How Hackers Are Hijacking Cargo Shipments — and How Freight Brokers & Carriers Can Stop It
TL;DR: Criminals are increasingly compromising freight brokers and carriers through targeted email attacks that trick employees into installing legitimate remote-management tools such as ConnectWise Control (formerly ScreenConnect) and NetSupport. Once inside, attackers pivot to booking systems, BOLs, and invoices to reroute containers, spoof pickups, or intercept payments. This post explains the attack flow, real-world impact, signs of compromise, and practical defenses every logistics company should implement.
Why logistics is a high-value target
Freight brokers and carriers sit at the center of global supply chains. They hold:
-
Sensitive shipment manifests and bills of lading (BOLs)
-
Customer and vendor bank/payment details
-
Access to driver/terminal scheduling and pickup/delivery windows
That data — and the ability to change it quickly — is extremely valuable to criminals who want to reroute shipments, stage thefts, or conduct invoice fraud. Compared to ripping open a container at sea, hacking a broker’s email or workstation is cheap, fast, and low-risk.
The common attack pattern (high level — not a how-to)
-
Spear-phishing email targets an operations clerk, dispatcher, or accounting user (often disguised as a carrier, shipper, or internal ticket).
-
The email contains a malicious attachment or link that looks like a legitimate document (invoice, SOF, pickup confirmation).
-
Opening the attachment or following the link triggers an installer or macro that drops a remote-management tool or enables a legitimate remote-management session. Attackers often use legitimate remote access/remote-control products (ConnectWise Control / ScreenConnect, NetSupport, AnyDesk, etc.) because they blend in with normal IT admin activity.
-
With remote-control access, attackers move laterally to TMS/booking systems, edit BOLs, change delivery instructions, and modify payment details — or they simply exfiltrate data needed to plan a physical interception.
-
The result: diverted loads, missing shipments, fraudulent reroutes, and unauthorized payments.
Important: attackers prefer legitimate tools because they’re harder to flag than obvious malware. That’s why preventing unauthorized remote-tool installs and monitoring their use matters.
Real-world impacts logistics teams are seeing
-
Drivers arriving at the wrong pickup location or finding cargo already picked up.
-
Containers rerouted to criminal staging yards.
-
Fraudulent changes to BOLs and delivery appointment windows.
-
Spoofed invoices with altered banking instructions, leading to diverted wire transfers.
-
Operational chaos and reputational damage with customers.
Red flags and indicators of compromise (what to watch for)
-
New or unexpected remote-control software installed on office workstations (ConnectWise Control, NetSupport, AnyDesk, etc.).
-
Unusual login times for operational accounts (late-night or off-shift access).
-
Multiple failed/successful attempts to access TMS, accounting, or shipment modification pages.
-
New services, scheduled tasks, or persistent processes on dispatch/accounting machines.
-
Outbound connections to unfamiliar remote-control domains or IPs.
-
Customers reporting pickups that never happened or deliveries that were rerouted.
Practical mitigations — what freight brokers and carriers should implement now
1) Strengthen email defenses
-
Enforce SPF, DKIM, and DMARC to reduce spoofed sender fraud.
-
Deploy advanced email-threat protection (sandboxing for attachments, URL rewriting, attachment detonation).
-
Block macro-enabled Office attachments by default; use secure viewer tools.
2) Reduce the blast radius of compromised accounts
-
Require MFA on all email, TMS, accounting, and remote-access accounts (use MFA apps or hardware keys).
-
Enforce least-privilege: users should have only the permissions needed for their role (no admin rights for dispatch clerks).
-
Use role-based access controls (RBAC) in TMS and booking systems.
3) Lock down remote management tools
-
Maintain an approved inventory of RMM/remote-control software; block/install by policy only for IT-managed machines.
-
Whitelist allowed remote management servers and require certificates for remote sessions.
-
Disable local installation of new remote-control tools through application allowlisting or endpoint policies.
4) Monitor and detect quickly
-
Deploy Endpoint Detection & Response (EDR) and configure alerts for new service creation, suspicious persistence, and unknown remote-control connections.
-
Log and monitor TMS/BOL change events; alert on edits that change delivery locations, bank details, or consignee information.
-
Feed logs into a SIEM or managed detection service for correlation.
5) Operational controls and business process changes
-
Require out-of-band verification (phone call verification to a known number) for any bank-account changes, urgent reroutes, or shipment hold requests.
-
Use digital signatures or hashed manifests where possible to prove files haven’t been altered.
-
Implement approval workflows for manual changes to high-risk fields (delivery address, consignee, bank account).
6) Vendor & third-party hygiene
-
Verify brokers, carriers, terminals, and 3PLs use secure practices and contractually require security baselines.
-
Limit third-party access to only the systems and data they need, and audit that access.
7) Backups & business continuity
-
Regularly snapshot and securely store TMS and financial records offline so operations can be restored after an incident.
-
Maintain a tested incident-response / communications playbook for customer notifications and law enforcement engagement.
Detection: what specific things your security team should look for
-
Processes named like remote-control software (e.g.,
ConnectWise.Control.*,NetSupport.exe) running on non-IT endpoints. -
Outbound connections to remote-control vendor domains from unusual machines.
-
New Windows services or scheduled tasks created by non-admin users.
-
Sudden spikes in exported manifests, BOLs, or payroll/driver lists.
(If you don’t have visibility into these signals, prioritize getting EDR and proper logging on endpoints and servers used for operations and accounting.)
Responding to a suspected compromise
-
Isolate the affected workstation(s) from the network.
-
Preserve logs and take forensic images where possible.
-
Rotate credentials for affected accounts and require MFA reset.
-
Review recent TMS changes and revert fraudulent edits — notify impacted customers and carriers.
-
Notify law enforcement and file appropriate incident reports (cargo theft and fraud teams).
-
Conduct a root-cause analysis and remediate gaps (email, endpoint controls, processes).
Quick checklist (copy-paste for your ops team)
-
Enforce SPF/DKIM/DMARC for all company domains
-
Block macro-enabled attachments and sandbox all attachments/URLs
-
Require MFA everywhere (email, TMS, finance)
-
Remove admin rights from non-IT users
-
Inventory and lock down remote-management tools (allowlist only)
-
Deploy EDR and log forwarding to SIEM
-
Add out-of-band verification for bank changes and reroutes
-
Test backups and incident response runbooks quarterly
Example phishing subjects attackers use (for training)
-
“Pickup confirmation — ACTION REQUIRED”
-
“Invoice #4321 — Overdue payment”
-
“Updated Bill of Lading for container XYZ”
-
“Urgent: change of delivery address — sign attached”
Use these in phishing simulations to help staff recognize suspicious patterns.
Conclusion — the good news
Most of these attacks succeed because they exploit gaps in email security, endpoint controls, and process design — all of which are fixable. By combining stronger email defenses, strict control over remote-management tools, robust endpoint monitoring, and simple operational verifications (like phone callbacks for bank changes), brokers and carriers can dramatically reduce the risk of hijacked shipments.
Need help locking this down?
If you want a practical next step, Equal Tech Solutions can:
-
Run a focused security assessment on your email/TMS/endpoints.
-
Harden remote-access policies and deploy allowlisting.
-
Implement monitoring rules to catch malicious remote-control activity.
-
Run employee phishing simulations and tailored training.




