Hackers are breaching freight firms to steal real cargo, not just data


Cybercriminals are targeting trucking carriers, freight brokers, and logistics providers so they can steal physical shipments in the real world. Proofpoint says the attackers break into transportation firms, gain remote access, harvest credentials, and then use that access to reroute or fraudulently book loads that later disappear.

This is not a niche cybercrime anymore. Proofpoint says it has tracked a cluster of campaigns aimed at the surface transportation sector since at least June 2025, with signs of related activity going back to January 2025. In the last two months covered by its research, the company saw nearly two dozen campaigns, some with more than 1,000 messages.

The broader loss figures show why the industry is worried. NICB says cargo theft losses increased 27 percent in 2024 and were expected to rise another 22 percent in 2025, while Proofpoint cites industry data putting 2025 North American losses at $6.6 billion. NICB also says annual cargo theft losses can reach as high as $35 billion.

How the attacks work

Proofpoint says the attackers usually start with social engineering, not a software exploit. One common method involves compromised load board accounts, where criminals post fake freight listings and wait for real carriers to respond. They then send malicious links that deliver remote monitoring and management tools, or RMM software, onto the victim’s machine.

The group also hijacks real email conversations. In those cases, the attacker uses a compromised mailbox to drop a malicious link into an ongoing thread, which makes the message look normal and trusted. Proofpoint says the same actors also run direct email campaigns against larger carriers, freight brokerages, and supply chain providers.

Attack Flow (Source – Proofpoint)

When a victim clicks the link, it usually downloads an .exe or .msi installer. Proofpoint says those files often install legitimate remote access tools such as ScreenConnect, SimpleHelp, PDQ Connect, Fleetdeck, N-able, or LogMeIn Resolve, which gives the attackers control of the system while helping them blend in with normal IT activity.

Why this turns into real-world cargo theft

Once inside, the attackers do not stop at mailbox access. Proofpoint says they perform system and network reconnaissance, look for dispatcher details, and use tools such as WebBrowserPassView to pull saved browser credentials. That lets them reach the internal systems and accounts needed to manage freight activity.

The next step moves the crime from the screen to the road. Proofpoint says the attackers use their access to identify profitable shipments, bid on loads, or rebook them under a compromised carrier’s name. A public account cited by Proofpoint described criminals deleting existing bookings, blocking dispatcher notifications, adding their own device to a dispatcher’s phone extension, and then coordinating the stolen load.

Email sent to a carrier responding to a fraudulent load posted on a load board (Source – Proofpoint)

Researchers believe these operations link to organized crime. Proofpoint says it assesses with high confidence that the threat actors work with criminal groups to steal freight, while NICB says cargo theft often funds broader criminal networks. NMFTA has also warned that cyber tactics now play a direct role in modern cargo crime.

Cargo theft by the numbers

ItemWhat the research shows
Main targetsTrucking carriers, freight brokers, logistics and supply chain providers
GoalSteal physical freight shipments
Initial accessFake load board listings, thread hijacking, direct phishing emails
Typical payloadSigned or legitimate RMM software
Campaign activityNearly two dozen campaigns observed since August 2025
Loss trendCargo theft losses up 27% in 2024, projected up another 22% in 2025
Annual impactNICB says losses can reach up to $35 billion

The victims are not limited to large enterprises. Proofpoint says the attackers appear opportunistic and go after everyone from small family-owned carriers to much larger transport firms. That matters because smaller firms often have fewer security controls but still hold access to the same dispatch and shipment workflows that criminals want.

The stolen goods vary too. Proofpoint says attackers target real cargo and may later sell it online or ship it overseas. NICB lists electronics, food and beverage, pharmaceuticals, apparel and footwear, alcohol and tobacco, and building materials among the most stolen cargo categories.

This rise in cyber-enabled cargo theft fits a wider industry shift. NMFTA says freight crime now includes fake carrier profiles, spoofed dispatch communications, and digital load board abuse, adding that cybersecurity and cargo security now go hand in hand.

What companies should do now

Proofpoint says transportation firms should tightly control which remote management tools users can install. If a company does not approve an RMM product, staff should not be able to download or run it from email or the web. Network detections and endpoint protection should also flag traffic to RMM infrastructure.

Email security and user training remain central because most attacks begin with a malicious link. Proofpoint specifically warns against downloading .exe or .msi files sent by external email senders. It also recommends training staff to recognize suspicious load offers, fake agreement pages, and unusual redirect links.

NMFTA says carriers, shippers, and 3PLs should also watch for fake carrier identities, spoofed dispatch communications, and verification failures across telematics, authentication, and partner workflows. Its cargo crime framework focuses on layered defenses and faster reporting when incidents happen.

Defensive steps

  • Restrict installation of unapproved RMM tools.
  • Block or alert on suspicious traffic to RMM servers.
  • Do not allow users to install .exe or .msi files delivered by external email.
  • Train dispatch, operations, and carrier-facing staff to spot fake load offers and thread hijacks.
  • Review NMFTA’s cargo crime reduction framework for identity checks, layered defenses, and response planning.

FAQ

What are these attackers trying to steal?

They are trying to steal real freight shipments, not just data. Proofpoint says the attackers use cyber access to arrange or reroute legitimate cargo so criminal networks can take possession of the goods.

How do they first get into trucking and freight companies?

Proofpoint says the main entry methods are fake load board listings, hijacked email threads, and direct phishing campaigns. The victim then installs a remote access tool after clicking a malicious link.

Why do attackers use legitimate remote management tools?

Because they look normal and can slip past users and some defenses more easily than classic malware. Proofpoint says the attackers frequently use tools such as ScreenConnect and SimpleHelp for exactly that reason.

How big is the cargo theft problem?

It is large and still growing. NICB says cargo theft losses rose 27 percent in 2024 and were expected to increase again in 2025, while annual losses can reach up to $35 billion.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages