China clears Synopsys's US$35 billion Ansys buyout in US win
The State Administration for Market Regulation gave the acquisition a green light, with certain conditions, the agency said in a statement. Among other things, the Chinese watchdog mandated that Synopsys cannot reject requests from customers to renew their contracts.
Washington this year briefly considered limiting Synopsys and its rivals from dealing with Chinese clients on the grounds of national security.
Synopsys and Cadence Design Systems – the two American firms that dominate the global market for software tools used to design chips – got drawn into the Washington-Beijing trade war this year. The US imposed a licensing requirement that would've limited exports of their products, part of its response to Beijing's limits on rare earths, before abruptly lifting that mandate weeks later.
Following Beijing's decision, Synopsys has cleared one of the last major hurdles to a deal to intended to shore up its market position. The buyout, announced in early 2024, was already approved by European and US authorities. In June, reports emerged that Chinese officials were delaying it in part because of escalating tensions over Washington's chip sanctions.
Synopsys shares rose as much as 3.7 per cent in premarket trading on Monday. They have risen about 15 per cent so far this year.
US companies seeking Chinese antitrust approval – particularly for deals in the tech sector – are often caught in the middle of geopolitical disputes between the countries. The companies needed Beijing's sign off because China is one of the world's largest semiconductor markets.
In 2018, US-based Qualcomm scrapped a US$44 billion bid for Dutch chipmaker NXP Semiconductors after failing to secure a nod in time. As recently as 2023, Intel Corp. abandoned its proposed US$5.4 billion acquisition of Tower Semiconductor for the same reason.
Broadcom's US$61 billion merger with software maker VMware eventually went through, although investors remained on edge throughout the process due to speculation that China would hold up the deal. BLOOMBERG
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


CNA
an hour ago
- CNA
Chinese automakers should pursue 'rational competition' in EV industry, official says
BEIJING :Major automakers should push for "rational competition" in the electric vehicle industry, a senior Chinese official said on Thursday (Jul 17), according to a statement from the industry ministry published on Friday. The comments from Che Jun, head of a Communist Party central leading group, came a day after China's cabinet pledged to regulate what it called "irrational" competition in the EV market and vowed to strengthen price-monitoring. Che Jun spoke at a meeting attended by officials from the industry ministry and representatives from automakers BYD and BAIC Group. Authorities in China have urged companies to stop excessive competition in the auto industry and in more recent regulatory comments, described such competition as "irrational." On Friday, China's industry ministry, market regulator and state planner jointly held a separate meeting on the EV industry's development with representatives from 17 key auto enterprises, automobile industry association and local officials.


New Paper
3 hours ago
- New Paper
What is UNC3886? Inside the state-linked group attacking S'pore's critical information infrastructure
Singapore's critical information infrastructure has come under attack from cyber espionage group UNC3886. A state-linked advanced persistent threat (APT) actor, it is a menace to national security in many countries, including Singapore. Naming the nation's attacker for the first time on July 18, Coordinating Minister for National Security K. Shanmugam said: "UNC3886 poses a serious threat to us, and has the potential to undermine our national security. Even as we speak, UNC3886 is attacking our critical infrastructure right now." What is UNC3886? Are essential services in Singapore safe from the attack? The Straits Times answers questions about the attack and APTs. 1. Who is UNC3886? First detected in 2022 by cyber security firm Mandiant, UNC3886 is a China-linked cyber espionage group. UNC3886's attempts are known to be persistent, with the intention of intelligence gathering and long-term spying. The "UNC" label stands for "uncategorised" or "unclassified" as industry analysts have not formally classified it. "This does not mean that it is any less of a threat," said Mr Shanmugam. 2. How does UNC3886 operate? Mr Vivek Chudgar, managing director of cyber security firm Mandiant Consulting in Asia Pacific and Japan, described UNC3886 as highly adept. "UNC3886 operates in a sophisticated, cautious and evasive nature," he said, adding that the group largely focuses on defence, technology and telecommunication organisations in the US and Asia. The Chinese espionage group is known to target network devices, virtualisation systems and critical information infrastructure with zero-day exploits. Zero-day exploits are attacks that take advantage of security vulnerabilities in software that vendors have yet to develop patches for. Unpatched vulnerabilities in the software of network devices, hypervisors, and virtual machines are typically harder to monitor, said Mr Chudgar. UNC3886 also employs custom malware and tools available on the victim's system to evade detection. Like other APT attackers, UNC3886 is persistent in that even if detected and removed from the network, it will attempt to re-enter the target networks. 3. What cyber attacks has UNC3886 been responsible for? Mr Chudgar said UNC3886 has attacked organisations in the United States, Europe, and parts of Asia. Specifically, it has targeted sectors such as government, telecommunication, technology, aerospace, defense, energy and utility. "UNC3886 poses a severe threat to national security for the organisations and the countries targeted," he added. The Chinese espionage group has exploited vulnerabilities in routers from Juniper Networks, network security devices from Fortinet and virtual machines from VMware. 4. Are essential services in Singapore safe from the attack? On July 18, the Cyber Security Agency said that UNC3886's activities have been detected in parts of Singapore's critical information infrastructure that power essential services. "We have been investigating UNC3886's activities," said CSA, which is leading the investigations. The agency said it is monitoring all critical services sectors and sharing threat intelligence, but did not name the affected sectors. Singapore's 11 critical services sectors are: energy, water, finance, healthcare, transport, government, infocomm, media as well as security and emergency services. The agency is also working closely with other government bodies and partners to support the unnamed affected organisations. CSA also did not say how long UNC3886 has been in the affected networks, saying instead: "These attacks are often protracted campaigns and CSA will need to preserve operational security by not disclosing further information at this stage." 5. What other APT attacks have hit Singapore? In 2014, the authorities detected a security breach in the Ministry of Foreign Affairs' technology systems. Steps were taken to isolate the affected devices and the networks were strengthened following the discovery. In what was the first sophisticated attack against universities here, National University of Singapore and the Nanyang Technological University discovered intrusions in their networks in 2017. No classified data or student personal data was stolen. But the attackers were believed to have targeted the two institutions to steal government and research data. The varsities were involved in government-linked projects for the defence, foreign affairs and transport sectors. Then in 2018, Singapore experienced its worst data breach involving the personal particulars of 1.5 million patients, including then Prime Minister Lee Hsien Loong. The attacker in the SingHealth breach was said to be persistent in its efforts to penetrate the network, bypass the security measures and illegally access and exfiltrate data. The attacker is believed to have lurked in the healthcare group's network for at least nine months. Its mission: to access SingHealth's electronic medical records system, a critical information infrastructure in Singapore. The unauthorised transfer of sensitive data took place in 2018. Most recently in 2024, about 2,700 devices in Singapore were discovered to have been infected after CSA took part in a cyber operation against a global botnet. APT hackers behind the botnet exploited poor cyber hygiene practices to infect devices, including baby monitors and internet routers. No critical information infrastructure was affected by the attack.

Straits Times
3 hours ago
- Straits Times
DPM Gan heads to US to deepen trade and tech ties
During the visit, DPM Gan is scheduled to meet with US Cabinet secretaries, members of Congress, and leaders from the business and financial communities. SINGAPORE - Deputy Prime Minister and Minister for Trade and Industry Gan Kim Yong will visit the United States from July 20 to 26 to deepen economic cooperation and strengthen bilateral ties between Singapore and the US. 'The visit will build on and keep up the robust and multifaceted partnership between Singapore and the US, including our substantive and mutually beneficial economic and commercial relationship,' the Ministry of Trade and Industry (MTI) said in a statement on July 18. The ministry added: 'Our growing collaboration in emerging areas such as technology and energy complements our strong defence, security and people-to-people ties.' The US was Singapore's second-largest trading partner in 2024, while Singapore ranked as the 16th-largest trading partner for the US. Singapore is also the third-largest Asian investor in the US, with more than 250 Singaporean companies operating across 45 states. Singapore investments support around 350,000 jobs in the US and the US has had a consistent and longstanding trade surplus with Singapore, MTI said. Singapore has $76.5 billion in direct investment stock in the US as at 2022. Conversely, the US remains the top investor in Singapore, with foreign direct investment stock reaching $555.5 billion in 2023. Singapore is the top recipient of US investment in the Indo-Pacific. There are nearly 6,000 US companies in Singapore, which is positioned as a gateway to Asean for these businesses. These are mainly in the financial, insurance, manufacturing, wholesale and retail trade sectors. Top stories Swipe. Select. Stay informed. Singapore Critical infrastructure in S'pore under attack by cyber espionage group: Shanmugam Singapore Who is UNC3886, the group that attacked Singapore's critical information infrastructure? Singapore Alleged Kpod peddler filmed trying to flee raid in Bishan charged with 6 offences Asia Indonesia court jails former trade minister for 4½ years in sugar graft case Singapore Singapore police in contact with Indonesian authorities over baby trafficking allegations Singapore NTU upholds zero grade for student accused of using AI in essay; panel found 14 false citations or data Singapore 30% of aviation jobs could be redesigned due to AI, automation; $200m fund to support workers: CAAS Singapore Former NUH male nurse faces charges after he allegedly molested man at hospital DPM Gan will begin his trip in New York on July 21 before heading to Washington for the remainder of the week. During the visit, he is scheduled to meet US Cabinet secretaries, members of Congress, and leaders from the business and financial communities. He will also speak at a business roundtable hosted by the US Chamber of Commerce, where he will address international and regional economic developments, and explore new areas for collaboration between American and Singaporean companies. Officials from MTI, the Ministry of Foreign Affairs and the Monetary Authority of Singapore will accompany Mr Gan on the trip.