WHAT ARE YOU LOOKING FOR?

Raleigh, NC

32°F
Scattered Clouds Humidity: 57%
Wind: 1.34 M/S

Logistics Companies Targeted By RMM Hacking Groups

Logistics Companies Targeted By RMM Hacking Groups

Bad actors are increasingly focusing their attacks on trucking and logistics companies, aiming to infect their systems with remote monitoring and management (RMM) software to ultimately facilitate the theft of physical cargo freight.

Cyber-Enabled Cargo Theft

The threat cluster, which Proofpoint believes has been active since at least June 2025, is thought to be collaborating with organized crime groups to break into the surface transportation industry. The primary goal is to steal physical goods, with food and beverage

products being the most targeted commodities in these cyber enabled heists. Researchers Ole Villadsen and Selena Larson reported that the stolen cargo is most likely sold online or shipped overseas. The attackers infiltrate companies to fraudulently bid on real shipments of goods, which they then steal.

These campaigns share similarities with attacks disclosed in September 2024 that targeted North American transportation companies with information stealers and remote access Trojans (RATs) such as Lumma Stealer and NetSupport RAT, though there is no evidence that the same actors are responsible.

Intrusion Methods

In the current wave of intrusions, the unknown attackers use multiple methods. They hijack existing email conversations using compromised accounts, target asset based carriers and freight brokerage firms with spear phishing emails, and post fraudulent freight listings using hacked accounts on load boards.

The malicious emails contain URLs that lead to booby trapped MSI installers or executables. These deploy legitimate RMM tools like ScreenConnect, SimpleHelp, PDQ Connect, and N able. In some cases, multiple programs are used together, such as using PDQ Connect to drop and install ScreenConnect.

Once remote access is established, the attackers conduct system and network reconnaissance, followed by dropping credential harvesting tools like WebBrowserPassView to burrow deeper into the corporate network. In at least one documented case, the threat actor weaponized this access to delete existing bookings, block dispatcher notifications, book loads under the compromised carrier’s name, and coordinate the transport of the stolen goods.

The use of RMM software gives the attackers several advantages: it removes the need to create custom malware and allows them to operate under the radar, since these legitimate tools are common in enterprise environments and are typically not flagged as malicious by security solutions. Proofpoint noted that RMM installers are often signed and legitimate, which helps them evade anti virus or network detection.

Found this article interesting? Follow us on X(Twitter) ,Threads and FaceBook to read more exclusive content we post. 

Image

Cybersecurity Insight delivers timely updates on global cybersecurity developments, including recent system breaches, cyber-attacks, advancements in artificial intelligence (AI), and emerging technology innovations. Our goal is to keep viewers well-informed about the latest trends in technology and system security, and how these changes impact our lives and the broader ecosystem

Please fill the required field.