<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[(catonetworks.com) Global Modbus&#x2F;TCP Campaign Targets Internet-Exposed PLCs Across 70 Countries with China-Geolocated Infrastructure Observed]]></title><description><![CDATA[<p>(catonetworks.com) Global Modbus/TCP Campaign Targets Internet-Exposed PLCs Across 70 Countries with China-Geolocated Infrastructure Observed</p><p>Global campaign targets internet-exposed Modbus/TCP PLCs across 70 countries, with China-geolocated infrastructure observed executing high-risk write operations and DoS-like bulk reads.</p><p>In brief - Cato Networks identified a large-scale campaign probing 14,426 Modbus/TCP PLCs globally, with manufacturing (18%) as the top sector. Reconnaissance included automated fingerprinting and 3,240 Write Multiple Registers (0x10) attempts, while bulk reads suggest disruption intent. A subset of China-linked IPs used rare expanded device identification.</p><p>Technically - The campaign employed Modbus/TCP function codes 0x03 (Read Holding Registers, ~235.5K requests) and 0x10 (Write Multiple Registers, 3,240 requests) with consistent parameters (e.g., starting at 0x0BB8). Scripted sequences paired 0x2B/0x0E (payload 0100/0200) for device ID with fixed 0x03 reads. Six China-geolocated IPs used payload 0200, a rare expanded identification method. Bulk reads near the 125-register limit (~158.1K against one target) align with resource exhaustion tactics. MITRE ATT&amp;CK for ICS PoC (Wildcat Dam) demonstrated physical impact via register manipulation.</p><p>Source: <a href="https://www.catonetworks.com/blog/global-campaign-discovered-with-modbus-plcs-targeted/" rel="nofollow noopener"><span>https://www.</span><span>catonetworks.com/blog/global-c</span><span>ampaign-discovered-with-modbus-plcs-targeted/</span></a></p><p><a href="https://swecyb.com/tags/Cybersecurity" rel="tag">#<span>Cybersecurity</span></a> <a href="https://swecyb.com/tags/ThreatIntel" rel="tag">#<span>ThreatIntel</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/70ce98ca-a00c-4ffb-9e50-6882867cb34e/catonetworks.com-global-modbus-tcp-campaign-targets-internet-exposed-plcs-across-70-countries-with-china-geolocated-infrastructure-observed</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 08:37:45 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/70ce98ca-a00c-4ffb-9e50-6882867cb34e.rss" rel="self" type="application/rss+xml"/><pubDate>Thu, 23 Apr 2026 07:39:35 GMT</pubDate><ttl>60</ttl></channel></rss>