- Hackers create phishing attacks on logistics companies
- They then gain access and redirect cargo to new destinations.
- Real organized crime gangs are waiting to steal the redirected cargo.
This seems like an obvious evolution of crime in an increasingly online world, but cybercriminals and offline gangs tend to stick to their specialisms, given that they require very different skill sets.
However, messages from ProofPoint Now there are new attacks involving cybercriminals. work together with traditional, real-life organized crime groups to join forces, primarily targeting freight brokers and trucking companies.
The attacks are highly sophisticated because hackers start by emailing malicious links to freight organizations and then deploy remote monitoring and management (RMM) tools that allow them to reroute trucks or impersonate legitimate cargo.
New Age Highway Robbers
Usage social engineering Targets directly freight brokerage and logistics firms in the supply chain, allowing criminals to identify high-value cargo and gain access to information about other related entities and cargo.
The attackers were observed deleting booking emails and blocking dispatch notifications, impersonating the target firm and speaking directly to truck drivers in what appeared to be a completely legitimate manner.
The trucks are then diverted to fraudulent collection points where the goods are stolen by organized crime groups.
While the researchers do not suggest that any incidents of violence occurred, physical theft by organized crime groups does suggest that there is certainly a risk of harm to an unsuspecting driver if goods are stolen.
Cargo theft has been a problem for centuries, so it's no surprise that criminals are evolving the old tactics of highway robbers to bring them into modern times.
The annual cost of cargo theft is approximately US$34 billion. statistics assessmentHowever, the digitization of supply chains around the world is making cargo vulnerable in new ways, threatening to dramatically increase the number of attacks.
The best identity theft protection for any budget




