Russia's military offensive in Ukraine has raised the spectre of more cyber attacks, but it also presents an opportunity for investments to strengthen cyber infrastructure and prevent a spill-over economic effect, a new report from Lombard Odier found.
While cyber threats add to the risks challenging investors and institutions worldwide, the situation has compelled companies and governments to push the cyber security agenda further, the Geneva-based financial institution said.
Know your cyber adversaries
Cryptojacking: Compromises a device or network to mine cryptocurrencies without an organisation's knowledge.
Distributed denial-of-service: Floods systems, servers or networks with information, effectively blocking them.
Man-in-the-middle attack: Intercepts two-way communication to obtain information, spy on participants or alter the outcome.
Malware: Installs itself in a network when a user clicks on a compromised link or email attachment.
Phishing: Aims to secure personal information, such as passwords and credit card numbers.
Ransomware: Encrypts user data, denying access and demands a payment to decrypt it.
Spyware: Collects information without the user's knowledge, which is then passed on to bad actors.
Trojans: Create a backdoor into systems, which becomes a point of entry for an attack.
Viruses: Infect applications in a system and replicate themselves as they go, just like their biological counterparts.
Worms: Send copies of themselves to other users or contacts. They don't attack the system, but they overload it.
Zero-day exploit: Exploits a vulnerability in software before a fix is found.
The study highlights the fact that many organisations still lack adequate data security and protection measures, including software updates and staff training – a fact that came to the fore at the onset of the Covid-19 crisis, which cyber criminals happily exploited.
"Russia’s [military offensive in] Ukraine has raised fears of a cyber war with global consequences. Beyond the immediate risks, we believe the war in Ukraine will drive further growth in cyber security, with a range of investment implications," said Stephane Monier, chief investment officer of Lombard Odier Private Bank.
Cyber criminals are tipped to take advantage of the armed conflict between Russia and Ukraine, putting the spotlight on how organisations will respond and bolster their system defences.
Global spending on IT security and risk management was estimated to have increased 12.4 per cent to $150.4 billion in 2021, and is expected to grow in the high single digits through 2024, according to Gartner.
That is a fraction of the $4.5 trillion overall spend in the worldwide IT industry projected this year, the research company said in a separate report.
Ukraine, once a part of the former Soviet Union, is no stranger to cyber incidents, experiencing a surge in cyber attacks, particularly since 2014, after Russia annexed Crimea from Ukraine.
Russia’s [military offensive in] Ukraine has raised fears of a cyber war with global consequences. Beyond the immediate risks, we believe the war in Ukraine will drive further growth in cyber security, with a range of investment implications
Stephane Monier,
chief investment officer, Lombard Odier Private Bank
Earlier this year, a number of Ukrainian websites were hit by distributed denial-of-service attacks, with hackers defacing some with a "Be afraid and expect the worst" message. Last month, in the lead-up to Russia's attack, several Ukrainian government agencies and banks were hacked.
In 2017, the NotPetya malware – a variant of the destructive Petya virus that first surfaced a year earlier – particularly targeted Ukraine and crippled utilities, media organisations and government entities.
Russia was tagged as the culprit behind the NotPetya attacks, 80 per cent of which were concentrated on Ukraine, according to cyber security company Eset. The debacle caused worldwide damage of about $10bn.
China, however, has been the top country of cyber attacker origin since 2006, according to the Centre for Strategic and International Studies and global affairs outlet Gzero Media.
Lombard Odier said the dangers of increased cyber risk are multifaceted. For industries, particularly those that provide automation and electrification services, hackers can potentially take control of critical infrastructure, similar to the attacks on Ukrainian utilities and even to a Bluetooth vulnerability in Tesla cars first reported in 2020.
Ukraine is a popular source of IT outsourcing services, with the government saying that more than 100 Fortune 500 companies use such services; as such, any attack can severely compromise Ukrainian clients and further out.
The study by the Swiss bank also pointed out that companies are increasing capital expenditure on edge computing – a distributed framework that brings applications closer to data sources, according to IBM – which can deliver strong business benefits, improved response times and, critically, reduce risks associated with the transfer of sensitive data.
"Within cyber security firms, we prefer companies with complete security platforms to those with standalone products; the latter could see their solutions integrated into other platforms," Lombard Odier said.
But it also cautioned that even the most software-centric companies are vulnerable to attacks, which spare no company, industry or country.
The report also cited the role of the cyber insurance market, a fast-growing but very small segment of the overall insurance industry, accounting for just 0.4 per cent of global property and casualty premiums, according to Swiss Re.
Cyber attacks can be costly to organisations: the average cost of an attack peaked in 2016, amounting to about $4 million, according to data from IBM's security arm.
The heightened tensions "could focus policymakers' minds on setting a clearer regulatory and legal framework going forward. That could pave the way for greater policy standardisation and market growth moving ahead", Lombard Odier said.
Russia's military offensive in Ukraine has destroyed about $100bn worth of assets and closed half of its economy so far, Ukraine's chief economic adviser Oleg Ustenko said on Friday. Both the International Monetary Fund and the World Bank have warned that the conflict is having an adverse effect on rising inflation.
The specs
A4 35 TFSI
Engine: 2.0-litre, four-cylinder
Transmission: seven-speed S-tronic automatic
Power: 150bhp
Torque: 270Nm
Price: Dh150,000 (estimate)
On sale: First Q 2020
A4 S4 TDI
Engine: 3.0-litre V6 turbo diesel
Transmission: eight-speed PDK automatic
Power: 350bhp
Torque: 700Nm
Price: Dh165,000 (estimate)
On sale: First Q 2020
The specs
Engine: 3.0-litre six-cylinder turbo
Power: 398hp from 5,250rpm
Torque: 580Nm at 1,900-4,800rpm
Transmission: Eight-speed auto
Fuel economy, combined: 6.5L/100km
On sale: December
Price: From Dh330,000 (estimate)
Who's who in Yemen conflict
Houthis: Iran-backed rebels who occupy Sanaa and run unrecognised government
Yemeni government: Exiled government in Aden led by eight-member Presidential Leadership Council
Southern Transitional Council: Faction in Yemeni government that seeks autonomy for the south
Habrish 'rebels': Tribal-backed forces feuding with STC over control of oil in government territory
All about the Sevens
Cape Town Sevens on Saturday and Sunday: Pools A – South Africa, Kenya, France, Russia; B – New Zealand, Australia, Spain, United States; C – England, Scotland, Argentina, Uganda; D – Fiji, Samoa, Canada, Wales
HSBC World Sevens Series standing after first leg in Dubai 1 South Africa; 2 New Zealand; 3 England; 4 Fiji; 5 Australia; 6 Samoa; 7 Kenya; 8 Scotland; 9 France; 10 Spain; 11 Argentina; 12 Canada; 13 Wales; 14 Uganda; 15 United States; 16 Russia
FA%20Cup%20semi-final%20draw
%3Cp%3ECoventry%20City%20v%20Manchester%20United%C2%A0%3C%2Fp%3E%0A%3Cp%3EManchester%20City%20v%20Chelsea%3C%2Fp%3E%0A%3Cp%3E-%20Games%20to%20be%20played%20at%20Wembley%20Stadium%20on%20weekend%20of%20April%2020%2F21.%C2%A0%3C%2Fp%3E%0A
Skoda Superb Specs
Engine: 2-litre TSI petrol
Power: 190hp
Torque: 320Nm
Price: From Dh147,000
Available: Now
Islamophobia definition
A widely accepted definition was made by the All Party Parliamentary Group on British Muslims in 2019: “Islamophobia is rooted in racism and is a type of racism that targets expressions of Muslimness or perceived Muslimness.” It further defines it as “inciting hatred or violence against Muslims”.
How to wear a kandura
Dos
- Wear the right fabric for the right season and occasion
- Always ask for the dress code if you don’t know
- Wear a white kandura, white ghutra / shemagh (headwear) and black shoes for work
- Wear 100 per cent cotton under the kandura as most fabrics are polyester
Don’ts
- Wear hamdania for work, always wear a ghutra and agal
- Buy a kandura only based on how it feels; ask questions about the fabric and understand what you are buying
The President's Cake
Director: Hasan Hadi
Starring: Baneen Ahmad Nayyef, Waheed Thabet Khreibat, Sajad Mohamad Qasem
Rating: 4/5
Jetour T1 specs
Engine: 2-litre turbocharged
Power: 254hp
Torque: 390Nm
Price: From Dh126,000
Available: Now
Abu Dhabi Sustainability Week
Indoor Cricket World Cup - Sept 16-20, Insportz, Dubai
The Vile
Starring: Bdoor Mohammad, Jasem Alkharraz, Iman Tarik, Sarah Taibah
Director: Majid Al Ansari
Rating: 4/5
Company profile
Name: Tratok Portal
Founded: 2017
Based: UAE
Sector: Travel & tourism
Size: 36 employees
Funding: Privately funded
Sleep Well Beast
The National
4AD
U19 WORLD CUP, WEST INDIES
UAE group fixtures (all in St Kitts)
Saturday 15 January: v Canada
Thursday 20 January: v England
Saturday 22 January: v Bangladesh
UAE squad
Alishan Sharafu (captain), Shival Bawa, Jash Giyanani, Sailles Jaishankar, Nilansh Keswani, Aayan Khan, Punya Mehra, Ali Naseer, Ronak Panoly, Dhruv Parashar, Vinayak Raghavan, Soorya Sathish, Aryansh Sharma, Adithya Shetty, Kai Smith
Biog
Mr Kandhari is legally authorised to conduct marriages in the gurdwara
He has officiated weddings of Sikhs and people of different faiths from Malaysia, Sri Lanka, Russia, the US and Canada
Father of two sons, grandfather of six
Plays golf once a week
Enjoys trying new holiday destinations with his wife and family
Walks for an hour every morning
Completed a Bachelor of Commerce degree in Loyola College, Chennai, India
2019 is a milestone because he completes 50 years in business
COMPANY PROFILE
Company name: SimpliFi
Started: August 2021
Founder: Ali Sattar
Based: UAE
Industry: Finance, technology
Investors: 4DX, Rally Cap, Raed, Global Founders, Sukna and individuals
More from Mohammed Alardhi
COMPANY PROFILE
Name: Qyubic
Started: October 2023
Founder: Namrata Raina
Based: Dubai
Sector: E-commerce
Current number of staff: 10
Investment stage: Pre-seed
Initial investment: Undisclosed
MANDOOB
%3Cp%3EDirector%3A%20Ali%20Kalthami%3C%2Fp%3E%0A%3Cp%3EStarring%3A%20Mohammed%20Dokhei%2C%20Sarah%20Taibah%2C%20Hajar%20Alshammari%3C%2Fp%3E%0A%3Cp%3ERating%3A%204%2F5%3C%2Fp%3E%0A%3Cp%3E%3C%2Fp%3E%0A
COMPANY%20PROFILE%20
%3Cp%3EName%3A%20DarDoc%3Cbr%3EBased%3A%20Abu%20Dhabi%3Cbr%3EFounders%3A%20Samer%20Masri%2C%20Keswin%20Suresh%3Cbr%3ESector%3A%20HealthTech%3Cbr%3ETotal%20funding%3A%20%24800%2C000%3Cbr%3EInvestors%3A%20Flat6Labs%2C%20angel%20investors%20%2B%20Incubated%20by%20Hub71%2C%20Abu%20Dhabi's%20Department%20of%20Health%3Cbr%3ENumber%20of%20employees%3A%2010%3C%2Fp%3E%0A
Know your cyber adversaries
Cryptojacking: Compromises a device or network to mine cryptocurrencies without an organisation's knowledge.
Distributed denial-of-service: Floods systems, servers or networks with information, effectively blocking them.
Man-in-the-middle attack: Intercepts two-way communication to obtain information, spy on participants or alter the outcome.
Malware: Installs itself in a network when a user clicks on a compromised link or email attachment.
Phishing: Aims to secure personal information, such as passwords and credit card numbers.
Ransomware: Encrypts user data, denying access and demands a payment to decrypt it.
Spyware: Collects information without the user's knowledge, which is then passed on to bad actors.
Trojans: Create a backdoor into systems, which becomes a point of entry for an attack.
Viruses: Infect applications in a system and replicate themselves as they go, just like their biological counterparts.
Worms: Send copies of themselves to other users or contacts. They don't attack the system, but they overload it.
Zero-day exploit: Exploits a vulnerability in software before a fix is found.