Industry Advisories

Global Modbus/TCP Probing Campaign Reinforces OT Exposure Risk

Written by Xona | Apr 27, 2026 5:46:09 PM

TLP: CLEAR No restrictions. Share freely. first.org/tlp.

TLDR: Summary

The threat posture for operational technology environments remains elevated as adversaries continue to identify and interact with exposed industrial systems. Recent reporting from Cato Networks described large-scale reconnaissance and exploitation attempts targeting Modbus-enabled industrial devices exposed over TCP port 502, including automated discovery and register enumeration activity. Separately, CISA and partner agencies warned that Iranian-affiliated actors are targeting internet-exposed PLCs across U.S. critical infrastructure with the intent to cause disruption.

These findings point to a broader issue than any single campaign: too many OT environments still expose critical assets or access pathways in ways that allow external actors to discover, fingerprint, and potentially interact with control systems. In many cases, the risk is not created by a novel exploit. It is created by reachable systems, legacy protocols, weak segmentation, unmanaged remote access, and limited visibility into who can access what.

For operators, the appropriate response is not simply to monitor for this campaign. It is to use the activity as a reason to validate whether PLCs, HMIs, engineering workstations, remote access tools, or vendor pathways remain reachable outside governed access controls. Any direct exposure of OT assets should be treated as a priority risk, even if there is no confirmed compromise.

Organizations should confirm that external access into OT is brokered through controlled gateways, bound to verified identity, limited by policy, monitored at the session level, and auditable for compliance and incident response. Where direct network access, shared credentials, persistent tunnels, or unmanaged vendor connections still exist, those pathways should be reviewed and removed or replaced.

What OT/ICS Leaders Need to Know

Security researchers have observed coordinated activity involving Modbus/TCP probing of internet-exposed industrial systems. Modbus/TCP is commonly associated with industrial control environments and often operates without native authentication or encryption, making direct internet exposure especially concerning.

CISA’s April 2026 joint advisory further reinforces the risk, warning that Iranian-affiliated actors are targeting internet-exposed PLCs and may maliciously interact with project files or manipulate information displayed through HMI and SCADA systems.

For OT leaders, the concern is not simply that adversaries are scanning. The concern is that exposed industrial systems may be discoverable, identifiable, and interactable before a traditional compromise is detected.

What This Campaign Confirms

The significance of this activity is not limited to the specific Modbus/TCP traffic observed. It confirms that exposed industrial protocols remain easy to discover, easy to fingerprint, and difficult for many organizations to monitor with confidence.

For OT operators, this should be viewed as an exposure validation event. If external systems can reach a PLC or industrial protocol directly, the organization has already ceded too much control over the interaction. The priority is not only to detect probing activity, but to remove the conditions that allow that probing to happen in the first place.

Why This Matters Beyond Modbus

Modbus/TCP is one example of a larger architectural issue. Many OT environments still rely on compensating controls around legacy protocols rather than preventing direct access to those protocols altogether.

That distinction matters. A firewall rule, VPN, or jump host may reduce exposure, but if the resulting session still gives a user or external system network-level reachability to the control environment, the risk has not been removed. It has been moved behind a different control.

The more resilient model is to prevent remote users and external systems from directly communicating with native OT protocols wherever possible. Access should be mediated through controlled sessions that are authenticated, time-bound, monitored, recorded, and limited to the specific operational task.

Top Risks to OT/ICS Environments

  1. Direct interaction with control assets When PLCs or industrial protocols are reachable from external networks, adversaries may be able to query, fingerprint, or interact with systems before exploitation occurs.

  2. Exposure of legacy protocols Protocols such as Modbus/TCP were not designed for today’s threat environment. When exposed directly, they create risk even without a known vulnerability.

  3. Unmanaged remote access pathways Persistent VPNs, vendor tunnels, shared credentials, and emergency access paths can create hidden routes into OT environments.

  4. Limited session visibility Network logs alone rarely provide enough detail to understand what a remote user or external system did inside an OT session.

  5. Weak governance and audit readiness If teams cannot show who accessed which systems, when, why, and under what controls, the organization faces both security and compliance exposure.

Top Actions Operators Should Take Now

  1. Audit for internet-exposed OT assets
    Confirm whether PLCs, HMIs, engineering workstations, remote access tools, or OT management interfaces are reachable from the internet.
  2. Remove direct inbound access to control systems
    Critical systems should not be directly reachable through open ports, exposed services, or unmanaged access paths.
  3. Centralize and govern remote access
    All external access into OT should pass through a controlled gateway with identity verification, access policy, and session oversight.
  4. Eliminate shared credentials and persistent tunnels
    Replace standing access with time-bound, role-based, least-privilege access.
  5. Monitor and record OT sessions
    Ensure remote activity can be reviewed, investigated, and demonstrated to auditors or incident response teams.
  6. Validate third-party and vendor access
    Review OEM, contractor, integrator, and emergency access pathways. These are often the quiet back doors nobody wants to own.
  7. Prepare rapid revocation procedures
    Operators should be able to quickly disable accounts, terminate sessions, and isolate access gateways if suspicious activity is detected.
  8. Can we prove that no PLCs, HMIs, engineering workstations, or OT management interfaces are directly reachable from the internet?
  9. Do we have a current inventory of all remote access pathways into OT, including vendor, OEM, contractor, and emergency access?
  10. Does remote access grant broad network-level reachability, or is it brokered through controlled, asset-specific sessions?
  11. Are all remote OT sessions authenticated, approved, monitored, recorded, and auditable?
  12. Can we quickly revoke access if a vendor account, credential, or remote access path is suspected of compromise?
  13. Do we have visibility into protocol-level interaction with critical systems, or only network connection logs?
  14. Can we demonstrate these controls to auditors, regulators, insurers, or executive leadership without manual reconstruction?

Questions OT/ICS Leaders Should Be Asking

Operators should use this activity to pressure-test their current OT access model and validate whether exposure exists beyond known or approved pathways.

If the answer to any of these questions is unclear, the organization should treat that uncertainty as a control gap.

Bottom Line

This activity should be treated as another clear signal that internet-exposed OT assets remain a persistent and preventable risk across critical infrastructure environments. The immediate point of reference is Cato Networks’ reporting on Modbus/TCP probing and interaction with exposed industrial systems, alongside CISA’s warning that internet-facing PLCs have been targeted in critical infrastructure environments.

The concern is not only that PLCs are being scanned. The deeper issue is that many industrial environments still allow external systems to discover, identify, and interact with control assets directly. In OT, that level of reachability creates risk well before exploitation occurs.

Operators should use this campaign as a prompt to validate their own exposure, review remote access pathways, and confirm that all external access into OT is brokered, authenticated, monitored, and governed. If an organization cannot clearly answer who can access critical systems, through which paths, and under what controls, then the exposure highlighted in this campaign is directly relevant.

The practical takeaway is straightforward: critical systems should not be reachable through direct network access. Remote access into OT should be identity-based, time-bound, session-controlled, and auditable from end to end.

This is no longer a question of whether adversaries are looking for exposed industrial systems. Public reporting and federal guidance show they are. The question for operators is whether their architecture gives those actors anything to find.

Frequently Asked Questions Modbus/TCP Risk