US dollar exodus to unleash $3.2 trillion ‘avalanche' of selling, currency analyst says
US dollar exodus to unleash $3.2 trillion 'avalanche' of selling, currency analyst says
Singapore - The US dollar may face a US$2.5 trillion (S$3.2 trillion) 'avalanche' of selling as Asian countries unwind their stockpile of the world's reserve currency, according to currency analyst Stephen Jen.
Asian exporters and investors may have amassed an 'extremely large' pile of dollars through the years, widening the region's trade surplus with the United States, Eurizon SLJ Capital's Mr Jen and Ms Joana Freire wrote in a note on May 7.
As a US-led trade war deepens, some Asian investors might repatriate chunks of funds or ramp up levels of protection against a weakening dollar – potentially triggering an exodus from the world's reserve currency.
'We suspect these dollar hoardings by Asian exporters and institutional investors may be extremely large – possibly on the order of US$2.5 trillion or so – and pose sharp downside risks to the dollar vis-à-vis these Asian currencies,' they wrote.
The greenback's long-term appeal is coming under threat as Donald Trump's efforts to remake the global trade order prompt investors to reconsider their US exceptionalism trade strategies. An outsized jump in the Taiwan dollar on May 5 added to speculation that Asia's policymakers may be prepared to let their currencies appreciate versus the dollar as part of efforts to secure a trade deal with the US.
Bloomberg's dollar gauge has dropped about 8 per cent from a February high and all Asian currencies have strengthened versus the greenback in the past one month.
Mr Jen, known for his work on the 'dollar smile' theory, had previously said about US$1 trillion could flow back to the world's No. 2 economy as Chinese companies sell their dollar-denominated assets when the Federal Reserve cuts interest rates.
Accelerating the multi-trillion dollar flows may be 'naked long-dollar positions' prevalent among Asian countries that run large external surpluses, he wrote, referring to positions that are not hedged against fluctuations in the dollar. Some of these countries include China, Taiwan, Malaysia and Vietnam.
There is an 'important imbalance in the world that puts the dollar in a vulnerable position,' Mr Jen wrote in the latest report. BLOOMBERG
Join ST's Telegram channel and get the latest breaking news delivered to you.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


CNA
5 hours ago
- CNA
KKR in talks to buy ST Telemedia Global Data Centres, Bloomberg News reports
KKR is in talks to buy ST Telemedia Global Data Centres in a deal that could value the Asian digital infrastructure provider at more than $5 billion, Bloomberg News reported on Saturday, citing people familiar with the matter. Reuters could not immediately verify the report.

Straits Times
8 hours ago
- Straits Times
Indian firm says it shipped non-military explosives to Russia
NEW DELHI - An Indian firm that shipped $1.4 million worth of an explosive compound with military uses to Russia in December said on Saturday it complies with Indian rules and the substance it had shipped was for civilian industrial purposes. Reuters reported on July 24 that Ideal Detonators Private Limited shipped the compound, known as HMX or octogen, to two Russian explosives manufacturers despite U.S. threats to impose sanctions on any entity supporting Russia's Ukraine war effort. One of the Russian companies listed in Indian customs data as receiving the compound is the explosives manufacturer Promsintez. An official at Ukraine's SBU security service has said the Russian company has ties to the military and that Ukraine launched a drone attack in April against a Promsintez-owned factory. Promsintez did not respond to a request for comment. Ideal Detonators said in an emailed response to Reuters that the material it shipped was not military grade. "The shipment ... is for industrial activity and it's a civil explosive," the company said. The U.S. government has identified HMX as "critical for Russia's war effort" and has warned financial institutions against facilitating any sales of the substance to Moscow. The U.S. Treasury Department has the authority to sanction those who sell HMX and similar substances to Russia, sanctions lawyers have said. Top stories Swipe. Select. Stay informed. Singapore Woman taken to hospital after car falls into sinkhole on Tanjong Katong Road Singapore Students hide vapes in underwear, toilet roll holders: S'pore schools grapple with vaping scourge Singapore 'I've tried everything': Mum helpless as son's Kpod addiction spirals out of control Singapore NDP 2025: How Benjamin Kheng is whisked from Marina Bay to Padang in 10 minutes by boat, buggy Singapore Almost half of planned 30,000 HDB flats in Tengah to be completed by end-2025: Chee Hong Tat Singapore From libraries to living rooms: How reading habits take root in underserved S'pore children Asia Thai-Cambodia clashes spread along frontier as death toll rises Asia Thousands rally in downtown Kuala Lumpur for resignation of PM Anwar HMX is widely used in missile and torpedo warheads, rocket motors, exploding projectiles and plastic-bonded explosives for advanced military systems, according to the Pentagon's Defense Technical Information Center and related defense research programs. The compound also has some limited civilian applications in mining and other industrial activities. REUTERS

Straits Times
13 hours ago
- Straits Times
Microsoft probing whether cyber alert tipped off Chinese hackers
Find out what's new on ST website and app. Microsoft is looking into whether a leak from its early alert system led to the widespread exploitation of vulnerabilities in the SharePoint software. Microsoft is investigating whether a leak from its early alert system for cybersecurity companies allowed Chinese hackers to exploit flaws in its SharePoint service before they were patched, according to people familiar with the matter. The technology company is looking into whether the programme – designed to give cybersecurity experts a chance to fix computer systems before the revelation of new security concerns – led to the widespread exploitation of vulnerabilities in its SharePoint software globally over the past several days, the people said, asking not to be identified discussing private matters. 'As part of our standard process, we'll review this incident, find areas to improve, and apply those improvements broadly,' a Microsoft spokesperson said in a statement, adding that partner programmes are an important part of the company's security response. The Chinese embassy in Washington referred to comments made by foreign affairs ministry spokesman Guo Jiakun to media earlier this week, opposing hacking activities. 'Cybersecurity is a common challenge faced by all countries and should be addressed jointly through dialogue and cooperation,'' Mr Guo said. 'China opposes and fights hacking activities in accordance with the law. At the same time, we oppose smears and attacks against China under the excuse of cybersecurity issues.' Microsoft has attributed SharePoint breaches to state-sponsored hackers from China , and at least a dozen Chinese companies participate in the initiative, called the Microsoft Active Protections Program, or MAPP, according to Microsoft's website. Members of the 17-year-old programme must prove they are cybersecurity vendors and that they don't produce hacking tools like penetration testing software. After signing a non-disclosure agreement, they receive information about novel patches to vulnerabilities 24 hours before Microsoft releases them to the public. A subset of more highly-vetted users receive notifications of an incoming patch five days earlier, according to Microsoft's MAPP website. Mr Dustin Childs, head of threat awareness for the Zero Day Initiative at cybersecurity company Trend Micro, says Microsoft alerted members of the program about the vulnerabilities that led to the SharePoint attacks. 'These two bugs were included in the MAPP release,' says Mr Childs, whose company is a MAPP member. 'The possibility of a leak has certainly crossed our minds.' He adds that such a leak would be a dire threat to the program, 'even though I still think MAPP has a lot of value'. Victims of the attacks now total more than 400 government agencies and corporations worldwide, including the US's National Nuclear Security Administration, the division responsible for designing and maintaining the country's nuclear weapons. For at least some of the attacks, Microsoft has blamed Linen Typhoon and Violet Typhoon, groups sponsored by the Chinese government, as well as another China-based group it calls Storm-2603. In response to the allegations, the Chinese Embassy has said it opposes all forms of cyberattacks, while also objecting to 'smearing others without solid evidence'. Mr Dinh Ho Anh Khoa, a researcher who works for the Vietnamese cybersecurity firm Viettel, revealed that SharePoint had unknown vulnerabilities in May at Pwn2Own, a conference in Berlin run by Mr Childs' organisation where hackers sit on stage and search for critical security vulnerabilities in front of a live audience. After the public demonstration and celebration, Mr Khoa headed to a private room with Childs and a Microsoft representative, Mr Childs said. Mr Khoa explained the exploit in detail and handed over a full white paper. Microsoft validated the research and immediately began working on a fix. Mr Khoa won US$100,000 (S$128,160) for the work. It took Microsoft about 60 days to come up with a fix. On July 7, the day before it released a patch publicly, hackers attacked SharePoint servers, cybersecurity researchers said. It is possible that hackers found the bugs independently and began exploiting them on the same day that Microsoft shared them with MAPP members, says Mr Childs. But he adds that this would be an incredible coincidence. The other obvious possibility is that someone shared the information with the attackers. The leak of news of a pending patch would be a substantial security failure, but 'it has happened before,' says Mr Jim Walter, senior threat researcher the cyber firm SentinelOne. MAPP has been the source of alleged leaks as far back as 2012, when Microsoft accused the Hangzhou DPtech Technologies, a Chinese network security company, of disclosing information that exposed a major vulnerability in Windows. Hangzhou DPtech was removed from the MAPP group. At the time, a Microsoft representative said in a statement that it had also 'strengthened existing controls and took actions to better protect our information'. In 2021, Microsoft suspected at least two other Chinese MAPP partners of leaking information about vulnerabilities in its Exchange servers, leading to a global hacking campaign that Microsoft blamed on a Chinese espionage group called Hafnium. It was one of the company's worst breaches ever – tens of thousands of exchange servers were hacked, including at the European Banking Authority and the Norwegian Parliament. Following the 2021 incident, the company considered revising the MAPP program, Bloomberg previously reported. But it did not disclose whether any changes were ultimately made or whether any leaks were discovered. A 2021 Chinese law mandates that any company or security researcher who identifies a security vulnerability must report it within 48 hours to the government's Ministry of Industry and Information Technology, according to an Atlantic Council report. Some of the Chinese companies that remain involved in MAPP, such as Beijing CyberKunlun Technology, are also members of a Chinese government vulnerabilities programme, the China National Vulnerability Database, which is operated by the country's Ministry of State Security, according to Chinese government websites. Mr Eugenio Benincasa, a researcher at ETH Zurich's Center for Security Studies, says there is a lack of transparency about how Chinese companies balance their commitments to safeguard vulnerabilities shared by Microsoft with requirements that they share information with the Chinese government. 'We know that some of these companies collaborate with state security agencies and that the vulnerability management system is highly centralised,' says Mr Benincasa. 'This is definitely an area that warrants closer scrutiny.' BLOOMBERG