Case Study

Healthcare Customer Detects Infected IOT Devices

Healthcare Customer Detects Infected IOT Devices

Pages 1 Pages

© 2018 Attivo Networks. All rights reserved. Attivo Networks, ThreatDefend, and ThreatPath are registered trademarks of Attivo Networks, Inc. 062018 www.attivonetworks.com Follow us on Twitter @attivonetworks CASE STUDY HEALTHCARE CUSTOMER DETECTS INFECTED IOT DEVICES S.NO SEVERITY TIMESTAMP ATTACKER IP TARGET HOST TARGET IP TARGET OS VLAN ATTACK DESRCIPTION ATTACK DETAILS 1 MEDIUM "2017-09-14T23:25:23.5712" . "" . "" "650" "ARP FLOOD" "VLAN-ID=650 SRC-IP= 2 MEDIUM "2017-09-14T17:46:55.8582" . "WINDOWS7-1" . "WINDOWS 7" "2520" "DROPPED FILE PROCESS EXIT" "SUSPECT PROCESS [\DEVICE\HARDDISKVOLUME2\ 3 MEDIUM "2017-09-14T15:26:34.9672" . "WINDOWS7-1" . "WINDOWS 7" "1830" "DROPPED FILE PROCESS EXIT" "SUSPECT PROCESS [\DEVICE\HARDDISKVOLUME2\ 4 MEDIUM "2017-09-14T12:50:37.1082" . "WINDOWS7-1"

Join for free to read