C&C
The attacker uses the MODBUS/TCP protocol, which typically operates on port 502, to establish Command and Control between the compromised machines. By utilizing this widely-used industrial protocol, the attacker avoids raising suspicion, as MODBUS traffic is considered normal within many industrial control system (ICS) environments.
There are no views created for this resource yet.
Additional Information
| Field | Value |
|---|---|
| Data last updated | September 10, 2025 |
| Metadata last updated | September 10, 2025 |
| Created | September 10, 2025 |
| Format | CSV |
| License | Open Data Commons Open Database License (ODbL) |
| Datastore active | False |
| Has views | False |
| Id | 18a56ccf-d186-4838-a30b-dbebeba4d760 |
| Mimetype | text/csv |
| Package id | ff293242-dc9a-4e25-8670-6cb2f550d475 |
| Position | 5 |
| Size | 9.6 MiB |
| State | active |
| Url type | upload |