实例探究 > Attivo Networks Deception Platform for Forensics and Incident Response

Attivo Networks Deception Platform for Forensics and Incident Response

公司规模
1,000+
地区
  • America
国家
  • United States
产品
  • Attivo Networks ThreatDefend™
  • BOTsink
技术栈
  • Deception Platform
  • Engagement Server
实施规模
  • Enterprise-wide Deployment
影响指标
  • Cost Savings
  • Customer Satisfaction
  • Productivity Improvements
技术
  • 网络安全和隐私 - 入侵检测
  • 网络安全和隐私 - 恶意软件保护
适用行业
  • 医疗保健和医院
适用功能
  • 商业运营
用例
  • 入侵检测系统
  • 远程资产管理
  • 远程控制
服务
  • 网络安全服务
  • 系统集成
关于客户
The customer in this case study is a regional healthcare provider located on the Eastern Seaboard of the United States. This healthcare provider operates multiple hospital locations and is responsible for the health and well-being of a large number of patients. As a healthcare provider, they handle sensitive patient data and are subject to strict regulatory requirements regarding data protection and privacy. The organization has a significant IT infrastructure to support its operations, including numerous endpoint devices and legacy systems. Given the critical nature of their services, maintaining the security and integrity of their network is of utmost importance. The healthcare provider's information security team is tasked with protecting this infrastructure from cyber threats and ensuring compliance with healthcare regulations.
挑战
In early 2016, a regional healthcare provider experienced a cyberattack that had the characteristics of Qakbot, an extremely aggressive form of malware popular in 2011. While Qakbot had appeared to be eradicated, it recently resurfaced with new strains and unknown signatures. Known for its polymorphic behavior, Qakbot spreads quickly through a network to steal critical data from its target. The attack started on a few endpoint machines and while the organization’s traditional security measures were able to detect anomalies the information security team could not action the alerts as they were not specific enough. As more alerts surfaced, they became suspicious and deployed cybersecurity devices to gain additional visibility to the legacy domain in their network. Once these devices were in operation, they raised a large number of high-level alerts, revealing a full Qakbot attack that was rapidly spreading through their network. With several new machines becoming infected every few minutes, the team knew they needed to immediately execute an incident response plan, but needed information to remediate. They needed to know where the malware came from, how it was moving laterally through their network, what credentials the malware had compromised, and much more.
解决方案
The information security team had exhausted traditional measures to identify the malware but remained unable to conclusively identify the attack. Luckily, the regional healthcare provider was completing a proof of value (POV) of the Attivo Networks ThreatDefend™ platform and had deployed an engagement server on multiple VLANs in their network. Having seen the BOTsink’ solution’s analysis and forensic capabilities, the security team detonated Qakbot inside of the deployed Deception Platform. As the malware moved laterally within the Attivo analysis engine, the Deception Platform showed which user accounts were used to deliver and execute the payload, exactly where the files were dropped, what processes were responsible for infection and lateral movement, and what the malware’s next steps would be. With detailed attack analysis and forensics, the information security team limited the spread of Qakbot through their network, block external communication to command and control, and wipe the virus off the already infected end-point devices. Additionally, now that they knew the attacker’s signatures, they were well equipped to prevent Qakbot and similar strains from penetrating their network in the future.
运营影响
  • The security team spent several days trying to remediate the malware without the necessary information to do so. Infecting the BOTsink solution decoys had an immediate positive effect on their visibility into the issue. By installing the malware into the decoys, the security team was able to understand its nature, how it communicated with Command and Control, what changes it made to different Windows OSes, and more.
  • Before the team used the BOTsink solution, the malware was able to spread, but with detailed attack forensics the BOTsink solution provided, the team was not only able to provide the AV vendor with a detailed report of the malware but more importantly, they were able to contain the outbreak and prevent further propagation.
  • Because the malware was infecting several new machines every few minutes, the ability to save days of work by using the ThreatDefend Platform was a momentous success. The organization was able to drastically reduce the number of infected machines in their network, stop data exfiltration, and, accordingly, saved significant money given that each stolen patient record costs an average of $363 for healthcare organizations.
  • When asked about the experience, the regional healthcare provider shared that they really wished that they would have had the Attivo Networks Deception solution on that VLAN. If they had, they would have saved significant time and energy in their initial assessment of the attack. They also shared that by the time their on-call Incident Response team landed, they had already identified and contained the attack, a true testament to the speed and efficiency of the Attivo Networks ThreatDefend platform.
数量效益
  • The organization was able to drastically reduce the number of infected machines in their network.
  • The organization saved significant money given that each stolen patient record costs an average of $363 for healthcare organizations.

Case Study missing?

Start adding your own!

Register with your work email and create a new case study profile for your business.

Add New Record

相关案例.

联系我们

欢迎与我们交流!
* Required
* Required
* Required
* Invalid email address
提交此表单,即表示您同意 IoT ONE 可以与您联系并分享洞察和营销信息。
不,谢谢,我不想收到来自 IoT ONE 的任何营销电子邮件。
提交

感谢您的信息!
我们会很快与你取得联系。