On the wire

FBI warns of escalating cyber-enabled cargo

1st May 2026

The FBI has issued a warning about a sharp increase in cyber-enabled cargo theft, with criminal groups employing sophisticated email spoofing, malware, and fraudulent operations to hijack shipments worth hundreds of millions of dollars, highlighting evolving digital threats in the logistics sector.

The FBI has warned of a sharp rise in cyber-enabled cargo theft, saying criminal groups are increasingly using spoofed emails, fake websites and stolen logins to infiltrate freight brokers and carriers before diverting shipments for resale. The alert, issued through the agency’s Internet Crime Complaint Centre, says the tactic has been visible since at least 2024 and is now becoming more organised and more profitable.

According to the FBI, the fraud often begins with a message that looks like an ordinary business enquiry or complaint. A broker or carrier is then pushed towards a malicious link or phoney portal that installs malware or remote-access software, giving attackers control over internal systems. Once inside, the criminals can alter shipment details, post false loads on freight boards and use compromised carrier identities to bid on real, high-value jobs.

The agency says the scheme can then move quickly into physical theft. In some cases, the criminals arrange a double-brokering chain, hiring an unsuspecting driver to collect the cargo before moving the goods through cross-docking or transloading and selling them on the black market. Other victims are effectively held to ransom, with thieves demanding payment in return for the location of stolen freight.

The FBI’s warning fits a broader pattern documented across the logistics sector over the past year. Proofpoint said late in 2025 that it had observed similar campaigns, while the National Motor Freight Traffic Association has argued that cyber intrusion is increasingly replacing older forms of cargo theft. The National Insurance Crime Bureau has also pointed to growing digital manipulation in the supply chain, and BSI said in April that supply chain thefts rose sharply in 2025 amid expanding cyber threats and shifting trade pressures.

The scale of the problem is now substantial. The FBI said estimated cargo theft losses in the United States and Canada climbed to nearly $725 million in 2025, up 60 per cent from the previous year, while confirmed incidents rose 18 per cent and the average loss per theft increased 36 per cent to $273,990. The agency urged companies to watch for warning signs including suspicious email addresses, unauthorised shipment activity, requests to download files through shortened or spoofed links, and unexpected forwarding or autodeletion rules in email accounts.

Source Reference Map

Inspired by headline at: [1]

Sources by paragraph:
– Paragraph 1: [2], [1]
– Paragraph 2: [2], [6], [7]
– Paragraph 3: [2], [6]
– Paragraph 4: [3], [4], [7]
– Paragraph 5: [2], [3], [4]

Source: Noah Wire Services

Verification / Sources

  • https://www.securityweek.com/fbi-warns-of-surge-in-hacker-enabled-cargo-theft/ – Please view link – unable to able to access data
  • https://www.ic3.gov/PSA/2026/PSA260430 – The FBI’s Internet Crime Complaint Center (IC3) issued a Public Service Announcement on April 30, 2026, warning of a surge in cyber-enabled strategic cargo theft. Cyber threat actors are increasingly using sophisticated tactics to impersonate legitimate businesses, hijack freight, steal high-value shipments, and reroute deliveries. Since at least 2024, these actors have gained unauthorized access to the computer systems of brokers and carriers through spoofed emails, fake URLs, and compromised carrier accounts. In 2025, estimated cargo theft losses in the United States and Canada surged to nearly $725 million, a 60% increase from 2024, with confirmed cargo theft incidents rising by 18%. The average value per theft rose 36% to $273,990, driven by more selective, high-value targets. The announcement details the methods used by cybercriminals, including compromising initial victim accounts, posting fake loads online, and exploiting stolen carrier identities to bid on high-value shipments. The FBI provides indicators for companies to identify potential targeting, such as unauthorized shipments, suspicious email addresses, and requests to download documents via shortened or spoofed links. The full announcement is available at the provided URL.
  • https://www.nicb.org/news/news-releases/nicb-warns-increased-cargo-theft-2025 – The National Insurance Crime Bureau (NICB) issued a warning on June 25, 2025, about the increased threat of cargo theft. The NICB highlighted that the digitalization of the supply chain has created vulnerabilities that criminals exploit, leading to fraudulent pickups, fictitious carriers, and cyber-enabled logistics manipulation. The value of stolen merchandise and estimated loss rose to more than $1 billion in 2023, with cargo crimes increasing to an all-time high, up 27% from 2023. Annual cargo theft losses are expected to rise another 22% from already historic levels by the end of 2025. The NICB emphasizes the need for collaboration among the transportation industry, insurance carriers, and law enforcement to share data and identify patterns to deter this crime. The full release is available at the provided URL.
  • https://www.bsigroup.com/en-GB/insights-and-media/media-centre/press-releases/2026/april/supply-chain-thefts-soar-in-2025-with-over-50-increase-bsi-report-finds/ – BSI’s 2026 Supply Chain Risks and Opportunities Report, released on April 9, 2026, reveals a 56% increase in supply chain thefts in 2025. The report attributes this rise to factors such as expanding tariffs, export controls, and shifting trade policies, which have disrupted sourcing strategies and accelerated supply chain restructuring. Cyberattacks have also increased in both frequency and sophistication, with at least 32 recorded incidents in the maritime sector alone. The report highlights that cyber-enabled thefts, including phishing, spoofed carriers, and stolen identities, are increasingly used to gain access to legitimate shipments and divert cargo. The full report is available at the provided URL.
  • https://www.carriermanagement.com/news/2026/03/26/286110.htm – A report from Geotab Inc., published on March 26, 2026, indicates that cargo theft losses in North America reached an estimated $6.6 billion in 2025. The report highlights that criminals are increasingly using cybercrime tactics, including GPS spoofing, stolen credentials, and AI-powered social engineering, to target high-value shipments with precision. This shift in tactics demands a fundamentally different response from the industry. The full report is available at the provided URL.
  • https://www.scworld.com/brief/advanced-cyber-enabled-cargo-heists-on-the-rise – An article from SC Media, dated December 18, 2025, discusses the rise of advanced cyber-enabled cargo heists. The National Motor Freight Traffic Association (NMFTA) noted that cyber intrusion-driven cargo theft is increasingly overshadowing traditional cargo heists in the logistics and transportation sector. The article highlights that cybercriminals are using techniques such as AI, business email compromise, and dispatch system hacking to compromise shippers, carriers, and brokers. The NMFTA’s 2026 Transportation Industry Cybersecurity Trends Report emphasizes the correlation between digital compromise and physical theft, noting that cyber intrusion often precedes or directly enables freight theft. The full article is available at the provided URL.
  • https://www.tomshardware.com/tech-industry/cyber-security/cyber-firm-warns-hackers-are-teaming-up-with-crime-rings-to-hijack-cargo – An article from Tom’s Hardware, published on November 3, 2025, reports that cybersecurity firm Proofpoint has observed hackers collaborating with organized crime groups to hijack physical cargo shipments. These attackers use phishing emails and social engineering techniques to infiltrate freight brokers and trucking carriers. Once inside targeted systems, they deploy credential-stealing tools or remote-access malware to manipulate shipment information and reroute cargo for theft. The stolen goods, such as food, electronics, and beverages, are often sold online or smuggled overseas. The article highlights that these schemes are linked to at least three known criminal networks and have identified nearly two dozen unique campaigns in the past two months alone. The full article is available at the provided URL.

Noah Fact Check Pro

The draft above was created using the information available at the time the story first
emerged. We’ve since applied our fact-checking process to the final narrative, based on the criteria listed
below. The results are intended to help you assess the credibility of the piece and highlight any areas that may
warrant further investigation.

Freshness check

Score: 8

Notes: The article references a recent FBI Public Service Announcement (PSA) dated April 30, 2026, indicating timely information. However, similar reports from late 2025, such as those from Proofpoint and the National Motor Freight Traffic Association, suggest that the issue has been ongoing for some time. This raises questions about the novelty of the information presented.

Quotes check

Score: 7

Notes: The article includes direct quotes from the FBI’s PSA. While these quotes are directly sourced, the article does not provide specific attributions or direct links to the original PSA, making independent verification challenging. The absence of clear sourcing for these quotes is a concern.

Source reliability

Score: 6

Notes: The primary source, SecurityWeek, is a niche publication focusing on cybersecurity news. While it is reputable within its niche, it may not have the same level of scrutiny as major news organisations. The article also references the FBI’s PSA, which is a primary source. However, the lack of direct links to the PSA and reliance on a secondary source diminishes the overall reliability.

Plausibility check

Score: 8

Notes: The claims about a surge in cyber-enabled cargo theft are plausible and align with previous reports from late 2025. However, the article does not provide new data or insights beyond what was previously reported, raising questions about the originality of the content.

Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is temporarily stored in your browser and helps our team to understand which sections of the website you find most interesting and useful.

More information about our Cookie Policy

Send this to a friend