Cybercriminals target transportation companies in North America with info-stealing malware

Avatar

Researchers have observed a new campaign targeting shipping companies in North America, delivering a variety of malware strains.

Cybersecurity firm Proofpoint has been tracking the activity since late May, and said they could not attribute it to a specific threat actor but determined the group is likely financially motivated. To gain access to their victims, the hackers use compromised legitimate email accounts belonging to transportation and shipping companies, sending malicious links and attachments within existing email conversations.

The malware delivered through these attacks includes Lumma Stealer, StealC, DanaBot and Arechclient2 — all designed to steal information from the victims’ devices.

Proofpoint identified at least 15 compromised email accounts used in the campaign, but it remains unclear how the hackers gained access to those accounts.

In some attacks, the hackers also impersonated legitimate software used exclusively in transport and fleet operations management, including Samsara, AMB Logistic and Astra TMS.

Researchers have not named the specific victims affected by the attacks but stated that they include a small number of customers in the transportation and logistics industries in North America.

“Threat actors are increasingly tailoring lures to be more realistic to entice recipients to click on a link or download attachments,” researchers said.

The specific targeting and compromise of organizations within transportation and logistics, as well as the use of lures impersonating industry-specific software, indicate that the actors likely conduct research into the targeted company’s operations before launching their campaigns, according to the report.

The language used in the lures and content also suggests familiarity with typical business workflows, researchers added.

CybercrimeIndustryNewsNews Briefs
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

CISA warns of continuing attacks on water systems after Kansas town reports incident

Next Post

Modified LockBit and Conti ransomware shows up in DragonForce gang’s attacks

Related Posts