Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Transportation Companies Hacked to Steal Cargo

Transportation Companies Hacked to Steal Cargo

Posted on November 4, 2025November 4, 2025 By CWS

Risk actors have been hacking into floor transportation corporations to deploy distant entry instruments and hijack shipments to steal bodily items, Proofpoint reviews.

The assault chain begins with a compromised dealer load board account – a market used for reserving hundreds for vehicles – that’s used to put up a faux load.

The hackers then anticipate a service to inquire in regards to the load and, when that occurs, they reply with emails containing malicious URLs, that are set as much as ship distant monitoring and administration (RMM) instruments.

Moreover, the risk actors have been noticed leveraging compromised e mail accounts to inject malicious URLs and content material into current conversations, in addition to launching direct e mail campaigns towards carriers, freight brokerage entities, and built-in provide chain suppliers.

As a part of almost two dozen campaigns noticed over the previous a number of months, the hackers have been deploying RMM instruments comparable to Fleetdeck, LogMeIn Resolve, N-able, PDQ Join, ScreenConnect, and SimpleHelp, generally utilizing them in tandem.

“As soon as preliminary entry is established, the risk actor conducts system and community reconnaissance and deploys credential harvesting instruments comparable to WebBrowserPassView. This exercise signifies a broader effort to compromise accounts and deepen entry inside focused environments,” Proofpoint notes.

Utilizing the deployed RMM instruments, the risk actors take management of the service’s system, reserving hundreds within the sufferer’s title, and coordinating transportation. By manipulating the sufferer’s scheduling and dispatch methods, the attackers divert worthwhile shipments to their very own operatives.

The aim of the assaults is cargo hijacking for monetary achieve. Cargo theft causes over $30 billion in losses every year and is principally performed by organized prison teams, with Brazil, Chile, Germany, India, Mexico, South Africa, and the US being the hotspots for such actions.Commercial. Scroll to proceed studying.

“Proofpoint assesses with excessive confidence that the risk actors are working with organized crime teams. The stolen cargo most probably is offered on-line or shipped abroad. Such crimes can create large disruptions to provide chains and value corporations tens of millions, with criminals stealing the whole lot from power drinks to electronics,” Proofpoint notes.

Whereas the assaults had been initially noticed in June, the related infrastructure has been on-line since at the least January 2025, and the attackers seem to have deep data of the software program, companies, and insurance policies inside the cargo provide chain.

A separate however doubtless associated cluster of exercise, noticed between 2024 and March 2025, has focused floor transportation organizations with data stealers comparable to DanaBot, Lumma Stealer, NetSupport, and StealC.

“Whatever the final payload, stealers and RMMs serve the identical function: remotely entry the goal to steal data. Nonetheless, utilizing RMM instruments can allow risk actors to fly additional underneath the radar,” Proofpoint says.

As a part of the current assaults, the hackers have focused corporations of all sizes, taking an opportunistic strategy to compromise any service that responds to their faux posts.

Associated: Main US Telecom Spine Agency Hacked by Nation-State Actors

Associated: Canada Says Hackers Tampered With ICS at Water Facility, Oil and Fuel Agency

Associated: GAO Tells Coast Guard to Enhance Cybersecurity of Maritime Transportation System

Associated: CISA Releases Cyber Protection Plan to Scale back RMM Software program Dangers

Security Week News Tags:Cargo, Companies, Hacked, Steal, Transportation

Post navigation

Previous Post: Hackers Can Exploit Microsoft Teams Vulnerabilities to Manipulate Messages and Alter Notifications
Next Post: Bob Flores, Former CTO of the CIA, Joins Brinker

Related Posts

Chinese Spies Target Networking and Virtualization Flaws to Breach Isolated Environments Chinese Spies Target Networking and Virtualization Flaws to Breach Isolated Environments Security Week News
North Korea’s Digital Surge: B Stolen in Crypto as Amazon Blocks 1,800 Fake IT Workers North Korea’s Digital Surge: $2B Stolen in Crypto as Amazon Blocks 1,800 Fake IT Workers Security Week News
Recently Disrupted DanaBot Leaked Valuable Data for 3 Years Recently Disrupted DanaBot Leaked Valuable Data for 3 Years Security Week News
689,000 Affected by Insider Breach at FinWise Bank 689,000 Affected by Insider Breach at FinWise Bank Security Week News
Backslash Secures M to Enhance Vibe Coding Protection Backslash Secures $19M to Enhance Vibe Coding Protection Security Week News
Farmers Insurance Data Breach Impacts Over 1 Million People Farmers Insurance Data Breach Impacts Over 1 Million People Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News