Heavy Duty Trucking Logo
MenuMENU
SearchSEARCH

How Today's Cybercriminals Con Their Way Into Trucking Operations

Trucking cybersecurity starts with people, not just firewalls. From fake invoices to phony IT calls, cybercriminals are tricking employees to gain access. Here’s what fleets need to know.

Ben Wilkens
Ben WilkensCybersecurity Principal Engineer, NMFTA
Read Ben's Posts
September 22, 2025
How Today's Cybercriminals Con Their Way Into Trucking Operations

The modern cybercriminal is increasingly relying on human weaknesses, not technical exploits.

HDT Graphic

6 min to read


This isn’t your grandad’s phishing lure.

While the art of the con has not changed much, the tools and techniques being used by cybercriminals have. And trucking operations may be especially at risk of succumbing to what's called "social engineering."  

Ad Loading...

Gone (as in filtered out, for the most part) are the infected attachments, the dodgy links to online sweepstakes prizes, and claims of a pending inheritance from a foreign royal if you “just send $500 in gift cards” for processing first. 

These cybersecurity threats have been replaced by domain-specific and industry-appropriate business communications designed to get through modern email filters. 

Ad Loading...

There are rate quote requests, requests for non-disclosure agreements (NDAs) or other documentation exchanges, outstanding invoice notifications, and contract negotiations, all gradually steered toward malicious payload deployments by skilled social engineers. 

We are also seeing these attacks more frequently via phone call or text, further reducing email’s perceived monopoly on malicious communications.

The modern cybercriminal is increasingly relying on human weaknesses, not technical exploits, to accomplish their actions on objectives. 

Our defensive technology has grown exponentially more capable of detecting malicious code, dangerous links, or even overtly manipulative content in our communications. However, the attackers have also adapted. They are using sophisticated psychological manipulation and the power of our innate trust in one another to attack us.

Look, Ma! No Exploits Required!

Take, for example, the threat actor group known as Scattered Spider. This group has been successfully targeting large enterprises across multiple industries with attacks that have nothing to do with technical exploitation. 

Ad Loading...

What is Social Engineering?

In a cybersecurity context, explains Carnegie Mellon University, "social engineering is the tactic of manipulating, influencing, or deceiving a victim in order to gain control over a computer system, or to steal personal and financial information. It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information."

These cybercriminals begin by impersonating internal IT support staff (“help desks”) and contacting employees over phone or text. Once they gain the trust of their target, they trick them into revealing credentials and installing remote assistance tools that enable remote access into the target’s corporate network.

They will then take this one step further and trick the target into providing them with multi-factor authentication codes as they compromise accounts with the stolen credentials — gaining complete access within the target environment, no technical vulnerabilities required.

It is also important to note here that the role the target has in the organization is not always one that makes them an “obvious” target. 

A way in is a way in for these cybercriminals, so anyone from a maintenance tech to a dispatcher to the CFO is fair game. They will simply use the original point of compromise as a springboard from which to pivot toward their ultimate target inside the organization’s network, whether that’s data theft, ransomware deployment, or installation of additional malicious tools.

Trucking is a Target-Rich Environment for this Cybercrime Tactic

In trucking, we are all operating at a fast pace, all the time. Plans often need to be adjusted at the last minute. “Fires” crop up all over the place that are addressed with a sense of urgency throughout any given work shift. 

Ad Loading...

"A way in is a way in for these cybercriminals, so anyone from a maintenance tech to a dispatcher to the CFO is fair game."

All this creates a prime targeting environment for cybercriminals using social engineering. 

Couple that with the fact that the average trucking company leverages human-to-human trust and relationships that are core to our industry. Trucking is a relationship industry, and not too long ago it was standard practice to execute contracts with a handshake and an agreement. 

Unfortunately, these factors are rapidly becoming our Achilles heel in transportation. Trust is easily abused by malicious actors, and speed is often the enemy of caution.

Preventing social engineering attacks requires, above all else, an awareness of three things:

  • Everyone is a potential target, in every organization (not just the big ones).

  • Speed, a sense of urgency, and the illusion of trust are central to these attacks.

  • Documented processes matter.

Ad Loading...

Prioritize Security-Conscious Internal Processes

Organizations can fight this threat by developing stronger defensive training and policies, as well as prioritizing the documentation of and adherence to security-conscious internal processes.

"The modern cybercriminal is increasingly relying on human weaknesses, not technical exploits, to accomplish their actions on objectives."

For example, regulating how technical support can interact with internal users. And training all internal users (based on role) on what these processes are, not just training IT. This gives everyone in an organization a shared understanding of what “normal” processes and requests should look like, making it easier to spot exceptions. This is an effective way to trip up social engineers in the early phases of an attack.

If all users know that IT will never ask them for a set of credentials, and IT knows never to ask an end user for a set of credentials, then what will happen when a caller claims to be “from IT” and asks for credentials? They will unmask themselves as a malicious actor and trigger a defensive response from the target.

The same applies to all other business processes. 

Consider financial teams. They must be trained in acceptable processes and procedures within the company, and all other teams must be aware of what is considered acceptable communication to and from the financial teams. 

Ad Loading...

Again, this elevates the likelihood of early recognition of a social engineering attempt: Asking for an account number change over email? Alarm bells! That is not our procedure, changes to accounts must use an internal form and be co-approved by a member of a list of approved individuals.

Don't Let Just Anyone Install New Software

Another strong defense is to enforce rigid controls around who can install new software on your company’s devices. 

All too often, legitimate remote assistance tools are being installed as a means of gaining access to target systems during a social engineering attack. These tools do not, by default, trigger alerts in Endpoint Detection and Response (EDR) or antivirus (AV) software, as they are not “malicious” applications when used properly.

What is EDR?

According to Microsoft, Endpoint Detection and Response (EDR) is a cybersecurity technology that continuously monitors endpoints for evidence of threats and performs automatic actions to help mitigate them. Endpoint are the many physical devices connected to a network, such as mobile phones, desktops, laptops, virtual machines, and Internet of Things (IoT) technology.

Ensuring that only authorized remote assistance/remote access tools are available in your environment and that only authorized internal staff are granted the authority to install additional applications can significantly reduce the risk of malicious access through installation of remote access tools.

Small steps like this can dramatically increase an organization’s resistance to social engineering attacks. 

Ad Loading...

Increasing this resistance is an operational imperative in the current environment, as the majority of all successful digital crimes are facilitated by successful social engineering attacks. 

Technology is evolving. Cybercriminal tactics are evolving. Organizations’ abilities to detect manipulative communications must evolve to keep pace. 

Education is the cornerstone of this evolution. Role-based security education must encompass the entire organization, and not just IT. Strong internal processes and consistent awareness of these processes across the organization facilitate an internal “early warning” system that will make social engineering attempts stand out as exceptions to the normal process. 

Increased awareness is not just another component of an organization’s protection strategy; it is the core of cybercrime prevention.

Editor's Note: This is the first in a new monthly series devoted to practical tips to help trucking fleets of all sizes improve their cybersecurity. NMFTA, the National Motor Freight Traffic Association, has an extensive focus on cybersecurity in the logistics sector. It hosts an annual cybersecurity conference that is open to non-NMFTA members and offers other educational resources related to cybersecurity in trucking. 

Subscribe to Our Newsletter

More Fleet Management

TEN disaster prep.
Fleet ManagementMay 1, 2026

How Fleets Can Avoid Equipment Blind Spots in Disaster Response

When the unexpected happens, how you react to, and deal with operational blind spots is critical. Here’s how to keep you recovery on track, when nothing is normal.

Read More →
Illustration of cybersecurity images with "The Cyber Stop" text
Fleet Managementby Ben WilkensApril 30, 2026

AI Security Risks for Trucking Fleets: What to Know About Deepfakes and Agentic AI

As fleets adopt artificial intelligence for routing, maintenance, and load matching, new security risks are emerging. Learn where the vulnerabilities are and how to put the right controls in place.

Read More →
Mobile tablet showing Motus screen against highway background with Motus logo

FMCSA’s Motus System Is Coming. What Fleets Need to Know Now

The long-awaited registration system promises a single portal — and tighter fraud controls.

Read More →
Ad Loading...
CargoNet 2026 Qi report.
Fleet Managementby News/Media ReleaseApril 24, 2026

Cargo Theft Incidents Fall in Q1, but Organized Crime and Impersonation Drive New Risks

CargoNet reports fewer supply chain crime events to start 2026. But losses hold steady as organized crime shifts tactics toward impersonation schemes and high-value goods.

Read More →
Graphic with light bulbs, HDT Truck Fleet Innovators logo, and the word Nominations
Fleet ManagementApril 24, 2026

Nominations Open for HDT Truck Fleet Innovators 2026

Heavy Duty Trucking is searching for forward-looking leaders at trucking fleets as nominations for HDT’s Truck Fleet Innovators 2026. Deadline is May 15.

Read More →
Illustration with trojan horse and lock with inside of cargo container in background
Fleet Managementby News/Media ReleaseApril 23, 2026

New Trojan Driver Cargo Theft Scam Bypasses Carrier Vetting Systems

Cargo theft rings plant operatives as drivers inside legitimate, fully vetted carriers, then execute coordinated thefts that look like a traditional straight theft from the outside.

Read More →
Ad Loading...
ATA Truck Tonnage Index March 2026.
Fleet Managementby News/Media ReleaseApril 22, 2026

March Truck Tonnage Posts Strongest Annual Gain Since 2022

A modest sequential increase capped the strongest quarterly performance in years, signaling continued freight momentum in early 2026.

Read More →
Toll road.
Fleet Managementby Jack RobertsApril 22, 2026

Ohio Turnpike Targets $5.2 Million in Unpaid Tolls from Trucking Firms

More than 300 carriers across 26 states have been sent to collections as the Ohio Turnpike cracks down on toll evasion and delinquent payments.

Read More →
Illustration with ATRI logo and square blocks spelling out "research"
Fleet Managementby Deborah LockridgeApril 20, 2026

'Beyond Compliance,' Regulations, Driver Coaching on ATRI’s 2026 Research List

The American Transportation Research Institute will examine driver coaching, regulatory impacts — including the "Beyond Compliance" concept —and weather disruptions that shape trucking operations.

Read More →
Ad Loading...
Brian Antonellis, senior vice president, fleet operations, Fleet Advantage.
Fleet Managementby Jack RobertsApril 17, 2026

Fleet Advantage's Brian Antonellis on the Growing Need to Replace Old Trucks

Fleet Advantage's Brian Antonellis says it's time for fleets to get back to the fundamentals of good maintenance practices. And that includes replacing older, inefficient equipment.

Read More →