C&C
The attacker uses the MODBUS/TCP protocol, which typically operates on port 502, to establish Command and Control between the compromised machines. By utilizing this widely-used industrial protocol, the attacker avoids raising suspicion, as MODBUS traffic is considered normal within many industrial control system (ICS) environments.
There are no views created for this resource yet.
Additional Information
| Field | Value |
|---|---|
| Data last updated | 10 سپتامبر 2025 |
| Metadata last updated | 10 سپتامبر 2025 |
| Created | 10 سپتامبر 2025 |
| Format | CSV |
| لایسنس | Open Data Commons Open Database License (ODbL) |
| Datastore active | False |
| Has views | False |
| Id | 18a56ccf-d186-4838-a30b-dbebeba4d760 |
| Mimetype | text/csv |
| Package id | ff293242-dc9a-4e25-8670-6cb2f550d475 |
| Position | 5 |
| Size | 9.6 MiB |
| State | active |
| Url type | upload |