‘Diesel Vortex’ Phishing Ring Steals Over 1,600 Credentials from US & European Logistics Firms

Sophisticated 'Diesel Vortex' Phishing Campaign Hits Freight and Logistics Industry with Advanced Evasion Techniques

HIGH
February 28, 2026
5m read
PhishingThreat ActorCyberattack

Related Entities

Threat Actors

Diesel Vortex

Organizations

Google Threat Intelligence Group

Other

DAT TruckstopPenske Logistics Electronic Funds Source (EFS)TimocomTelerouteGirtekaGitLab Cloudflare

Full Report

Executive Summary

A highly organized, financially motivated threat group tracked as Diesel Vortex has been conducting a large-scale phishing campaign against the freight and logistics sectors in the United States and Europe since at least September 2025. The operation successfully stole 1,649 unique credentials by targeting users of critical industry platforms like DAT Truckstop, Penske Logistics, and Electronic Funds Source (EFS). The attackers leveraged a sophisticated Phishing-as-a-Service (PaaS) kit, employing advanced tactics such as typosquatted domains, voice phishing (vishing) to bypass MFA, and a 'Dual-Domain Deception' technique to evade detection. The discovery of an exposed .git repository provided critical intelligence, leading to the takedown of the group's infrastructure in a coordinated effort involving Cloudflare and Google's Threat Intelligence Group.


Threat Overview

The Diesel Vortex campaign represents a significant threat to the supply chain and transportation industries. The group's primary motive is financial gain, achieved by compromising accounts on freight exchanges and fuel card systems. This access is then used to commit fraud, such as 'double-brokering'—where stolen carrier identities are used to take control of legitimate shipments, which are then diverted and stolen. The investigation uncovered 35 confirmed instances of EFS check fraud stemming from the compromised credentials.

The operation was notable for its professionalism and technical sophistication. It included a full-service PaaS model with a call center and email support, 52 typosquatted domains that were near-perfect clones of legitimate portals, and the use of Telegram bots for real-time communication and MFA code theft. The actors are assessed to be Armenian-speaking with links to Russian infrastructure, indicating a transnational criminal enterprise.

Technical Analysis

The campaign's success hinged on a combination of social engineering and technical evasion techniques designed to defeat both human and automated defenses.

Attack Chain & TTPs

  1. Resource Development (T1586.002 - Email Accounts): The group targeted over 75,000 email contacts, likely gathered from industry lists or previous breaches.
  2. Phishing (T1566.002 - Spearphishing Link): Victims received spearphishing emails containing links to one of 52 typosquatted domains.
  3. User Execution (T1204.001 - Malicious Link): The user clicks the link, leading them to a convincing phishing page.
  4. Defense Evasion (T1608.005 - Link Target Manipulation): The attackers used a 'Dual-Domain Deception' technique. A seemingly clean domain loaded the actual phishing kit from a separate, malicious domain within a hidden iframe. This helps bypass some browser-based phishing detection that only analyzes the primary URL.
  5. Credential Access (T1598.003 - Spearphishing Voice): If a user entered credentials, the system would prompt for an MFA code. The PaaS kit likely triggered an alert to the attackers, who would then engage in vishing (a phone call) or use Telegram to socially engineer the victim into providing the real-time MFA code.
  6. Valid Accounts (T1078 - Valid Accounts): With credentials and the MFA code, the attackers gained full access to the victim's account on the targeted platform.
  7. Impact ([Financial Theft]): The attackers used this access to divert payments, steal cargo through double-brokering, and commit check fraud.

The exposure of the group's .git repository was a critical operational security failure. It allowed researchers to reconstruct the phishing kit's source code and access a 36.6MB SQL database, providing a comprehensive view of the campaign's scale and victims.

Impact Assessment

The Diesel Vortex campaign has had a direct and severe financial impact on the freight and logistics industry.

  • Direct Financial Loss: The theft of cargo and funds through double-brokering and check fraud represents millions of dollars in losses for affected carriers and shippers.
  • Operational Disruption: Compromised accounts on platforms like DAT Truckstop can lead to significant disruption of logistics planning and execution, causing delays and contractual penalties.
  • Supply Chain Risk: The ability to divert cargo poses a broader risk to the integrity of the supply chain, potentially affecting the delivery of critical goods.
  • Erosion of Trust: Such campaigns erode trust in the digital platforms that are essential for the modern logistics industry.

Detection & Response

Detecting this campaign requires a multi-layered approach focusing on email security, web traffic analysis, and user awareness.

Detection Strategies

  • Email Security Gateway: Use advanced email filtering to detect and block emails from typosquatted domains and those containing suspicious links. Analyze email headers for signs of spoofing.
  • Web Proxy/DNS Filtering: Block access to known phishing domains. Monitor DNS logs for queries to newly registered or suspicious-looking domains that mimic company or partner brands. D3FEND's D3-DNSDL: DNS Denylisting is essential.
  • User Behavior Analytics (UBA): Monitor for anomalous login behavior, such as logins from unexpected locations or multiple failed MFA attempts followed by a success, which could indicate a real-time phishing attack.

Response Actions Taken

  • A coordinated takedown effort involving GitLab, Cloudflare, and Google dismantled the phishing infrastructure.
  • The exposed database allowed for victim notification.

Mitigation

Defending against sophisticated phishing requires technical controls and continuous user education.

Tactical Recommendations

  • Phishing-Resistant MFA (M1032 - Multi-factor Authentication): While Diesel Vortex bypassed some MFA, organizations should prioritize the adoption of phishing-resistant MFA methods like FIDO2/WebAuthn, which are not susceptible to real-time credential and session relay attacks.
  • User Training (M1017 - User Training): Conduct regular, realistic phishing simulation and training. Specifically educate users on vishing tactics and the danger of sharing MFA codes over the phone or chat, even if the person seems legitimate.
  • Restrict Web-Based Content (M1021 - Restrict Web-Based Content): Implement strict web filtering to block access to uncategorized or newly registered domains. This can prevent users from ever reaching the phishing page.
  • Brand Monitoring: Proactively monitor for typosquatted domains that mimic your organization's or your key partners' websites and initiate takedown procedures immediately upon discovery.

Timeline of Events

1
September 1, 2025
The 'Diesel Vortex' phishing campaign is believed to have started.
2
February 27, 2026
Joint research is published, and a coordinated takedown of the phishing infrastructure is announced.
3
February 28, 2026
This article was published

MITRE ATT&CK Mitigations

Train users to identify phishing and vishing attempts, and to never share MFA codes. This is the primary defense against the social engineering aspect of the campaign.

Implement phishing-resistant MFA, such as FIDO2 hardware keys, to prevent credential theft even if the user is tricked.

Mapped D3FEND Techniques:

Use web filters to block access to known malicious and newly registered domains, preventing users from reaching the phishing pages.

D3FEND Defensive Countermeasures

To combat the 'Diesel Vortex' campaign's use of 52 typosquatted domains, organizations in the logistics sector must deploy robust URL Analysis at the email gateway and web proxy. This technique involves more than just checking a URL against a denylist. Advanced systems should analyze URLs in real-time for suspicious characteristics, such as the use of Punycode, excessive subdomains, or slight misspellings of trusted brands like 'Truckstop' or 'Penske'. The 'Dual-Domain Deception' tactic, which loads a malicious iframe, can be specifically countered by solutions that dynamically analyze rendered web page content, not just the initial URL. By inspecting the final destination of all links and the content they load, security tools can identify the malicious payload and block the connection, even if the initial link appears benign. This is a critical defense layer to prevent employees from ever being exposed to the credential harvesting form.

The 'Diesel Vortex' campaign's success in bypassing MFA through vishing underscores the need for stronger authentication methods. While any MFA is better than none, organizations should strategically move towards phishing-resistant authenticators. This means migrating away from SMS and one-time password (OTP) apps where possible, as these are vulnerable to social engineering. The gold standard is to implement FIDO2/WebAuthn-based authentication, using hardware security keys (e.g., YubiKey) or platform authenticators (e.g., Windows Hello, Face ID). These methods create a cryptographic bond between the user, the device, and the specific service being accessed, making it impossible for an attacker to capture a code and reuse it on their own machine. For the targeted logistics platforms, mandating FIDO2 for all users would have completely neutralized the attackers' ability to take over accounts, even if a user fell for the initial phishing lure.

A proactive defense against campaigns like 'Diesel Vortex' is the aggressive use of DNS Denylisting. Security teams should subscribe to high-quality threat intelligence feeds that provide lists of known phishing and malicious domains, and integrate these into their DNS resolvers (e.g., Cisco Umbrella, Quad9) or firewalls. Furthermore, organizations can create their own proactive denylists by monitoring Certificate Transparency logs for newly registered domains that mimic their brand or key partners ('typosquatting'). For example, a rule could automatically flag any new domain containing 'truckst0p' or 'pensk-logistics'. By blocking DNS resolution for these domains at the network edge, employees are prevented from ever connecting to the phishing sites, effectively cutting off the attack at its earliest stage. This automated defense scales well and reduces the reliance on users to spot sophisticated fake websites.

Sources & References

Russian cybercrime ring targeted freight firms in US, Europe, report says
FreightWaves (freightwaves.com) February 27, 2026
Ankura CTIX FLASH Update – February 27, 2026
Ankura (ankura.com) February 27, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

phishing-as-a-servicevishingMFA bypasstyposquattingcredential theftsupply chainfreightlogistics

📢 Share This Article

Help others stay informed about cybersecurity threats