Hackers Hijack $725M of U.S. & Canadian Cargo via Load Board Spoofing
What Happened — Cybercriminals compromised freight broker and carrier systems, impersonated legitimate companies on online load‑board marketplaces, and posted fraudulent shipments. By “double‑brokering” the fake loads, they redirected trucks, stole the cargo, and generated an estimated $725 million in losses across the United States and Canada in the last year.
Why It Matters for TPRM —
- Supply‑chain attacks on logistics partners can cause massive financial loss and operational disruption for downstream manufacturers and retailers.
- Compromise of broker/carrier credentials often goes undetected until cargo is missing, exposing a blind spot in third‑party risk monitoring.
- The attack vector (phishing‑based credential theft) is easily replicated across other industries that rely on digital freight marketplaces.
Who Is Affected — Transportation & logistics firms (freight brokers, carriers, load‑board operators), automotive dealers, consumer goods manufacturers, and any third‑party that ships high‑value goods via these platforms.
Recommended Actions —
- Conduct immediate credential hygiene reviews for all logistics partners; enforce MFA and password rotation.
- Audit and restrict API/portal access to load‑board systems; implement strict validation of carrier information.
- Deploy email‑security controls to block phishing and malicious links targeting broker staff.
- Add cargo‑theft scenarios to your third‑party risk assessments and incident‑response playbooks.
Technical Notes — Attackers gain entry via phishing emails that deliver malicious links, leading to stolen broker/carrier credentials. They then use compromised accounts to post fake loads on freight‑delivery message boards, manipulate FMCSA records, and execute “double‑brokering” thefts. No specific CVE disclosed; the threat relies on social‑engineering and credential reuse. Source: The Record