Ukraine is no stranger to cyber incidents, experiencing a surge in cyber attacks particularly after 2014 when Russia annexed Crimea from Ukraine. Reuters
Ukraine is no stranger to cyber incidents, experiencing a surge in cyber attacks particularly after 2014 when Russia annexed Crimea from Ukraine. Reuters
Ukraine is no stranger to cyber incidents, experiencing a surge in cyber attacks particularly after 2014 when Russia annexed Crimea from Ukraine. Reuters
Ukraine is no stranger to cyber incidents, experiencing a surge in cyber attacks particularly after 2014 when Russia annexed Crimea from Ukraine. Reuters

Russia-Ukraine war raises global cyber security risk, study shows


Alvin R Cabral
  • English
  • Arabic

Russia's military offensive in Ukraine has raised the spectre of more cyber attacks, but it also presents an opportunity for investments to strengthen cyber infrastructure and prevent a spill-over economic effect, a new report from Lombard Odier found.

While cyber threats add to the risks challenging investors and institutions worldwide, the situation has compelled companies and governments to push the cyber security agenda further, the Geneva-based financial institution said.

Know your cyber adversaries

Cryptojacking: Compromises a device or network to mine cryptocurrencies without an organisation's knowledge.

Distributed denial-of-service: Floods systems, servers or networks with information, effectively blocking them.

Man-in-the-middle attack: Intercepts two-way communication to obtain information, spy on participants or alter the outcome.

Malware: Installs itself in a network when a user clicks on a compromised link or email attachment.

Phishing: Aims to secure personal information, such as passwords and credit card numbers.

Ransomware: Encrypts user data, denying access and demands a payment to decrypt it.

Spyware: Collects information without the user's knowledge, which is then passed on to bad actors.

Trojans: Create a backdoor into systems, which becomes a point of entry for an attack.

Viruses: Infect applications in a system and replicate themselves as they go, just like their biological counterparts.

Worms: Send copies of themselves to other users or contacts. They don't attack the system, but they overload it.

Zero-day exploit: Exploits a vulnerability in software before a fix is found.

The study highlights the fact that many organisations still lack adequate data security and protection measures, including software updates and staff training – a fact that came to the fore at the onset of the Covid-19 crisis, which cyber criminals happily exploited.

"Russia’s [military offensive in] Ukraine has raised fears of a cyber war with global consequences. Beyond the immediate risks, we believe the war in Ukraine will drive further growth in cyber security, with a range of investment implications," said Stephane Monier, chief investment officer of Lombard Odier Private Bank.

Cyber criminals are tipped to take advantage of the armed conflict between Russia and Ukraine, putting the spotlight on how organisations will respond and bolster their system defences.

Global spending on IT security and risk management was estimated to have increased 12.4 per cent to $150.4 billion in 2021, and is expected to grow in the high single digits through 2024, according to Gartner.

That is a fraction of the $4.5 trillion overall spend in the worldwide IT industry projected this year, the research company said in a separate report.

Ukraine, once a part of the former Soviet Union, is no stranger to cyber incidents, experiencing a surge in cyber attacks, particularly since 2014, after Russia annexed Crimea from Ukraine.

Russia’s [military offensive in] Ukraine has raised fears of a cyber war with global consequences. Beyond the immediate risks, we believe the war in Ukraine will drive further growth in cyber security, with a range of investment implications
Stephane Monier,
chief investment officer, Lombard Odier Private Bank

Earlier this year, a number of Ukrainian websites were hit by distributed denial-of-service attacks, with hackers defacing some with a "Be afraid and expect the worst" message. Last month, in the lead-up to Russia's attack, several Ukrainian government agencies and banks were hacked.

In 2017, the NotPetya malware – a variant of the destructive Petya virus that first surfaced a year earlier – particularly targeted Ukraine and crippled utilities, media organisations and government entities.

Russia was tagged as the culprit behind the NotPetya attacks, 80 per cent of which were concentrated on Ukraine, according to cyber security company Eset. The debacle caused worldwide damage of about $10bn.

China, however, has been the top country of cyber attacker origin since 2006, according to the Centre for Strategic and International Studies and global affairs outlet Gzero Media.

Lombard Odier said the dangers of increased cyber risk are multifaceted. For industries, particularly those that provide automation and electrification services, hackers can potentially take control of critical infrastructure, similar to the attacks on Ukrainian utilities and even to a Bluetooth vulnerability in Tesla cars first reported in 2020.

Ukraine is a popular source of IT outsourcing services, with the government saying that more than 100 Fortune 500 companies use such services; as such, any attack can severely compromise Ukrainian clients and further out.

The study by the Swiss bank also pointed out that companies are increasing capital expenditure on edge computing – a distributed framework that brings applications closer to data sources, according to IBM – which can deliver strong business benefits, improved response times and, critically, reduce risks associated with the transfer of sensitive data.

"Within cyber security firms, we prefer companies with complete security platforms to those with standalone products; the latter could see their solutions integrated into other platforms," Lombard Odier said.

But it also cautioned that even the most software-centric companies are vulnerable to attacks, which spare no company, industry or country.

The report also cited the role of the cyber insurance market, a fast-growing but very small segment of the overall insurance industry, accounting for just 0.4 per cent of global property and casualty premiums, according to Swiss Re.

Cyber attacks can be costly to organisations: the average cost of an attack peaked in 2016, amounting to about $4 million, according to data from IBM's security arm.

The heightened tensions "could focus policymakers' minds on setting a clearer regulatory and legal framework going forward. That could pave the way for greater policy standardisation and market growth moving ahead", Lombard Odier said.

Russia's military offensive in Ukraine has destroyed about $100bn worth of assets and closed half of its economy so far, Ukraine's chief economic adviser Oleg Ustenko said on Friday. Both the International Monetary Fund and the World Bank have warned that the conflict is having an adverse effect on rising inflation.

The specs

A4 35 TFSI

Engine: 2.0-litre, four-cylinder

Transmission: seven-speed S-tronic automatic

Power: 150bhp

Torque: 270Nm

Price: Dh150,000 (estimate)

On sale: First Q 2020

A4 S4 TDI

Engine: 3.0-litre V6 turbo diesel

Transmission: eight-speed PDK automatic

Power: 350bhp

Torque: 700Nm

Price: Dh165,000 (estimate)

On sale: First Q 2020

The specs
 
Engine: 3.0-litre six-cylinder turbo
Power: 398hp from 5,250rpm
Torque: 580Nm at 1,900-4,800rpm
Transmission: Eight-speed auto
Fuel economy, combined: 6.5L/100km
On sale: December
Price: From Dh330,000 (estimate)
Who's who in Yemen conflict

Houthis: Iran-backed rebels who occupy Sanaa and run unrecognised government

Yemeni government: Exiled government in Aden led by eight-member Presidential Leadership Council

Southern Transitional Council: Faction in Yemeni government that seeks autonomy for the south

Habrish 'rebels': Tribal-backed forces feuding with STC over control of oil in government territory

All about the Sevens

Cape Town Sevens on Saturday and Sunday: Pools A – South Africa, Kenya, France, Russia; B – New Zealand, Australia, Spain, United States; C – England, Scotland, Argentina, Uganda; D – Fiji, Samoa, Canada, Wales

HSBC World Sevens Series standing after first leg in Dubai 1 South Africa; 2 New Zealand; 3 England; 4 Fiji; 5 Australia; 6 Samoa; 7 Kenya; 8 Scotland; 9 France; 10 Spain; 11 Argentina; 12 Canada; 13 Wales; 14 Uganda; 15 United States; 16 Russia

FA%20Cup%20semi-final%20draw
%3Cp%3ECoventry%20City%20v%20Manchester%20United%C2%A0%3C%2Fp%3E%0A%3Cp%3EManchester%20City%20v%20Chelsea%3C%2Fp%3E%0A%3Cp%3E-%20Games%20to%20be%20played%20at%20Wembley%20Stadium%20on%20weekend%20of%20April%2020%2F21.%C2%A0%3C%2Fp%3E%0A
Skoda Superb Specs

Engine: 2-litre TSI petrol

Power: 190hp

Torque: 320Nm

Price: From Dh147,000

Available: Now

Islamophobia definition

A widely accepted definition was made by the All Party Parliamentary Group on British Muslims in 2019: “Islamophobia is rooted in racism and is a type of racism that targets expressions of Muslimness or perceived Muslimness.” It further defines it as “inciting hatred or violence against Muslims”.

How to wear a kandura

Dos

  • Wear the right fabric for the right season and occasion 
  • Always ask for the dress code if you don’t know
  • Wear a white kandura, white ghutra / shemagh (headwear) and black shoes for work 
  • Wear 100 per cent cotton under the kandura as most fabrics are polyester

Don’ts 

  • Wear hamdania for work, always wear a ghutra and agal 
  • Buy a kandura only based on how it feels; ask questions about the fabric and understand what you are buying
The President's Cake

Director: Hasan Hadi

Starring: Baneen Ahmad Nayyef, Waheed Thabet Khreibat, Sajad Mohamad Qasem 

Rating: 4/5

Jetour T1 specs

Engine: 2-litre turbocharged

Power: 254hp

Torque: 390Nm

Price: From Dh126,000

Available: Now

Indoor Cricket World Cup - Sept 16-20, Insportz, Dubai

The Vile

Starring: Bdoor Mohammad, Jasem Alkharraz, Iman Tarik, Sarah Taibah

Director: Majid Al Ansari

Rating: 4/5

Company profile

Name: Tratok Portal

Founded: 2017

Based: UAE

Sector: Travel & tourism

Size: 36 employees

Funding: Privately funded

Sleep Well Beast
The National
4AD

U19 WORLD CUP, WEST INDIES

UAE group fixtures (all in St Kitts)
Saturday 15 January: v Canada
Thursday 20 January: v England
Saturday 22 January: v Bangladesh

UAE squad
Alishan Sharafu (captain), Shival Bawa, Jash Giyanani, Sailles Jaishankar, Nilansh Keswani, Aayan Khan, Punya Mehra, Ali Naseer, Ronak Panoly, Dhruv Parashar, Vinayak Raghavan, Soorya Sathish, Aryansh Sharma, Adithya Shetty, Kai Smith

Biog

Mr Kandhari is legally authorised to conduct marriages in the gurdwara

He has officiated weddings of Sikhs and people of different faiths from Malaysia, Sri Lanka, Russia, the US and Canada

Father of two sons, grandfather of six

Plays golf once a week

Enjoys trying new holiday destinations with his wife and family

Walks for an hour every morning

Completed a Bachelor of Commerce degree in Loyola College, Chennai, India

2019 is a milestone because he completes 50 years in business

 

COMPANY PROFILE

Company name: SimpliFi

Started: August 2021

Founder: Ali Sattar

Based: UAE

Industry: Finance, technology

Investors: 4DX, Rally Cap, Raed, Global Founders, Sukna and individuals

COMPANY PROFILE

Name: Qyubic
Started: October 2023
Founder: Namrata Raina
Based: Dubai
Sector: E-commerce
Current number of staff: 10
Investment stage: Pre-seed
Initial investment: Undisclosed 

MANDOOB
%3Cp%3EDirector%3A%20Ali%20Kalthami%3C%2Fp%3E%0A%3Cp%3EStarring%3A%20Mohammed%20Dokhei%2C%20Sarah%20Taibah%2C%20Hajar%20Alshammari%3C%2Fp%3E%0A%3Cp%3ERating%3A%204%2F5%3C%2Fp%3E%0A%3Cp%3E%3C%2Fp%3E%0A
COMPANY%20PROFILE%20
%3Cp%3EName%3A%20DarDoc%3Cbr%3EBased%3A%20Abu%20Dhabi%3Cbr%3EFounders%3A%20Samer%20Masri%2C%20Keswin%20Suresh%3Cbr%3ESector%3A%20HealthTech%3Cbr%3ETotal%20funding%3A%20%24800%2C000%3Cbr%3EInvestors%3A%20Flat6Labs%2C%20angel%20investors%20%2B%20Incubated%20by%20Hub71%2C%20Abu%20Dhabi's%20Department%20of%20Health%3Cbr%3ENumber%20of%20employees%3A%2010%3C%2Fp%3E%0A
Know your cyber adversaries

Cryptojacking: Compromises a device or network to mine cryptocurrencies without an organisation's knowledge.

Distributed denial-of-service: Floods systems, servers or networks with information, effectively blocking them.

Man-in-the-middle attack: Intercepts two-way communication to obtain information, spy on participants or alter the outcome.

Malware: Installs itself in a network when a user clicks on a compromised link or email attachment.

Phishing: Aims to secure personal information, such as passwords and credit card numbers.

Ransomware: Encrypts user data, denying access and demands a payment to decrypt it.

Spyware: Collects information without the user's knowledge, which is then passed on to bad actors.

Trojans: Create a backdoor into systems, which becomes a point of entry for an attack.

Viruses: Infect applications in a system and replicate themselves as they go, just like their biological counterparts.

Worms: Send copies of themselves to other users or contacts. They don't attack the system, but they overload it.

Zero-day exploit: Exploits a vulnerability in software before a fix is found.

Updated: March 12, 2022, 4:30 AM