{"id":104593,"date":"2026-02-27T12:25:31","date_gmt":"2026-02-27T15:25:31","guid":{"rendered":"https:\/\/shipping.einnews.com\/article\/896153854"},"modified":"2026-02-27T12:25:31","modified_gmt":"2026-02-27T15:25:31","slug":"russian-cybercrime-ring-targeted-freight-firms-in-us-europe-report-says","status":"publish","type":"post","link":"https:\/\/new7.shop\/zerocostfreehost\/index.php\/2026\/02\/27\/russian-cybercrime-ring-targeted-freight-firms-in-us-europe-report-says\/","title":{"rendered":"Russian cybercrime ring targeted freight firms in US, Europe, report says"},"content":{"rendered":"<div><img data-opt-id=758893364  fetchpriority=\"high\" decoding=\"async\" src=\"data:image\/gif;base64,R0lGODlhAQABAIAAAAAAAP\/\/\/ywAAAAAAQABAAACAUwAOw==\" fifu-lazy=\"1\" fifu-data-sizes=\"auto\" fifu-data-srcset=\"https:\/\/mlmjbqro95r8.i.optimole.com\/cb:bOxR.6a5\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/i2.wp.com\/www.freightwaves.com\/wp-content\/uploads\/2026\/02\/27\/Diesel-Vortex_Cybercrime.jpg?ssl=1&w=75&resize=75&ssl=1 75w, https:\/\/mlmjbqro95r8.i.optimole.com\/cb:bOxR.6a5\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/i2.wp.com\/www.freightwaves.com\/wp-content\/uploads\/2026\/02\/27\/Diesel-Vortex_Cybercrime.jpg?ssl=1&w=100&resize=100&ssl=1 100w, https:\/\/mlmjbqro95r8.i.optimole.com\/cb:bOxR.6a5\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/i2.wp.com\/www.freightwaves.com\/wp-content\/uploads\/2026\/02\/27\/Diesel-Vortex_Cybercrime.jpg?ssl=1&w=150&resize=150&ssl=1 150w, https:\/\/mlmjbqro95r8.i.optimole.com\/cb:bOxR.6a5\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/i2.wp.com\/www.freightwaves.com\/wp-content\/uploads\/2026\/02\/27\/Diesel-Vortex_Cybercrime.jpg?ssl=1&w=240&resize=240&ssl=1 240w, https:\/\/mlmjbqro95r8.i.optimole.com\/cb:bOxR.6a5\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/i2.wp.com\/www.freightwaves.com\/wp-content\/uploads\/2026\/02\/27\/Diesel-Vortex_Cybercrime.jpg?ssl=1&w=320&resize=320&ssl=1 320w, https:\/\/mlmjbqro95r8.i.optimole.com\/cb:bOxR.6a5\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/i2.wp.com\/www.freightwaves.com\/wp-content\/uploads\/2026\/02\/27\/Diesel-Vortex_Cybercrime.jpg?ssl=1&w=500&resize=500&ssl=1 500w, https:\/\/mlmjbqro95r8.i.optimole.com\/cb:bOxR.6a5\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/i2.wp.com\/www.freightwaves.com\/wp-content\/uploads\/2026\/02\/27\/Diesel-Vortex_Cybercrime.jpg?ssl=1&w=640&resize=640&ssl=1 640w, https:\/\/mlmjbqro95r8.i.optimole.com\/cb:bOxR.6a5\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/i2.wp.com\/www.freightwaves.com\/wp-content\/uploads\/2026\/02\/27\/Diesel-Vortex_Cybercrime.jpg?ssl=1&w=800&resize=800&ssl=1 800w, https:\/\/mlmjbqro95r8.i.optimole.com\/cb:bOxR.6a5\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/i2.wp.com\/www.freightwaves.com\/wp-content\/uploads\/2026\/02\/27\/Diesel-Vortex_Cybercrime.jpg?ssl=1&w=1024&resize=1024&ssl=1 1024w, https:\/\/mlmjbqro95r8.i.optimole.com\/cb:bOxR.6a5\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/i2.wp.com\/www.freightwaves.com\/wp-content\/uploads\/2026\/02\/27\/Diesel-Vortex_Cybercrime.jpg?ssl=1&w=1280&resize=1280&ssl=1 1280w, https:\/\/mlmjbqro95r8.i.optimole.com\/cb:bOxR.6a5\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/i2.wp.com\/www.freightwaves.com\/wp-content\/uploads\/2026\/02\/27\/Diesel-Vortex_Cybercrime.jpg?ssl=1&w=1600&resize=1600&ssl=1 1600w\" fifu-data-src=\"https:\/\/mlmjbqro95r8.i.optimole.com\/cb:bOxR.6a5\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/i2.wp.com\/www.freightwaves.com\/wp-content\/uploads\/2026\/02\/27\/Diesel-Vortex_Cybercrime.jpg?ssl=1\" class=\"ff-og-image-inserted\"><\/div>\n<p>A Russian-linked phishing-as-a-service group ran a months-long phishing campaign targeting freight and logistics companies across the U.S. and Europe, stealing more than 1,600 login credentials.<\/p>\n<p>The group dubbed \u201cDiesel Vortex\u201d \u2014 operated from at least September 2025 through February, focusing on platforms widely used by brokers, carriers and supply chain operators, according to a <a href=\"https:\/\/haveibeensquatted.com\/blog\/diesel-vortex-inside-the-russian-cybercrime-group-targeting-us-eu-freight\" target=\"_blank\">joint investigation<\/a> released on Tuesday by cybersecurity researchers <a href=\"https:\/\/haveibeensquatted.com\/\" target=\"_blank\">Have I Been Squatted<\/a> and Ctrl-Alt-Intel.<\/p>\n<p>The investigation found 1,649 unique credentials were compromised, drawn from 3,474 stolen login pairs. Impacted parties included users of DAT Truckstop, Penske Logistics, Electronic Funds Source (EFS), Timocom and other freight-focused systems, according to the report.<\/p>\n<p>Researchers described Diesel Vortex as a structured phishing-as-a-service operation, not a lone hacker. The group built dedicated phishing infrastructure for logistics load boards, fleet portals and fuel card systems, using targeted email and voice phishing to capture credentials and multi-factor authentication codes in real time.<\/p>\n<div class=\"flex my-20 justify-center w-full overflow-hidden fw-ad-id-470282\">\n<p> window.googletag = window.googletag || {cmd: []}; googletag.cmd.push(function() { googletag.defineSlot(&#8216;\/21776187881\/FW-Responsive-Main_Content-Slot1&#8217;, [[300, 100], [320, 50], [728, 90], [468, 60]], &#8216;div-gpt-ad-1709668545404-0&#8217;).defineSizeMapping(gptSizeMaps.banner1).addService(googletag.pubads()); googletag.pubads().enableSingleRequest(); googletag.pubads().collapseEmptyDivs(); googletag.enableServices(); });\n<\/p>\n<\/p><\/div>\n<div id=\"omeda-post-content\">\n<p>A key breakthrough in the investigation came after analysts discovered an exposed .git directory on a phishing domain, enabling them to reconstruct the group\u2019s codebase and review a 36.6MB SQL database dump dated Feb. 4, Have I Been Squatted and Ctrl-Alt-Intel said in the report.<\/p>\n<p>That database showed 52 phishing domains deployed, more than 75,000 targeted contact emails and 35 confirmed EFS check fraud attempts.<\/p>\n<p>Diesel Vortex also used a dual-domain architecture designed to evade detection, with one \u201cadvertise\u201d domain visible to victims and a hidden \u201csystem\u201d domain loading phishing content inside an iframe, an element that loads another HTML element inside of a web page, such as external ads, videos or tags.<\/p>\n<p>Operators controlled victim sessions through a Telegram-based console, steering targets through credential capture flows and secondary email phishing modules in real time.&nbsp;<\/p>\n<p>According to the report, the platform was internally branded \u201cGlobalProfit\u201d and appeared to be under active development as a broader phishing-as-a-service product, potentially marketed to other operators.&nbsp;<\/p>\n<p>Have I Been Squatted and Ctrl-Alt-Intel said they coordinated with multiple industry partners during the investigation and worked to notify affected parties.<\/p>\n<div class=\"flex my-20 justify-center w-full overflow-hidden fw-ad-id-470312\">\n<p> window.googletag = window.googletag || {cmd: []}; googletag.cmd.push(function() { googletag.defineSlot(&#8216;\/21776187881\/fw-responsive-main_content-slot3&#8217;, [[728, 90], [468, 60], [320, 50], [300, 100]], &#8216;div-gpt-ad-1665767553440-0&#8217;).defineSizeMapping(gptSizeMaps.banner1).addService(googletag.pubads()); googletag.pubads().enableSingleRequest(); googletag.pubads().collapseEmptyDivs(); googletag.enableServices(); });\n<\/p>\n<\/p><\/div>\n<\/div>\n<p><strong><a href=\"https:\/\/blockads.fivefilters.org\"> <\/a><\/strong> <a href=\"https:\/\/blockads.fivefilters.org\/acceptable.html\"> <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8230; months-long phishing campaign targeting <span class=\"match\">freight<\/span> and logistics companies across the &#8230; Source (EFS), Timocom and other <span class=\"match\">freight<\/span>-focused systems, according to the &#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"","fifu_image_alt":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-104593","post","type-post","status-publish","format-standard","hentry","category-news","wpcat-1-id"],"_links":{"self":[{"href":"https:\/\/new7.shop\/zerocostfreehost\/index.php\/wp-json\/wp\/v2\/posts\/104593","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/new7.shop\/zerocostfreehost\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/new7.shop\/zerocostfreehost\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/new7.shop\/zerocostfreehost\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/new7.shop\/zerocostfreehost\/index.php\/wp-json\/wp\/v2\/comments?post=104593"}],"version-history":[{"count":0,"href":"https:\/\/new7.shop\/zerocostfreehost\/index.php\/wp-json\/wp\/v2\/posts\/104593\/revisions"}],"wp:attachment":[{"href":"https:\/\/new7.shop\/zerocostfreehost\/index.php\/wp-json\/wp\/v2\/media?parent=104593"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/new7.shop\/zerocostfreehost\/index.php\/wp-json\/wp\/v2\/categories?post=104593"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/new7.shop\/zerocostfreehost\/index.php\/wp-json\/wp\/v2\/tags?post=104593"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}