Interesting. I recall reading a book called the Cuckoo’s Egg which described one of the first tracking of Spy hacking of computers which used modems to gain access.
Modems are still used extensively for “out-of-band” communication, such as when a high-speed link to a remote datacenter fails; the telephone network is often more robust than broadband, even in the business world. Also, modems are usually hooked directly to servers, bypassing firewalls and other security controls.
Hackers who ignore 50,000,000 Macs because the target is too small are infecting... modems?
Well... we know the answer to that... it was much easier for them to attack the modems and "get results" than it was to attack the Apple Macintosh machines and get results... LOL...
There are still FReepers on modems, and I suspect a large number of users outside the most modern countries in the world are on them as well.