Over 54,000 Modbus devices are exposed to the internet right now. Here’s what attackers see, what they can do, and why your IT security tools miss it entirely.
Modbus TCP is the most commonly exposed industrial protocol on the internet. As of early 2026, Censys identifies over 54,770 internet-facing Modbus services, while Shodan indexes more than 33,000. These are not honeypots or research devices — they are production PLCs, RTUs, HMIs, and protocol gateways in water plants, power substations, manufacturing floors, and building management systems.
Originally designed in 1979 by Modicon for serial communication between controllers, Modbus was never intended to face the public internet. The protocol has no authentication, no encryption, and no access control. Every well-formed command is executed on receipt, from any source, without question.
That is not a vulnerability in the traditional sense. The protocol is working exactly as designed, just in a context its designers never imagined. Threat actors understand this better than most defenders do.
This brief walks through what an attacker actually sees when they find an exposed Modbus device, what they can do with that access, which campaigns have already exploited it, and why traditional IT security tools consistently miss these exposures.
Modbus has the largest internet-exposed footprint of any OT protocol. Research presented at IEEE Euro S&P 2025 examined 17 industrial protocols and found approximately 140,000 globally exposed ICS systems, with Modbus exposure growing steadily since 2021.
The numbers are not abstract:
These devices span energy, water and wastewater, manufacturing, oil and gas, and building automation. The exposure is not evenly distributed — Censys data shows Modbus exposure is heaviest in Europe, while the Fox (Niagara) protocol dominates in North America. The patterns are regional and sector-specific, not random. And the majority of asset owners are unaware their devices are reachable from the internet.
When a Modbus TCP service is exposed on port 502, an external scanner sees a device that will respond to any well-formed request without requiring credentials. There is no handshake, no authentication challenge, no session management. The protocol simply accepts commands.
A basic Shodan query — port:502 product:"Schneider Electric" — will return a list of internet-facing Schneider PLCs with their model numbers, firmware versions, and geographic locations. Similar queries work for Siemens, ABB, Wago, and other vendors. Nobody is breaking in here. The protocol is just doing what it does.
From the outside, an attacker can determine:
None of this requires an exploit or a CVE. There is no CVSS score to assign. The protocol is doing what it was built to do, and anyone with a TCP socket can talk to it.
Attackers have been systematically working through industrial protocols for over a decade. Stuxnet targeted Siemens S7 controllers via PROFIBUS in 2010. Industroyer hit Ukrainian power infrastructure via IEC-104 in 2016. TRITON went after Schneider Triconex safety systems via a proprietary protocol in 2017. Modbus — the most widely deployed and least authenticated of them all — was the obvious next step. In 2022, a state-sponsored group built an attack framework with Modbus as a core module. In 2024, Modbus was used to cause physical damage for the first time.
FrostyGoop is the first known ICS malware to use Modbus TCP to directly cause real-world physical impact, according to Dragos's analysis. Earlier ICS malware used other protocols: Stuxnet targeted Siemens S7 via PROFIBUS, Industroyer used IEC-104, and TRITON used a proprietary Triconex protocol. FrostyGoop's attack methodology relies entirely on Modbus TCP commands. Written in Golang and compiled as a Windows binary, the malware targeted ENCO controllers at a district energy facility in Lviv, Ukraine via port 502. (Dragos assessed the ENCO targeting with moderate confidence based on IP addresses found in an associated configuration file; the malware itself is not ENCO-specific and can target any Modbus-enabled device.)
The attackers manipulated heating system setpoints, cutting heat to over 600 apartment buildings — more than 100,000 residents in the Sykhiv district — for nearly two days in sub-zero winter temperatures. No malware was deployed to the controllers themselves. The attackers just spoke Modbus to devices that would accept commands from any source.
Initial access was gained on April 17, 2023, by exploiting an unknown vulnerability in a publicly accessible MikroTik router — no specific CVE has been publicly attributed. That gave the attackers roughly nine months of dwell time before the operational impact in January 2024. Palo Alto Unit 42's analysis found that FrostyGoop samples had been present on VirusTotal since at least October 2023 without triggering detections from any antivirus vendor.
Worth sitting with that for a moment: FrostyGoop did not exploit a software vulnerability in the PLCs. It just talked to them. The controllers did exactly what they were told because Modbus has no concept of “who is asking.”
And because the malware is not hardcoded to any specific vendor or device, every one of those 54,770+ internet-exposed Modbus services is a potential target for this exact attack methodology, as it exists today.
PIPEDREAM is a modular ICS attack framework attributed to the state-level threat group CHERNOVITE, as detailed in Dragos's CHERNOVITE whitepaper. Its CODECALL module (Dragos calls it EVILSCHOLAR) targets Schneider Electric PLCs using both Modbus and CODESYS protocols — scanning for devices, enumerating information, reading registers, and writing to coils and registers. Other modules target Omron PLCs (BADOMEN), OPC UA servers (MOUSEHOLE), and — critically — a Windows kernel driver exploit (LAZYCARGO) that handles gaining position on the host before the OT-facing modules talk to the PLCs. This is the full attack chain in one toolkit: compromise the Windows engineering workstation, then use it to speak Modbus to the controllers.
Mandiant, who tracked the same toolset under the name INCONTROLLER, called it “exceptionally rare and dangerous” because it targeted native industrial protocols without requiring vendor-specific engineering software. Dragos's analysis found PIPEDREAM can execute 38% of known ICS attack techniques and 83% of known ICS attack tactics per the MITRE ATT&CK for ICS framework.
PIPEDREAM was intercepted before it was used operationally — a rare case of discovering an ICS attack capability before deployment. But the investment tells you something: a state-sponsored group built a multi-module framework with Modbus as one of its core attack protocols. That capability does not go away.
Security researchers have demonstrated internet-based attacks against solar power infrastructure using open Modbus ports on power inverters and energy management systems. These attacks allow manipulation of energy production, disruption of grid-tied inverters, and falsification of monitoring data — in some cases within minutes of discovering exposed devices. The emergence of AI-driven scanning tools has accelerated the speed at which exposed Modbus services can be discovered and tested across large IP ranges.
Beyond the inherent insecurity of the protocol itself, specific implementation flaws continue to surface. In 2025, Cisco Talos fuzzed the Modbus protocol handling on a Socomec DIRIS M-70 IIoT power monitoring gateway and found multiple denial-of-service conditions triggered by malformed Modbus messages, resulting in six new CVEs. Separately, CISA advisory ICSA-25-238-03 addressed an improper input validation vulnerability (CVE-2025-6625) in Schneider Electric Modicon M340 controllers and associated communication modules, including Modbus/TCP Ethernet modules.
Traditional vulnerability scanners and IT-focused attack surface management tools consistently fail to detect exposed Modbus services:
OT-specific external attack surface management exists to fill exactly this gap. You need protocol-level scanning that actually understands industrial communication, not just TCP port enumeration.
Modbus exposure is an architecture failure, not a software bug you can patch. The protocol does exactly what it was designed to do. The problem is where it is doing it: on the public internet, where anyone can interact with it.
Over 54,000 Modbus devices are sitting on the internet right now. Nation-state groups have built custom tooling to talk to them. Ransomware operators are hitting the perimeter devices that provide network access to OT environments where these protocols run. And the exposure count keeps climbing.
The first step is knowing what is out there.
ShiftSix Security continuously discovers internet-exposed OT assets across critical infrastructure sectors. Request a complimentary external exposure assessment to see what attackers can see from the outside.
ShiftSix continuously discovers internet-exposed OT assets across critical infrastructure sectors.
Request a Complimentary AssessmentContinuous attack surface intelligence for IT, OT, and ICS environments — purpose-built for enterprise security teams and critical infrastructure operators.