Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsPhishing Campaign Targets Freight and Logistics Orgs in the US, Europe
Phishing Campaign Targets Freight and Logistics Orgs in the US, Europe
CybersecurityEnterpriseDefenseTransportationSupply Chain

Phishing Campaign Targets Freight and Logistics Orgs in the US, Europe

•February 24, 2026
0
BleepingComputer
BleepingComputer•Feb 24, 2026

Why It Matters

The breach exposes critical weaknesses in logistics platforms that handle high‑value transactions, threatening supply‑chain integrity and prompting industry‑wide security reforms.

Key Takeaways

  • •Diesel Vortex stole 1,649 unique freight credentials.
  • •Campaign used 52 phishing domains with Cyrillic homoglyphs.
  • •Targets included DAT Truckstop, TIMOCOM, Penske Logistics.
  • •Attack leveraged Telegram bots for multi‑stage credential capture.
  • •Disruption involved GitLab, Cloudflare, Microsoft, CrowdStrike.

Pulse Analysis

The freight and logistics ecosystem has become a magnet for financially motivated cyber‑crime, and the Diesel Vortex operation exemplifies this trend. Since September 2025 the group has harvested more than 1,600 unique credentials from load boards, fleet‑management portals and fuel‑card systems across the United States and Europe. By exploiting the high‑volume, low‑visibility nature of daily carrier transactions, the actors sidestep traditional enterprise security programs that focus on corporate IT assets. Their Armenian‑speaking team, linked to Russian infrastructure, operates like a call centre, coordinating credential theft, cargo impersonation and double‑brokering schemes.

The campaign relies on a sophisticated phishing kit that rotates 52 domains, many registered under typo‑squatted .com addresses and cloaked .top or .icu layers. Emails are dispatched through compromised Zoho SMTP and Zeptomail accounts, using Cyrillic homoglyphs to disguise sender names and subjects. Recipients are directed to a full‑screen iframe that mirrors the legitimate platform, then guided through a nine‑stage cloaking process controlled via Telegram bots. At each stage the operators can request additional authentication factors, inject credential‑harvesting scripts, or abort the session, giving them granular control over the theft workflow.

The exposure of Diesel Vortex prompted a coordinated takedown involving GitLab, Cloudflare, Google Threat Intelligence, CrowdStrike and Microsoft’s threat center, effectively disrupting the phishing infrastructure. However, the incident underscores the systemic risk posed by credential‑rich platforms that lack multi‑factor enforcement and continuous monitoring. Logistics firms must adopt zero‑trust principles, enforce strong authentication, and monitor for anomalous access patterns across load‑board and carrier‑management systems. Threat intelligence sharing, such as the collaboration between Have I Been Squatted and Ctrl‑Alt‑Intel, remains essential for early detection and rapid response to similar supply‑chain attacks.

Phishing campaign targets freight and logistics orgs in the US, Europe

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...