Hackers Targeting Freight Operators to Steal Cargo: Proofpoint
嗯,用户让我总结一篇文章,控制在一百个字以内,而且不需要用“文章内容总结”之类的开头。好的,我先看看这篇文章讲什么。 文章主要讲黑客和有组织犯罪合作,利用远程访问工具攻击卡车运输和物流公司,偷窃货物然后在网上卖或者运到海外。这些活动从六月开始,可能更早。他们用RMM工具进入系统,通过钓鱼邮件、恶意链接等方式安装软件,控制公司系统。然后用这些权限去竞拍真实的货物运输订单,偷货卖货。文章还提到这种情况越来越普遍,损失严重。 那我需要把这些关键点浓缩到100字以内。首先说明合作对象和目标行业:黑客与有组织犯罪合作,攻击卡车运输和物流公司。然后说明他们的手段:使用远程访问工具窃取货物。接着提到这些活动的时间范围:至少从六月开始。最后说明影响:导致大量损失,并且情况在恶化。 这样组合起来就是:黑客与有组织犯罪合作攻击卡车运输和物流公司,利用远程访问工具窃取货物并转售或运往海外。此类活动自六月以来持续活跃,导致重大损失,并可能进一步恶化。 检查一下字数,刚好在100字左右。符合用户的要求。 </think> 黑客与有组织犯罪合作攻击卡车运输和物流公司,利用远程访问工具窃取货物并转售或运往海外。此类活动自六月以来持续活跃,导致重大损失,并可能进一步恶化。 2025-11-5 11:53:5 Author: securityboulevard.com(查看原文) 阅读量:33 收藏

Hackers are working with organized crime groups to target trucking and logistics companies with remote access tools to steal freight that ranges from electronics to energy drinks and then selling it online or shipping it overseas.

The bad actors running the complex operations have been active since at least June, though there is evidence that the two dozen or so campaigns began as early as January. They’re similar to other threat cluster activity Proofpoint threat researchers saw a year ago, though there isn’t enough evidence to suggest that the same threat actors were involved in both, they wrote in a report this week.

Cruise Con 2025

“Cargo theft is a profitable criminal enterprise, and based on Proofpoint data, cybercriminals are increasingly targeting surface transportation entities to steal real, physical goods,” the researchers wrote. “Based on the growth of this activity in email threat data between 2024 and 2025, Proofpoint assesses this threat will continue to increase.”

According to Proofpoint, the bad actors’ goal initially is to install RMM tools onto the systems of targeted companies. They use three tactics to do this, including using compromised accounts on load boards – online marketplaces where freight loads can be booked – to list fraudulent loads. When a carrier responds to the posted fake load, the hackers send them an email.

They also can inject malicious content and URLs via compromised email accounts into existing conversations or use direct email campaigns, particularly against larger organizations such as asset-based carriers, freight brokerage firms, and integrated supply chain providers.

Access Gained Through Malicious Files

The emails contain URLs that lead to an executable or MSI file that, if clicked, installs RMM software that allows the threat actors to gain full control of the compromised system, the researchers wrote, adding that “in some cases, the threat actor will create domains and landing pages that impersonate legitimate brands or generic transportation terms to further the believability of the social engineering.”

Proofpoint in the last two months has seen almost two dozen campaigns that can range in size from fewer than 10 message per campaign to more than 1,000 messages. More than 76% of the campaigns seen since August used SimpleHelp or N-able RMM tools, though other software used included ScreenConnect, PDQ Connect, Fleetdeck, and LogMeIn Resolve.

From there, the attackers use the compromised carrier accounts to bid on real freight shipments, and then steal and sell the loads.

Multiple RMM Tools Used

“These RMMs [and remote access services, or RAS] are often used in tandem,” they wrote. “For example, PDQ Connect has been observed downloading and installing both ScreenConnect and SimpleHelp. Once initial access is established, the threat actor conducts system and network reconnaissance and deploys credential harvesting tools such as WebBrowserPassView. This activity indicates a broader effort to compromise accounts and deepen access within targeted environments.”

In the earlier campaign that ran from 2024 to March, the researchers saw a threat actor targeting ground transportation companies by distributing such tools as DanaBot, NetSupport, Lumma Stealer, and StealC.

Union of Cyber, Organized Crime

Cargo theft has been a problem for decades, leading to about $34 billion in losses every year, and grew 27% in 2024, according to the National Insurance Crime Bureau, with the United States joining other countries, including Brazil, Mexico, India, Germany, Chile, and South Africa, among the hotspots. Over the years, organized crime has been at the heart of the crime, but now cybercriminals are getting into it.

According to IMC Logistics, “the digitization of domestic and international supply chains has created new vulnerabilities and thus opportunities for OTGs [organized theft groups] to exploit gaps using sophisticated and ever-evolving cyber capabilities. These groups can steal freight remotely by exploiting the technology that has been embedded into supply chains to move cargo more efficiently.”

“Organized crime has evolved alongside digital transformation,” Keeper Security CISO Shane Barney said. “Criminal groups are now using legitimate remote access tools and trusted business systems to infiltrate logistics networks and move real cargo for profit. This is no longer just about stealing data. Attackers are also exploiting access to manipulate physical operations and inflict direct financial loss. The real risk sits in the connections between systems, partners and vendors that keep modern supply chains running.”

The Proofpoint researchers wrote that “public discussion and reporting on cyber-enabled cargo theft suggests the problem is widespread, impacting organizations nationwide, and only increasing in scope and spread.”

Recent Articles By Author


文章来源: https://securityboulevard.com/2025/11/hackers-targeting-freight-operators-to-steal-cargo-proofpoint/
如有侵权请联系:admin#unsafe.sh