Diesel Vortex Russian Phishing Ring Steals 1,649 Logistics Credentials Across US and Europe


Diesel Vortex Russian cybercrime group ran phishing operation against freight platforms from September 2025 to February 2026. 1,649 unique credentials stolen from DAT Truckstop, Penske Logistics, EFS, Timocom users. Phishing-as-a-Service platform GlobalProfit exposed via leaked Git server.

Operators branded service “MC Profit Always” selling access to other criminals. Spearphishing emails and vishing calls targeted trucking Telegram groups. Attackers impersonated daily-used platforms capturing credentials and MFA codes live.

Dual-domain technique hid phishing pages in invisible iframes. Victims saw trusted advertise domains while system domains loaded malicious login forms silently. Address bar security bypassed completely.

36.6MB SQL dump revealed operational scope on February 4, 2026. 52 phishing domains deployed against 75,840 trucking emails. 35 EFS check fraud attempts confirmed alongside shipment invoice theft.

Compromised access enabled cargo redirection and double-brokering scams. Financial details fueled invoice fraud leaving original carriers unpaid. Telegram console provided real-time victim monitoring and command relay.

Domain architecture (Source – Have I Been Squatted)

Exposed Git directory leaked source code, victim database, internal chat. Researchers discovered cryptocurrency payment processing for PhaaS customers. Russian-speaking buyer focus evident throughout infrastructure.

Campaign Statistics Table

MetricCount
Unique credentials1,649
Credential pairs3,474
Unique visitor IPs9,016
Phishing domains52
Target emails75,840
EFS fraud attempts35

Browser security ignored iframe phishing content. Top-level trusted domains evaded warnings effectively.

Penske iframe elements inspector (Source – Have I Been Squatted)

Attack Infrastructure

  • Advertise domains: Clean-looking legitimate mimics
  • System domains: Hidden iframe phishing payloads
  • Telegram C2: Real-time victim steering console
  • SQL database: Victim tracking and credential storage
  • Git exposure: Source code and opsec failures

FIDO2 hardware keys block real-time MFA interception. Passkeys bind authentication to devices defeating Telegram relays.

Logistics firms implement typosquatting detection. DNS filtering blocks dual-domain deception patterns. Cargo platforms push hardware token adoption rapidly.

Operator Console – Session showing a Highway carrier with MC – DOT details before credential capture (Source – Have I Been Squatted)

Defensive Measures

  • Deploy FIDO2 security keys universally
  • Monitor logistics typosquatted domains
  • Block iframe embedding from ad domains
  • Hunt Telegram C2 traffic patterns
  • Audit freight platform access logs
  • Train staff against vishing lures

Check fraud hit EFS hardest with 35 confirmed cases. Double-brokering losses compound credential theft damage.

FAQ

Which logistics platforms faced Diesel Vortex attacks?

DAT Truckstop, Penske Logistics, EFS, Timocom primarily.

Campaign duration and credential count?

September 2025 to February 2026, 1,649 unique credentials.

How did dual-domain technique work?

Trusted iframe hid phishing page from address bar warnings.

What exposed the full operation?

Leaked Git directory with source code and 36.6MB SQL dump.

Primary monetization methods?

EFS check fraud, cargo redirection, double-brokering.

Recommended defenses against Telegram phishing?

FIDO2 hardware keys and device-bound passkeys.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages