Malware Intrusion and Data Leak
Major Causes of Data Breach
Malicious or criminal attack is highest reason

Data Leak Damage (in 100 million dollars)
Source : Ponemon 2018 Cost of a Data Breach Study
Malware Intrusion and Data Leak
Types and Means of Technology Leakage
Types of damages from technology leakage and theft (Multiple Responses, Units : %)

Method of leakage of technical information (Multiple Responses, Units : %)
Source : 2017 Survey on the level of technical protection of SMEs
by Ministry of Small and Medium Venture Business
Major Cause of Industrial System Malware
Removable data storage is still a major threat to security.

Source : Kaspersky 2018 ICS Report
Malware Intrusion and Data Leak
How many people would plug in a USB drive that they picked up on the street?
USB drive picked up on the street is used
by an employee on an in-house PC

(United States Computer Emergency Readiness Team) conducted an experiment
on security staff. ‘How easily hackers can access the system through employees’.
The experiment was to drop a USB drive into the parking lot of the security
department and see if the employees were using it on the in-house PC.
What was the result?
About 60% of them used a USB drive which fell to the ground, and 90% used
a USB drive or CD with official logo of DHS. I forgot all the risks that there
might be malware in the USB and used it on my PC.
The biggest security vulnerability is the employee’s “idiocy”.
Malware Intrusion and Data Leak
A Single Malware Infection
Can Cause Catastrophic Damage

with malware spread via USB drive
Two US power plant networks were infected with malware that was spread by a USB drive plugged in by a subcontractor, who wanted to check on production facilities.
The malware affected 10 PCs in the turbine management system and system downtime, which caused a 3-week delay in system restart.
Supervisory Control and Data Acquisition (SCADA) or Industrial Control System (ICS), that is, industrial control systems are especially vulnerable to immediate threats of machine interruption or remote attack. Malware infection path was a USB port this time, but all other data ports were equally vulnerable.
See articles >
Malware Intrusion and Data Leak
Can we stop one small act of thoughtlessness?

bans disks, USB drives
An example of a cyber attack designed to destroy nuclear centrifuges is the Stuxnet worm attack, which infected the Supervisory Control and Data Acquisition (SCADA) system at Iran’s Bushehr nuclear power plant. Through a USB drive, malicious codes spread throughout the internal network, infecting more than 60,000 PCs and halting the plant’s operation for two years.
Many companies, including power plants, the military and others, have already taken measures to prohibit the use of removable data storage devices such as DISK and CDs for increased cyber security.
Malware Intrusion and Data Leak
More popular and closer attack methods
Do you know the USB KILLER?

This easily accessible product is designed to rapidly collect current from the USB power source. Once fully charged, it releases the high voltage and burns all of the circuits, effectively “killing” the computer.

In one case, the owner of a local PC Cafe intentionally damaged approximately 40 PCs of a competitor using the USB Killer.

Recently, in April 2019, a college student in the U.S. used a USB Killer on his school system, causing $58,000 in damage. .
Smart Keeper
There will be more and more cases similar to these, and the damage to companies will increase. Do you still think cyber security is just about software? Physical cyber security is now a must, not a choice.
- COMXI Co., Ltd.
- Headquarters : B-1904, Hyundai Knowledge Industrial Center 70,
Dusan-ro, Geumcheon-gu, Seoul, South Korea - PHONE : +82-2-554-9099
- EMAIL : Global_sales@comxi.com
- Headquarters : B-1904, Hyundai Knowledge Industrial Center 70,
-
- USA Office : P.O. Box 2851, Glen Allen, VA 23058-2851  
- PHONE : 1-804-299-5234
- EMAIL : info@comxiworld.com
Major Products
Download Catalog+
Copyright © 2019 Comxi Co., Ltd. All rights reserved.