Heavy Duty Trucking Logo
MenuMENU
SearchSEARCH

How Today's Cybercriminals Con Their Way Into Trucking Operations

Trucking cybersecurity starts with people, not just firewalls. From fake invoices to phony IT calls, cybercriminals are tricking employees to gain access. Here’s what fleets need to know.

Ben Wilkens
Ben WilkensCybersecurity Principal Engineer, NMFTA
Read Ben's Posts
September 22, 2025
How Today's Cybercriminals Con Their Way Into Trucking Operations

The modern cybercriminal is increasingly relying on human weaknesses, not technical exploits.

HDT Graphic

6 min to read


This isn’t your grandad’s phishing lure.

While the art of the con has not changed much, the tools and techniques being used by cybercriminals have. And trucking operations may be especially at risk of succumbing to what's called "social engineering."  

Gone (as in filtered out, for the most part) are the infected attachments, the dodgy links to online sweepstakes prizes, and claims of a pending inheritance from a foreign royal if you “just send $500 in gift cards” for processing first. 

Ad Loading...

These cybersecurity threats have been replaced by domain-specific and industry-appropriate business communications designed to get through modern email filters. 

There are rate quote requests, requests for non-disclosure agreements (NDAs) or other documentation exchanges, outstanding invoice notifications, and contract negotiations, all gradually steered toward malicious payload deployments by skilled social engineers. 

We are also seeing these attacks more frequently via phone call or text, further reducing email’s perceived monopoly on malicious communications.

The modern cybercriminal is increasingly relying on human weaknesses, not technical exploits, to accomplish their actions on objectives. 

Our defensive technology has grown exponentially more capable of detecting malicious code, dangerous links, or even overtly manipulative content in our communications. However, the attackers have also adapted. They are using sophisticated psychological manipulation and the power of our innate trust in one another to attack us.

Ad Loading...

Look, Ma! No Exploits Required!

Take, for example, the threat actor group known as Scattered Spider. This group has been successfully targeting large enterprises across multiple industries with attacks that have nothing to do with technical exploitation. 

What is Social Engineering?

In a cybersecurity context, explains Carnegie Mellon University, "social engineering is the tactic of manipulating, influencing, or deceiving a victim in order to gain control over a computer system, or to steal personal and financial information. It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information."

These cybercriminals begin by impersonating internal IT support staff (“help desks”) and contacting employees over phone or text. Once they gain the trust of their target, they trick them into revealing credentials and installing remote assistance tools that enable remote access into the target’s corporate network.

They will then take this one step further and trick the target into providing them with multi-factor authentication codes as they compromise accounts with the stolen credentials — gaining complete access within the target environment, no technical vulnerabilities required.

It is also important to note here that the role the target has in the organization is not always one that makes them an “obvious” target. 

A way in is a way in for these cybercriminals, so anyone from a maintenance tech to a dispatcher to the CFO is fair game. They will simply use the original point of compromise as a springboard from which to pivot toward their ultimate target inside the organization’s network, whether that’s data theft, ransomware deployment, or installation of additional malicious tools.

Ad Loading...

Trucking is a Target-Rich Environment for this Cybercrime Tactic

In trucking, we are all operating at a fast pace, all the time. Plans often need to be adjusted at the last minute. “Fires” crop up all over the place that are addressed with a sense of urgency throughout any given work shift. 

"A way in is a way in for these cybercriminals, so anyone from a maintenance tech to a dispatcher to the CFO is fair game."

All this creates a prime targeting environment for cybercriminals using social engineering. 

Couple that with the fact that the average trucking company leverages human-to-human trust and relationships that are core to our industry. Trucking is a relationship industry, and not too long ago it was standard practice to execute contracts with a handshake and an agreement. 

Unfortunately, these factors are rapidly becoming our Achilles heel in transportation. Trust is easily abused by malicious actors, and speed is often the enemy of caution.

Preventing social engineering attacks requires, above all else, an awareness of three things:

Ad Loading...
  • Everyone is a potential target, in every organization (not just the big ones).

  • Speed, a sense of urgency, and the illusion of trust are central to these attacks.

  • Documented processes matter.

Prioritize Security-Conscious Internal Processes

Organizations can fight this threat by developing stronger defensive training and policies, as well as prioritizing the documentation of and adherence to security-conscious internal processes.

"The modern cybercriminal is increasingly relying on human weaknesses, not technical exploits, to accomplish their actions on objectives."

For example, regulating how technical support can interact with internal users. And training all internal users (based on role) on what these processes are, not just training IT. This gives everyone in an organization a shared understanding of what “normal” processes and requests should look like, making it easier to spot exceptions. This is an effective way to trip up social engineers in the early phases of an attack.

If all users know that IT will never ask them for a set of credentials, and IT knows never to ask an end user for a set of credentials, then what will happen when a caller claims to be “from IT” and asks for credentials? They will unmask themselves as a malicious actor and trigger a defensive response from the target.

The same applies to all other business processes. 

Ad Loading...

Consider financial teams. They must be trained in acceptable processes and procedures within the company, and all other teams must be aware of what is considered acceptable communication to and from the financial teams. 

Again, this elevates the likelihood of early recognition of a social engineering attempt: Asking for an account number change over email? Alarm bells! That is not our procedure, changes to accounts must use an internal form and be co-approved by a member of a list of approved individuals.

Don't Let Just Anyone Install New Software

Another strong defense is to enforce rigid controls around who can install new software on your company’s devices. 

All too often, legitimate remote assistance tools are being installed as a means of gaining access to target systems during a social engineering attack. These tools do not, by default, trigger alerts in Endpoint Detection and Response (EDR) or antivirus (AV) software, as they are not “malicious” applications when used properly.

What is EDR?

According to Microsoft, Endpoint Detection and Response (EDR) is a cybersecurity technology that continuously monitors endpoints for evidence of threats and performs automatic actions to help mitigate them. Endpoint are the many physical devices connected to a network, such as mobile phones, desktops, laptops, virtual machines, and Internet of Things (IoT) technology.

Ensuring that only authorized remote assistance/remote access tools are available in your environment and that only authorized internal staff are granted the authority to install additional applications can significantly reduce the risk of malicious access through installation of remote access tools.

Ad Loading...

Small steps like this can dramatically increase an organization’s resistance to social engineering attacks. 

Increasing this resistance is an operational imperative in the current environment, as the majority of all successful digital crimes are facilitated by successful social engineering attacks. 

Technology is evolving. Cybercriminal tactics are evolving. Organizations’ abilities to detect manipulative communications must evolve to keep pace. 

Education is the cornerstone of this evolution. Role-based security education must encompass the entire organization, and not just IT. Strong internal processes and consistent awareness of these processes across the organization facilitate an internal “early warning” system that will make social engineering attempts stand out as exceptions to the normal process. 

Increased awareness is not just another component of an organization’s protection strategy; it is the core of cybercrime prevention.

Ad Loading...

Editor's Note: This is the first in a new monthly series devoted to practical tips to help trucking fleets of all sizes improve their cybersecurity. NMFTA, the National Motor Freight Traffic Association, has an extensive focus on cybersecurity in the logistics sector. It hosts an annual cybersecurity conference that is open to non-NMFTA members and offers other educational resources related to cybersecurity in trucking. 

Subscribe to Our Newsletter

More Fleet Management

Daimler-Class8 partnership.
Fleet Managementby News/Media ReleaseFebruary 2, 2026

DTNA Partners with Class8 to Expand Digital Services for Freightliner Owner-Operators

A new partnership brings free wireless ELD service plus load optimization and dispatch planning tools to fourth- and fifth-generation Freightliner Cascadia customers, with broader model availability planned through 2026.

Read More →
SponsoredFebruary 1, 2026

Reducing Fleet Downtime with Advanced Diagnostics

This white paper examines how advanced commercial vehicle diagnostics can significantly reduce fleet downtime as heavy duty vehicles become more complex. It shows how Autel’s CV diagnostic tools enable in-house troubleshooting, preventive maintenance, and faster repairs, helping fleets cut emissions-related downtime, reduce dealer dependence, and improve overall vehicle uptime and operating costs.

Read More →
SponsoredFebruary 1, 2026

Stop Watching Footage, Start Driving Results

6 intelligent dashcam tactics to improve safety and boost ROI

Read More →
Ad Loading...
M&A illustration with Werner and FirstFleet logos
Fleet Managementby Deborah LockridgeJanuary 29, 2026

Werner Expands Dedicated Fleet Nearly 50% With FirstFleet Acquisition

The $283 million acquisition of FirstFleet makes Werner the fifth-largest dedicated carrier and pushes more than half of its revenue into contract freight.

Read More →
Bobit Business Media B2X Rewards.
Fleet Managementby News/Media ReleaseJanuary 29, 2026

Bobit Business Media Launches B2X Rewards Engagement Program

B2X Rewards is a new, gamified rewards program aimed at driving deeper engagement across BBM’s digital platforms, newsletters, events, and TheFleetSource.com.

Read More →
Trucking Trends series graphic
Fleet Managementby Deborah LockridgeJanuary 29, 2026

AI is Reshaping Trucking in 2026, from the Back Office to the Shop

Trucking’s biggest technology shifts in 2026 have one thing in common: artificial intelligence.

Read More →
Ad Loading...
Column graphic illustration with Deborah Lockridge head shot and a small fleet truck in the background
Fleet Managementby Deborah LockridgeJanuary 27, 2026

Why Small Trucking Fleets Are Still Standing [Commentary]

Why discipline, relationships, and focus have mattered more than size for smaller trucking fleets during the freight recession.

Read More →
Fleet Managementby Deborah LockridgeJanuary 23, 2026

Cargo Theft Is Surging. A Bill in Congress Could Help. [Video]

Cargo theft losses hit $725 million last year. In this HDT Talks Trucking Short Take video, Scott Cornell explains how a bill moving in Congress could bring federal tracking, enforcement, and prosecutions to help address the problem.

Read More →
CargoNet infographic showing 2025 cargo theft trends
Fleet Managementby Deborah LockridgeJanuary 22, 2026

Cargo Theft Losses Jump 60% in 2025 as Criminals Target Higher-Value Freight

Cargo theft activity across North America held relatively steady in 2025 — but the financial damage did not, as ever-more-sophisticated organized criminal groups shifted their cargo theft focus to higher-value shipments.

Read More →
Ad Loading...
Phillips Connect -- McLeod smart trailer TMS.
Fleet ManagementJanuary 22, 2026

Phillips Connect, McLeod Integrate Smart Trailer Data into TMS Workflows

A new partnership between Phillips Connect and McLeod allows fleets to view trailer health, location, and cargo status inside the same McLeod workflows used for planning, dispatch, and execution.

Read More →