Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Transportation Companies Hacked to Steal Cargo

Transportation Companies Hacked to Steal Cargo

Posted on November 4, 2025November 4, 2025 By CWS

Risk actors have been hacking into floor transportation corporations to deploy distant entry instruments and hijack shipments to steal bodily items, Proofpoint reviews.

The assault chain begins with a compromised dealer load board account – a market used for reserving hundreds for vehicles – that’s used to put up a faux load.

The hackers then anticipate a service to inquire in regards to the load and, when that occurs, they reply with emails containing malicious URLs, that are set as much as ship distant monitoring and administration (RMM) instruments.

Moreover, the risk actors have been noticed leveraging compromised e mail accounts to inject malicious URLs and content material into current conversations, in addition to launching direct e mail campaigns towards carriers, freight brokerage entities, and built-in provide chain suppliers.

As a part of almost two dozen campaigns noticed over the previous a number of months, the hackers have been deploying RMM instruments comparable to Fleetdeck, LogMeIn Resolve, N-able, PDQ Join, ScreenConnect, and SimpleHelp, generally utilizing them in tandem.

“As soon as preliminary entry is established, the risk actor conducts system and community reconnaissance and deploys credential harvesting instruments comparable to WebBrowserPassView. This exercise signifies a broader effort to compromise accounts and deepen entry inside focused environments,” Proofpoint notes.

Utilizing the deployed RMM instruments, the risk actors take management of the service’s system, reserving hundreds within the sufferer’s title, and coordinating transportation. By manipulating the sufferer’s scheduling and dispatch methods, the attackers divert worthwhile shipments to their very own operatives.

The aim of the assaults is cargo hijacking for monetary achieve. Cargo theft causes over $30 billion in losses every year and is principally performed by organized prison teams, with Brazil, Chile, Germany, India, Mexico, South Africa, and the US being the hotspots for such actions.Commercial. Scroll to proceed studying.

“Proofpoint assesses with excessive confidence that the risk actors are working with organized crime teams. The stolen cargo most probably is offered on-line or shipped abroad. Such crimes can create large disruptions to provide chains and value corporations tens of millions, with criminals stealing the whole lot from power drinks to electronics,” Proofpoint notes.

Whereas the assaults had been initially noticed in June, the related infrastructure has been on-line since at the least January 2025, and the attackers seem to have deep data of the software program, companies, and insurance policies inside the cargo provide chain.

A separate however doubtless associated cluster of exercise, noticed between 2024 and March 2025, has focused floor transportation organizations with data stealers comparable to DanaBot, Lumma Stealer, NetSupport, and StealC.

“Whatever the final payload, stealers and RMMs serve the identical function: remotely entry the goal to steal data. Nonetheless, utilizing RMM instruments can allow risk actors to fly additional underneath the radar,” Proofpoint says.

As a part of the current assaults, the hackers have focused corporations of all sizes, taking an opportunistic strategy to compromise any service that responds to their faux posts.

Associated: Main US Telecom Spine Agency Hacked by Nation-State Actors

Associated: Canada Says Hackers Tampered With ICS at Water Facility, Oil and Fuel Agency

Associated: GAO Tells Coast Guard to Enhance Cybersecurity of Maritime Transportation System

Associated: CISA Releases Cyber Protection Plan to Scale back RMM Software program Dangers

Security Week News Tags:Cargo, Companies, Hacked, Steal, Transportation

Post navigation

Previous Post: Hackers Can Exploit Microsoft Teams Vulnerabilities to Manipulate Messages and Alter Notifications
Next Post: Bob Flores, Former CTO of the CIA, Joins Brinker

Related Posts

Rising Tides: When Cybersecurity Becomes Personal – Inside the Work of an OSINT Investigator Rising Tides: When Cybersecurity Becomes Personal – Inside the Work of an OSINT Investigator Security Week News
Asahi Data Breach Impacts 2 Million Individuals Asahi Data Breach Impacts 2 Million Individuals Security Week News
CISA Confirms Exploitation of Latest Oracle EBS Vulnerability  CISA Confirms Exploitation of Latest Oracle EBS Vulnerability  Security Week News
Proofpoint Completes .8 Billion Acquisition of Hornetsecurity  Proofpoint Completes $1.8 Billion Acquisition of Hornetsecurity  Security Week News
Monnai Raises  Million for Identity and Risk Data Infrastructure Monnai Raises $12 Million for Identity and Risk Data Infrastructure Security Week News
CISA Adds Exploited XWiki, VMware Flaws to KEV Catalog CISA Adds Exploited XWiki, VMware Flaws to KEV Catalog Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark