was lowered.

Under the Raas model, expertise is provided by vendors who develop the malware while the attackers themselves may be relatively unskilled. This also has the effect of compartmentalizing risk – the arrest of cyber criminals using ransomware no longer threatens the entire supply chain, allowing attacks launched by other groups to continue.

We have also seen a movement away from mass phishing attacks, like CryptoLocker, which reached more than 250,000 systems, to more targeted attacks. That has meant an increasing focus on organizations with the revenue to pay large ransoms. Multinational organizations, legal firms, schools, universities, hospitals and healthcare providers have all become prime targets, as well as many small and micro businesses and charities.

A more recent development in ransomware, such as Netwalker, REvil/Sodinokibi, has been the threat of double extortion. This is where the criminals not only encrypt files but also exfiltrate data by copying the files. They then have the potential to leak or post potentially sensitive and important information.

An example of this occurred in 2020, when one of the largest software companies, Software AG, was hit with a double extortion ransomware called Clop. It was reported that the attackers had requested an exceptionally high ransom payment of $20 million, which Software AG refused to pay.

This led to attackers releasing confidential company data on the dark web. This provides criminals with two sources of leverage: they can ransom for the private key to decrypt files and they can ransom to stop publication of sensitive data.

Double extortion changes the business model of ransomware in interesting ways. In particular, with standard ransomware, there is a relatively straightforward incentive for a victim to pay a ransom for access to the private key if that would allow decryption of the files, and they cannot access the files through any other means.

The victim “only” needs to trust the cybercriminal will give them the key and that the key will work.

‘Honor’ among thieves?

But with data exfiltration, by contrast, it is not obvious what the victim gets in return for paying the ransom. The criminals still have the sensitive data and could still publish it any time they want. They could, indeed, ask for subsequent ransoms to not publish the files.

Therefore, for data exfiltration to be a viable business strategy the criminals need to build a credible reputation of “honoring” ransom payments. This has arguably led to a normalized ransomware ecosystem.

For instance, ransom negotiators are private contractors and in some cases are required as part of a cyber insurance agreement to provide expertise in the managing of crisis situations involving ransomware. Where instructed, they will facilitate negotiated ransom payments. Within this ecosystem, some ransomware criminal gangs have developed a reputation for not publishing data (or at least delaying publication) if a ransom is paid.

More generally, the encryption, decryption or exfiltration of files is typically a difficult and costly task for criminals to pull off. It is far simpler to delete the files and then claim they have been encrypted or exfiltrated and demand a ransom.

However, if the victims suspect that they won’t be getting the decryption key or encrypted data back then they won’t pay the ransom.

And those that do pay a ransom and get nothing in return may disclose that fact. This is likely to impact the attacker’s “reputation” and the likelihood of future ransom payments. Simply put, it pays to play “fair” in the world of extortion and ransom attacks.

So in less than ten years we have seen the ransomware threat evolve enormously from the relatively low-scale CryptoLocker, to a multi-million dollar business involving organized criminal gangs and sophisticated strategies.

From 2020 onwards the incidents of ransomware, and consequent losses, have seemingly increased by another order of magnitude. Ransomware has become too big to ignore and is now a major concern for governments and law enforcement.

Crypto extortion threats

Devastating though ransomware has become, the threat will inevitably evolve further, as criminals develop new techniques for extortion. As mentioned already, a key theme in our collective research over the last ten years has been to try and preempt the likely strategies that criminals can employ so as to be ahead of the game.

Our research is now focused on the next generation of ransomware, which we believe will include variants focused on cryptocurrency, and the “consensus mechanisms” used within them.

A consensus mechanism is any method (usually algorithmic) used to achieve agreement, trust and security across a decentralized computer network.

Financial business concept, bitcoin, etheruem, litecoin
The next target could by crypto. Photo: Shutterstock via The Conversation / sundaemorning

Specifically, cryptocurrencies are increasingly using a so-called “proof-of-stake” consensus mechanism, in which investors stake significant sums of currency to validate crypto transactions. These stakes are vulnerable to extortion by ransomware criminals.

Cryptocurrencies rely on a decentralized blockchain that provides a transparent record of all the transactions that have taken place using that currency. The blockchain is maintained by a peer-to-peer network rather than a central authority (as with conventional currency).

In principle, the transaction records included in the blockchain are immutable, verifiable and securely distributed across the network, giving users full ownership and visibility into the transaction data.

These properties of blockchain rely on a secure and non-manipulable “consensus mechanism” in which the independent nodes in the network “approve” or “agree” which transactions to add to the blockchain.

Until now, cryptocurrencies like Bitcoin have relied on a so-called “proof-of-work” consensus mechanism in which the authorization of transactions involves the solving of complex mathematical problems (the work). In the long term, this approach is unsustainable because it results in duplication of effort and avoidable large-scale energy use.

The alternative, which is now becoming a reality, is a “proof-of-stake” consensus mechanism. Here, transactions are approved by validators who have staked money and are financially rewarded for validating transactions. The role of inefficient work is replaced by a financial stake. While this addresses the energy problem, it means that large amounts of staked money becomes involved in validating crypto transactions.

Ethereum

The existence of this staked money provides a novel threat to some proof-of-stake cryptocurrencies. We have focussed our attention on Ethereum, a decentralized cryptocurrency that establishes a peer-to-peer network to securely execute and verify application code, known as a smart contract.

Ethereum is powered by the Ether (ETH) token that allows users to transact with each other through the use of these smart contracts. The Ethereum project was co-founded by Vitalik Buterin in 2013 to overcome shortcomings with Bitcoin. On September 15, 2022, The Merge, moved the Ethereum network from proof-of-work to proof-of-stake, making it one of the first prominent proof-of-stake cryptocurrencies.

The proof-of-stake consensus mechanism in Ethereum relies on “validators” to approve transactions. To set up a validator there needs to be a minimum stake of 32ETH, which is currently around $60,000. Validators can then earn a financial return on their stake from operating a validator in accordance with Ethereum rules. At the time of writing there are around 850,000 validators.

A lot of hope is being pinned on the “stake” solution of validation – but hackers are sure to be looking into how they can infiltrate the system.

In our project, which was funded by the Ethereum Foundation, we identified ways in which ransomware groups could exploit the new proof-of-stake mechanism for extortion.

Slashing

We found that attackers could exploit validators through a process called “slashing”. While validators receive rewards for obeying the rules, there are financial penalties for validators that are seen to act maliciously. The basic objective of penalties is to prevent exploitation of the decentralized blockchain.

There are two forms of penalties, the most severe of which is slashing. Slashing occurs for actions that should not happen by accident and could jeopardize the blockchain, such as proposing conflicting blocks are added to the blockchain, or trying to change history.

Slashing penalties are relatively severe with the validator losing a significant share of their stake, at least 1ETH. Indeed, in the most extreme case the validator could lose all of their stake (32ETH). The validator will also be forced to exit and no longer act as a validator. In short, if a validator is slashed there are big financial consequences.

To perform actions, validators are assigned unique signing keys, that, in essence, prove who they are to the network. Suppose that a criminal got hold of the signing key? Then, they could blackmail the victim into paying a ransom.

Flow diagram showing just how complicated it gets when there is an extortion attack against proof-of-stake validators, such as Ethereum

Flow chart showing what happens when ransomware attacks infiltrate crypto.
Alpesh Bhudia, CC BY-ND

A ‘smart contract’

The victim may be reluctant to pay the ransom unless there is a guarantee that the criminals will not take their money and fail to return/release the key. After all, what is to stop the criminals asking for another ransom?

One solution we have found – which harks back to the fact that ransomware has in fact become a kind of business operated by criminals who want proof they have an “honest” reputation – is a smart contract.

This automated contract can be written so that the process only works if both sides “honor” their side of the bargain. So, the victim could pay the ransom and be confident that this will resolve the direct extortion threat. This is possible through Ethereum because all the steps required are publicly observable on the blockchain – the deposit, the sign to exit, the absence of slashing and the return of the stake.

Functionally, these smart contracts are an escrow system in which money may be held until pre-agreed conditions are met. For instance, if the criminals force slashing before the validator has fully exited, then the contract will ensure that the ransom amount is returned to the victim.

Such contracts are, however, open to abuse, and there’s no guarantee that an attacker-authored contract can be trusted. There is potential for the contract to be automated in a fully trusted way, but we have yet to observe such behavior and systems emerge.

The staking pools threat

This type of “pay and exit” strategy is an effective way for criminals to extort victims if they can obtain the validator signing keys.

So how much damage would a ransomware attack like this do to Ethereum? If a single validator is compromised then the slashing penalty – and so maximum ransom demand – would be in the region of 1ETH, which is around $1,800. To leverage larger amounts of money the criminals, therefore, need to target organizations or staking pools that are responsible for managing large numbers of validators.

Remember, that given the high entry costs for individual investors, most of the validating on Ethereum will be run under “staking pools” in which multiple investors can collectively stake money.

To put this in perspective, Lido is the largest staking pool in Ethereum with around 127,000 validators and 18% of the total stake; Coinbase is the second largest with 40,000 validators and 6% of the total stake. In total, there are 21 staking pools operating more than a 1,000 validators. Any one of these staking pools is responsible for tens of millions of dollars of stake and so viable ransom demands could also be in the millions of dollars.

Proof-of-stake consensus mechanisms are too young for us to know whether extortion of staking pools will become an active reality. But the general lesson of ransomware’s evolution is that the criminals tend to gravitate towards strategies that incentivize payment and increase their illicit gains.

The most straightforward way that investors and staking pool operators can mitigate the extortion threat we have identified is by protecting their signing keys. If the criminals cannot access the signing keys then there is no threat. If the criminals can only access some of the keys (for operators with multiple validators) then the threat may fail to be lucrative.

So staking pools need to take measures to secure signing keys. This would involve a range of actions including: partitioning validators so that a breach only impacts a small subset; step up cyber security to prevent intrusion, and robust internal processes to limit the insider threat of an employee divulging signing keys.

Concept using blocks with locks and keys printed on them to show encryption keys being compromised.
What happens when hackers gain access to secret keys? Photo: Shutterstock via The Conversation / Andrii Yalanskyi

The staking pool market for cryptocurrencies like Ethereum is competitive. There are many staking pools, all offering relatively similar services, and competing on price to attract investors. These competitive forces, and the need to cut costs, may lead to relatively lax security measures. Some staking pools may, therefore, prove a relatively easy target for criminals.

Ultimately, this can only be solved with regulation, greater awareness and for investors in staking pools to demand high levels of security to protect their stake.

Unfortunately, the history of ransomware suggests that high-profile attacks will need to be seen before the threat is taken seriously enough. It is interesting to contemplate the consequences of a significant breach of a staking pool.

The reputation of the staking pool would presumably be badly affected and so the staking pool’s viability in a competitive market is questionable. An attack may also have implications for the reputation of the currency.

At the most serious, it could lead to a currency collapsing. When that happens – as it did with FTX in 2022 following another hacking attack, there are knock-on effects to the global economy.

Here to stay

Ransomware will be a challenge for years, if not decades, to come.

One potential vision of the future is that ransomware just becomes part of normal economic life with organizations facing the constant threat of attack, with few consequences for the largely anonymous gangs of cyber criminals behind the scams.

To preempt such negative consequences we need greater awareness of the threat. Then investors can make more informed decisions over which staking pools and currencies to invest in. It also makes sense to have a market with many staking pools, rather than a market dominated by just a few large ones, as this could insulate the currency from possible attacks.

Beyond crypto, preemption involves investment in cyber security across a range of forms – from staff training and an organizational culture that supports reporting of incidents. It also involves investment in recovery options, such as effective back-ups, in-house expertise, insurance and tried and tested contingency plans.

Unfortunately, cyber security practices are not improving as one might hope in many organizations and this is leaving the door open for cyber criminals. Essentially, everyone needs to get better at hiding, and protecting, their digital keys and sensitive information if we are to stand a chance against the next generation of ransomware attackers.

Alpesh Bhudia is Doctoral Researcher in Cyber Security, Royal Holloway University of London; Anna Cartwright is Principal Lecturer in Accounting, Finance and Economics, Oxford Brookes University; Darren Hurley-Smith is Senior Lecturer in Information Security, Royal Holloway University of London, and Edward Cartwright is Professor of Economics, De Montfort University

This article is republished from The Conversation under a Creative Commons license. Read the original article.

Continue Reading

Toyota halts all Japan assembly plants due to glitch

Toyota worker at assembly plant in Japan.Toyota

Japanese car making giant Toyota has suspended operations at all of its assembly plants in its home country due to a glitch in its production system.

The move is likely to bring domestic output of the world’s biggest car maker by sales to a standstill.

The malfunction has meant the firm has not been able to order components.

A spokesperson told the BBC that the firm is trying to find the cause of the problem but does not currently believe it is due to a cyber attack.

On Tuesday morning, Toyota suspended operations at 12 of its 14 assembly plants in Japan.

Later in the day a spokesperson said production at all 14 facilities would be suspended.

The company has not yet said when it plans to restart the operations or how much production is expected to be lost due to the stoppage.

In total, the 14 plants are estimated to account for around a third of Toyota’s global production.

The suspension comes as Toyota’s production in Japan had been recovering after a series of issues.

Its operations were hit last year after one of its suppliers was affected by a cyber attack.

The one-day disruption caused an output loss of around 13,000 cars.

Also last year, Toyota suspended operations at some of its production lines in Japan due to the coronavirus lockdown in China’s economic hub Shanghai.

“Due to the impact of the semiconductor shortage, we announced our revised production plan for May,” Toyota said at the time.

Toyota is a pioneer of the so-called “just-in-time” production system, which keeps costs down but can be vulnerable to problems if deliveries of components are disrupted.

Related Topics

Continue Reading

Chevron: Workers at major Australia gas facilities to strike

A Chevron Wheatstone LNG cargo ship departs Western Australia for Japan.Chevron

Workers at two large liquefied natural gas (LNG) plants in Australia, operated by US energy giant Chevron, are set to go on strike from 7 September, in a move that could drive up global prices.

This follows weeks of negotiations with unions over pay and working conditions.

Chevron told the BBC it would “continue to take steps to maintain safe and reliable operations in the event of disruption at our facilities”.

The Wheatstone and Gorgon sites produce more than 5% of the world’s LNG.

Fears of strikes recently pushed up wholesale gas prices in Europe.

Around 500 workers are currently employed at the two Chevron facilities in Western Australia.

“While we don’t believe that industrial action is necessary for agreement to be reached, we recognise employees have the right to take protected industrial action,” Chevron said in a statement on Tuesday.

It added that it would “continue to work through the bargaining process as we seek outcomes that are in the interests of both employees and the company.”

The Offshore Alliance – which is a partnership of two unions representing energy workers, including those at Chevron – said it had been trying to reach an agreement with the company on “several key” issues including pay, job security, rosters and training standards.

It added that workers had been “consistently disappointed with the company’s approach to negotiations with the union and Chevron not accepting that an industry standard agreement should apply to the work they perform for the company”.

“We may see work stoppages for short periods of the day, and bans on specific work like helicopter unloadings. These actions create inefficiencies and could lead to minor production disruptions,” energy analyst Saul Kavonic said.

Mr Kavonic currently expects the strike to have a limited impact on global gas prices. However, he warned that energy prices could surge if the industrial action was stepped up.

“In the very unlikely event of a prolonged large scale supply disruption, prices could head back towards crisis levels witnessed last year [after Russia’s invasion of Ukraine],” he added.

In the last week, wholesale gas prices in Europe jumped on concerns of a disruption to supply at Chevron and another Australian LNG plant, run by Woodside Energy.

On Thursday, Woodside said it had reached an agreement in principle with unions representing workers at its North West Shelf plant.

Together, the Woodside and Chevron plants make up around 10% of the world’s supply of LNG.

Map

Russia slashed supplies of natural gas to Europe after the start of the Ukraine war in 2022.

That pushed up prices around the world and led countries to seek out alternative sources of energy, such as LNG.

Australia is one of the world’s biggest LNG exporters and its supplies have helped to cool global energy prices.

LNG is methane, or methane mixed with ethane, cleansed of impurities and cooled to approximately -160C.

This turns the gas into a liquid and it can then be shipped in pressurised tankers.

At its destination, LNG is turned back into gas and used, like any other natural gas, for heating, cooking and power.

Continue Reading

From GPS to security systems: Older smart devices may not work after 3G shutdown

WHAT SERVICE PROVIDERS ARE DOING

Telcos and IoT service providers told CNA they are contacting customers about network migration and upgrading or replacing their devices if connectivity is going to be affected.

A Singtel spokesperson said only a “very small proportion” of its IoT customers use 3G, and the telco is working closely with them to facilitate migration to newer networks.

M1’s IoT services are not affected by the retirement of the network as its 3G SIM cards are 4G-ready, a spokesperson said, adding that customers would need to ensure their IoT equipment can support 4G.

The spokesperson added that many customers are already working with their partners to customise the hardware with compatible SIM card inserts.

M1 has also been offering equipment refreshes by providing 4G- or 5G-capable routers to customers that do not require any hardware customisation.

One service provider is checking the vehicle monitoring systems of luxury cars across Singapore to ensure that their SIM cards are compatible with newer networks.

The SIM cards of most of these vehicles were issued in their country of manufacturing, said Mr Patrick Lim, director for group strategy at Ademco Security Group, which provides security and fire protection solutions.

The car manufacturers may use older SIM cards to save costs. Ademco will be communicating with the manufacturers about this, including on whether vehicle recalls will be needed to upgrade the SIM cards, he said.

Another group at risk of losing connectivity are the enterprises that choose to run their security and fire protection systems by themselves in-house after the service provider has set it up, said Mr Lim.

With time, these customers may forget about the arrangements in place, and may not be up to date on the 3G network retirement, he said.

While the proportion of such customers is not big for Ademco, it is “significant enough that I remember them”, said Mr Lim.

He added that during the previous retirement of the 2G network in April 2017, some such customers on 2G connections experienced disruption.

Continue Reading

All OCBC banking services restored after morning outage

An announcement on OCBC’s website earlier on Monday also said that all banking services were affected.

“We are experiencing network issues at the moment. All of our banking services are down,” said OCBC.

“We are sorry for the inconvenience and are working to bring things back to normal.”

According to updates from the bank on Facebook, card and branch services were restored at 10.33am, while ATM services were back up at 10.37am.

“Channels that are still impacted are internet banking, mobile banking, as well as Velocity,” said an OCBC spokesperson earlier on Monday.

The spokesperson added that customers could still visit its branches for urgent transactions.

The spokesperson added that the bank was on standby to deploy additional resources at branches and extend branch banking hours to support customers. 

Commenting on OCBC’s Facebook post, some customers noted that their credit card payments were declined and that they were unable to withdraw cash.

One customer said that her payment for an online doctor consultation could not go through.

Another said: “Have breakfast with a client, used credit card and then atm card to pay bills, all declined.”

Several also said that it was embarrassing for them when their credit card transactions were declined. 

CNA has reached out to the Monetary Authority of Singapore (MAS) for comment.

In May, DBS online banking and payment services were disrupted for the second time in less than two months, with preliminary investigations linking the cause to human error.

In the wake of the two service disruptions, MAS imposed an additional capital requirement on Singapore’s largest lender.

The bank will now need to apply a multiplier of 1.8 times to its risk-weighted assets for operational risk, bringing its total additional regulatory capital to approximately S$1.6 billion (US$1.2 billion).

This is up from the multiplier of 1.5 times – translating to S$930 million – imposed by MAS in February 2022 after DBS was also hit by a major, two-day disruption in November 2021.

Continue Reading

US extends China chip curb waiver for allies’ fabs

The United States government has decided to extend a waiver to allow mainland China-based Taiwanese and South Korean firms to import chip-making equipment for another year from October.

The decision, reported by Nikkei, came ahead of US Commerce Secretary Gina Raimondo’s August 27-30 trip to China.

This move, together with the US Commerce Department’s recent decision to remove 27 Chinese firms from its unverified list, is welcomed by Beijing.

In early July, Chinese officials held deep talks with US Treasury Secretary Janet Yellen in Beijing and persuaded the Biden administration to reduce to the scope of its investment curbs against China’s high technology sectors.

During Raimond’s visit, Beijing plans to ask Washington to cancel extra tariffs that have been imposed on Chinese steel and aluminium products.

“The essence of Sino-US economic and trade relations is to achieve mutual benefit and win-win results while pushing forward the economic and trade cooperation is in the common interests of the two countries and their peoples,” Shu Yuting, a spokesperson of the Chinese Commerce Ministry, said in a media briefing on Thursday.

“We have noticed some difficulties and challenges in bilateral trade and investment recently, which are closely related to a series of unilateral and protectionist measures implemented by the US,” Shu said. “China will continue to raise relevant economic and trade concerns with the US, and strive to create a fair and stable business environment for companies from both sides to carry out trade and investment cooperation.”
 
Last October, the US Commerce Department’s Bureau of Industry and Security’s (BIS) said mainland China-based chip fabs that produce logic chips of 16-nm or smaller, DRAM memory chips of 18-nm half-pitch or smaller, or NAND chips with 128 layers or more will have to apply for licenses to purchase items from the US.

At the same time, the Biden administration offered a one-year waiver to allow Taiwanese and South Korean chipmakers, such as TSMC, Samsung Electronics and SK hynix, to ship US tools to their mainland fabs without having to apply for a licence. The exemptions were set to expire October this year.

Some analysts said the waiver can help prevent widespread disruption in the global semiconductor supply chain. But some others said the prolonged exemptions will reduce the effectiveness of the US chip export control against China.

In June, US Undersecretary of Commerce for Industry and Security Alan Estevez told an audience at an industry gathering that the government would extend exemptions for South Korean and Taiwanese chip suppliers with their facilities in China.

The Wall Street Journal reported on June 12 that the US government was considering the waiver extension in view of perceptions that it may have underestimated the complexity and effects of isolating China from the production of advanced technology.

Meanwhile, the Biden administration is reportedly monitoring whether US-sanctioned Chinese telecom giant Huawei is constructing facilities under the names of other companies and indirectly purchasing American chip-making equipment in order to bypass US sanctions. Bloomberg reported on Tuesday that Huawei is receiving an estimated US$30 billion in state funding for secretive chip production.

Tin mill steel

In the first seven months of this year, China’s Foreign Direct Investment (FDI) fell 9.8% to US$111.8 billion from the same period of last year, according to the Ministry of Commerce.

For the same period, China’s exports to the US decreased 18.6% to US$281.7 billion, according to the General Administration of Customs. The country’s total exports dropped by 5% to 1.46 trillion. Some economists blamed the slowing economy in the West for the decline.

On August 17, the US Commerce Department said it will set preliminary anti-dumping duties of 122.5% on tin mill steel imported from China, 7.02% on imports from Germany and 5.29% on imports from Canada to protect domestic steelmakers. No duties will be imposed on the steel products imported from Britain, the Netherlands, South Korea, Taiwan and Turkey. 

China’s duties were higher as a major producer refused to cooperate in the investigation while other respondents could not prove that they were independent of the Chinese government, according to a Commerce Department official.

“This is a major example of the United States’ harsh measures against China’s economy and trade,” Liu Xiaowei, a Hubei-based commentator, says in an article. “A US official said a lack of cooperation of a Chinese company led to an ‘adverse inference’ determination. What kind of hegemonic logic is this?”

Liu adds: “While the US media claimed that Raimondo’s visit is aimed at strengthening communication with Beijing, we should maintain a clear mind and closely monitor the United States’s actions. If the US becomes capricious again after the talks, it is questionable whether Sino-US relations will continue to improve.”

He says China should not place too many hopes on Raimondo’s trip as the Biden administration’s overall China strategy remains confrontational.

WTO’s ruling

In March 2018, then US President Donard Trump ordered the imposition of 25% tariffs on steel imports and 10% tariffs on aluminium imports. The order mainly targeted China. It exempted imports from Canada and Mexico.

In April of the same year, China initiated a World Trade Organization (WTO) dispute complaint against the United States’s extra tariffs.

On December 9 last year, the WTO said the US Section 232 tariffs violated its rules because they were not imposed “in time of war or other emergency in international relations.” But on August 16 this year, the WTO said it recognized that the US Section 232 actions on steel and aluminium are security measures, and that China illegally retaliated with sham “safeguard” tariffs.

“China’s decision to pursue this dispute highlights its hypocrisy by both suing the US in the WTO and at the same time unilaterally retaliating with tariffs,” said the Office of the US Trade Representative. “China’s use of the WTO dispute settlement system to challenge the US Section 232 national security actions has caused grave systemic damage to the WTO.”

Wu Xuelan, a TV commentator, says in a recent video that if Washington wants to improve Sino-US relations, it should cancel its additional tariffs imposed on China’s steel and aluminium products. But if the US imposes more sanctions on China after Raimondo’s visit, she says, Beijing may rethink whether Chinese leaders should attend the APEC Summit in San Francisco in November. 

Read: Raimondo could ease the tech war while in China

Follow Jeff Pao on Twitter at @jeffpao3

Continue Reading

Fukushima: The fishy business of China’s outrage over Japan’s release

A woman selling fish at a market in Shanghai, China on 24 AugustEPA

Japan has called on China to remove a total ban on its seafood products, imposed after Tokyo began the scientifically-endorsed release of treated water from its Fukushima nuclear plant.

China, the leading buyer of Japan’s fish, announced on Thursday it was making the order due to concerns for consumers’ health.

However, the claim is not backed by science – with the consensus from experts being that the release poses no safety risks to ocean life or seafood consumption.

“The main reason is not really the safety concerns,” international trade law expert Henry Gao told the BBC. “It is mainly due to Japan’s moves against China,” he said, noting Japan’s closer alignment to the US and South Korea in recent years.

Following the waters’ release on Thursday, International Atomic Energy Agency (IAEA) monitors at the site said their tests showed the discharge had even lower radiation levels than the limits Japan has set – 1,500 becquerels/litre – which is about seven times lower than the global drinking water standard.

And despite Japanese fishermen’s fears, analysts say the trade hit to Japan’s industry will be short-lived and less than expected.

The main market for Japan’s fish remains its domestic one.

Locals consume most of the catch, so top seafood companies Nissui and Maruha Nichiro have both said they expect limited impact from China’s ban. Both companies’ stock prices were slightly up at close of trade on the day of the ban’s announcement, Reuters reported.

Beyond China, no other country has even hinted at a total ban – South Korea still bans seafood imports from Fukushima and some surrounding prefectures.

Experts say even people who scoff down lots of seafood will be exposed to only extremely low doses of radiation – in the range of 0.0062 to 0.032 microSv per year, said Mark Foreman, an associate professor of nuclear chemistry in Sweden.

Humans can safely be exposed to tens of thousands of times more than that – or up to 1,000 microSv of radiation per year, Associate Prof Foreman said.

Price to pay is not so high

Japan’s government has admitted the local fishing industry will likely take a significant hit.

It had previously criticised Beijing for spreading “scientifically unfounded claims”, and on Thursday evening, Prime Minister Fumio Kishida again beseeched Beijing to look at the research.

“We have requested the withdrawal (of China’s ban) through diplomatic channels,” Mr Kishida told reporters on Thursday night. “We strongly encourage discussion among experts based on scientific grounds.”

China and its territories Hong Kong and Macau – had already instated a partial ban on seafood from some Japanese areas- but authorities now expanded that net.

Mainland China and Hong Kong are Japan’s biggest international seafood buyers respectively, buying about $1.1bn (£866m) or 41% of Japan’s seafood exports.

Local media reported that following China’s ban, the head of a Japanese fisheries association called Japan’s Industry Minister, urging him to lobby Beijing to retract the ban.

But industry watchers are calm, knowing the usual vagaries of supply and demand in global trade.

Prof Gao said he expects some short-term disruption but “soon the exporters shall be able to shift to other markets so the long-term effect will be small.”

A cardboard sign with Japan's Prime Minister Fumio Kishida is seen during a protest in Hong Kong on Friday after Japan released treated radioactive water from the crippled Fukushima nuclear plant into the sea

Reuters

And on the other side of the trade, restaurants in Chinese cities won’t be lacking in seafood delicacies. Japan supplies just 4% of the seafood China buys from abroad- Beijing buys much more from India, Ecuador and Russia, according to Chinese customs data cited by Reuters.

China’s ban on seafood will also barely scrape Japan’s overall economy.

Marine products make up less than 1% of Japan’s global trade, which is driven by car and machinery exports. Analysts say the impact of a seafood ban is negligible.

“The Fukushima water release is mostly of political and environmental significance,” Stefan Angrick, an economist at Moody’s Analytics, told Reuters.

“Economically, the ramifications of a potential ban on Japanese food shipments are minimal.”

Still, public perception around the industry’s damage and safety persists, not just in China, but South Korea where there have been crowds protesting.

In the months leading up to the water’s release, fishermen in South Korea reported a notable decline in the sale value of their catch – but prices remained stable the day after the release.

At home in Japan, polling also shows a divide. The government has made significant efforts to both reassure citizens and appease the industry. It has promised subsidies and an emergency buy-out if seafood sales dive.

On Friday, Osaka authorities proposed to serve Fukushima seafood at government buildings. Meanwhile, the company running the Fukushima plan, Tepco, said it would also provide compensation to local businesses if they suffered poor sales.

But locals are also hardy. Following China’s announcement on Thursday, many Japanese on Twitter even celebrated the ban – wryly suggesting it could mean cheaper fish at home.

“Good news amid inflation…. Even Hokkaido sea urchin will be super cheap,” one user tweeted.

Continue Reading

Hong Kong and China interest in AI and regtech ‘palpable’ despite soft fintech funding: report | FinanceAsia

Fintech companies in Asia Pacific received $5.1 billion of funding in the first half of 2023, a further drop from $6.7 billion during the same period last year, a recent KPMG report has revealed.

The figure points to a “very soft” fintech funding landscape in the region, in contrast with $36.1 billion of funding in the Americas, and $11.2 billion in Europe, Middle East and Africa (EMEA), the study showed.

In terms of number of fintech funding deals, 432 were completed in the Apac region, compared with 1,011 in the Americas, and 702 in EMEA.

“The global fintech market has seen challenges, with a decline in both funding and deals,” Barnaby Robson, deal advisory partner at KPMG China told FinanceAsia.

“Public companies have changed materially, with entire industries trading at fractions of previous valuations. But founder expectations have not moved as fast, meaning private valuations are adjusting slowly as companies seek new funding,” he explained.

The report, Pulse of Fintech H1’23, aggregated data from global venture capital (VC), private equity (PE) and mergers and acquisitions (M&A) deals in 2023’s first half, and looked into various segments including payments, insurtech, regtech, cyber security, wealthtech and blockchain.

The largest fintech deal H1 2023 in the region was $1.5 billion raised by Chongqing Ant Consumer Finance, the consumer finance unit of China’s Ant Group, which faced Beijing’s pressure to restructure in compliance with regulatory limits.

“Fintech funding in China is very dry” outside of Chongqing Ant Consumer Finance’s deal, the report noted. Businesses and investors in China tend to prioritise post-pandemic recovery, waiting for outcomes from prior investments, it explained.

Other significant deals in Asia include $304 million raised by India-based Vistaar Finance, and $270 million raised by Kredivo Holdings in Singapore.

Rebound potential

Despite slowing deal activity and slashed valuation, the intrinsic value and potential of the fintech sector in Hong Kong, mainland China, and Asia in general, remained robust, Robson told FA.

Fintech firms in the area are increasingly looking at leveraging artificial intelligence-generated content (AIGC), the report identified.

“In mainland China, the focus on AI in insurtech, creditech and wealthtech is evident. Hong Kong, with its global connectivity, needs to navigate the growing challenges of dealing two different AI regimes and mainland China data onshoring rules. The diverse financial landscape and low productivity in emerging Asia, offers a fertile ground for AI-driven fintech innovations,” Robson detailed.

“AI’s potential to revolutionise fintech segments is undeniable.”

Despite the US and Europe being leaders in regtech, or regulatory technology, interest from Hong Kong and China is palpable, according to Robson.

“With the People’s Bank of China’s (PBOC) recent announcements and Hong Kong’s agile regulatory framework, it’s clear that the region is gearing up for a more transparent and efficient financial ecosystem,” he said.

China’s central bank released a set of draft administrative measures on data security management last month for public consultation, signalling the watchdog’s enhanced emphasis on data processing securities amid geopolitical tensions.

Many financial institutions are embracing regtech to improve the efficiency and effectiveness of addressing compliance and regulatory requirements, Robson noted.

In his view, the confluence of AI advancements, regulatory shifts, and a growing middle class could very likely help catalyse fintech funding in Hong Kong, mainland China as well as the broader Asia region.

But that would be possible only after “a more complete reset in multiples to get to where valuations reflect fundamentals, and market clearing prices exist”.

He pointed to late 2024 or 2025 as a likely timing for such a rebound, citing fintech being properly valued on a realistic discounted cash flow (DCF) or free cash flow (FCF) basis as a contributing element.

“It’s a matter of when, not if,”

¬ Haymarket Media Limited. All rights reserved.

Continue Reading