Cybercriminals target transportation companies in North America with info-stealing malware

Avatar

Researchers have observed a new campaign targeting shipping companies in North America, delivering a variety of malware strains.

Cybersecurity firm Proofpoint has been tracking the activity since late May, and said they could not attribute it to a specific threat actor but determined the group is likely financially motivated. To gain access to their victims, the hackers use compromised legitimate email accounts belonging to transportation and shipping companies, sending malicious links and attachments within existing email conversations.

The malware delivered through these attacks includes Lumma Stealer, StealC, DanaBot and Arechclient2 — all designed to steal information from the victims’ devices.

Proofpoint identified at least 15 compromised email accounts used in the campaign, but it remains unclear how the hackers gained access to those accounts.

In some attacks, the hackers also impersonated legitimate software used exclusively in transport and fleet operations management, including Samsara, AMB Logistic and Astra TMS.

Researchers have not named the specific victims affected by the attacks but stated that they include a small number of customers in the transportation and logistics industries in North America.

“Threat actors are increasingly tailoring lures to be more realistic to entice recipients to click on a link or download attachments,” researchers said.

The specific targeting and compromise of organizations within transportation and logistics, as well as the use of lures impersonating industry-specific software, indicate that the actors likely conduct research into the targeted company’s operations before launching their campaigns, according to the report.

The language used in the lures and content also suggests familiarity with typical business workflows, researchers added.

CybercrimeIndustryNewsNews Briefs
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

CISA warns of continuing attacks on water systems after Kansas town reports incident

Next Post

Modified LockBit and Conti ransomware shows up in DragonForce gang’s attacks

Related Posts

5 Actionable Steps to Prevent GenAI Data Leaks Without Fully Blocking AI Usage

Since its emergence, Generative AI has revolutionized enterprise productivity. GenAI tools enable faster and more effective software development, financial analysis, business planning, and customer engagement. However, this business agility comes with significant risks, particularly the potential for sensitive data leakage. As organizations attempt to balance productivity gains with security
Avatar
Read More

Microsoft Fixes AI, Cloud, and ERP Security Flaws; One Exploited in Active Attacks

Microsoft has addressed four security flaws impacting its artificial intelligence (AI), cloud, enterprise resource planning, and Partner Center offerings, including one that it said has been exploited in the wild. The vulnerability that has been tagged with an "Exploitation Detected" assessment is CVE-2024-49035 (CVSS score: 8.7), a privilege escalation flaw in partner.microsoft[.]com. "An
Avatar
Read More