Deception and Forensics for the Next Generation — Part 5: Phantom Attacker
SecureWorld News
AUGUST 2, 2020
The thing that jumps out at me is the operating system because there is no VoIP running on our test network. First, the attacker could be a rogue machine running a VoIP OS. Another possibility is that it is a legitimate device that just happens to be running VoIP. 222 are virtual machine interfaces—decoys created by the BOTsink.
Let's personalize your content