Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Diesel Vortex Targets Logistics Sector, Steals Credentials

Diesel Vortex Targets Logistics Sector, Steals Credentials

Posted on February 24, 2026 By CWS

A cybercrime organization linked to Russia, known as Diesel Vortex, has conducted an extensive phishing scheme targeting freight and trucking companies across the United States and Europe. This operation took place from September 2025 to February 2026 and led to the theft of over 1,649 login credentials from users of major logistics platforms such as DAT Truckstop, Penske Logistics, Electronic Funds Source (EFS), and Timocom.

Phishing Operation Details

The group operated as a structured criminal service, potentially selling access to other malicious actors under the name “MC Profit Always.” They employed spearphishing emails and voice phishing calls to reach trucking professionals, frequently targeting freight-centered Telegram groups. By impersonating trusted platforms, they intercepted logins and multi-factor authentication codes, redirecting shipments, stealing funds, and engaging in check fraud.

Analysts from Have I Been Squatted identified the operation after detecting a suspicious cluster of typosquatted domains linked to a customer. The investigation revealed an exposed Git directory on a phishing server, uncovering the group’s source code, victim database, internal communications, and future plans.

Extent of the Breach

On February 4, 2026, a 36.6MB SQL dump confirmed the full extent of the campaign, revealing 52 phishing domains, 75,840 targeted contact emails, and 35 verified EFS check fraud attempts. The compromised data extended beyond stolen passwords, including shipment invoices and financial details, enabling invoice fraud and double-brokering, where cargo is secretly resold, leaving the original carrier unpaid.

The platform, known internally as “GlobalProfit,” was evolving into a Phishing-as-a-Service (PhaaS) product for Russian-speaking criminal buyers, with cryptocurrency payment processing integrated.

Technical Sophistication

A notable aspect of the operation was the use of dual domains to mask phishing pages from victims and security tools. Victims received links to a legitimate-looking “advertise domain,” which secretly embedded a hidden “system domain” within an invisible browser frame. This technique allowed the address bar to display a trusted domain while phishing content loaded within it, bypassing browser security warnings, which typically assess only the top-level page.

From Telegram, operators could monitor each victim in real time, issuing commands that directed them through fake login screens to capture additional email credentials. Security teams are advised to adopt FIDO2 hardware keys or device-bound passkeys, as Telegram-based real-time interception can defeat standard one-time passwords and SMS codes. DNS filtering and active monitoring for typosquatted domains mimicking logistics platform names are also essential defensive measures.

Stay updated on cybersecurity threats by following us on Google News, LinkedIn, and X. Set CSN as your preferred source for instant updates.

Cyber Security News Tags:credentials theft, cyber threat, Cybercrime, Cybersecurity, Diesel Vortex, DNS filtering, FIDO2, Logistics, logistics security, PhaaS, Phishing, phishing domains, Russia, Telegram, typosquatting

Post navigation

Previous Post: Taiwan Cyber Firm Confirms Exploitation by Chinese Hackers
Next Post: Lazarus Group Deploys Medusa Ransomware in Cyber Attacks

Related Posts

Former GCHQ Intern Jailed for Seven Years After Copying Top Secret Files to Mobile Phone Former GCHQ Intern Jailed for Seven Years After Copying Top Secret Files to Mobile Phone Cyber Security News
Discord Data Breach – Customers Personal Data and Scanned Photo IDs leaked Discord Data Breach – Customers Personal Data and Scanned Photo IDs leaked Cyber Security News
MatrixPDF Attacks Gmail Users Bypassing Email Filters and Fetch Malicious Payload MatrixPDF Attacks Gmail Users Bypassing Email Filters and Fetch Malicious Payload Cyber Security News
Jupyter Misconfiguration Flaw Allow Attackers to Escalate Privileges as Root User Jupyter Misconfiguration Flaw Allow Attackers to Escalate Privileges as Root User Cyber Security News
Critical WordPress Plugin Vulnerability Exposes 70,000+ Sites to RCE Attacks Critical WordPress Plugin Vulnerability Exposes 70,000+ Sites to RCE Attacks Cyber Security News
Hackers Compromise Intelligence Website Used by CIA and Other Agencies Hackers Compromise Intelligence Website Used by CIA and Other Agencies Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical VMware Aria Flaws Enable Remote Code Attacks
  • Critical Fixes Released for VMware Aria Operations Flaws
  • Lazarus Group Deploys Medusa Ransomware in Cyber Attacks
  • Diesel Vortex Targets Logistics Sector, Steals Credentials
  • Taiwan Cyber Firm Confirms Exploitation by Chinese Hackers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical VMware Aria Flaws Enable Remote Code Attacks
  • Critical Fixes Released for VMware Aria Operations Flaws
  • Lazarus Group Deploys Medusa Ransomware in Cyber Attacks
  • Diesel Vortex Targets Logistics Sector, Steals Credentials
  • Taiwan Cyber Firm Confirms Exploitation by Chinese Hackers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News