Phishing operation with links to Russia, Armenia compromised Western cargo companies, researchers find
嗯,用户让我用中文总结这篇文章,控制在100字以内,而且不需要特定的开头。首先,我需要快速浏览文章内容,抓住主要信息。 文章讲的是俄罗斯网络犯罪分子针对美国和欧洲的货运公司进行钓鱼攻击,窃取了超过1600个登录凭证。他们利用这些信息拦截和转移货物,还涉及支票欺诈。研究者通过发现的一个暴露的.git目录揭开了整个操作的细节,包括犯罪分子之间的交流。他们还发现了一个名为“MC Profit Always”的钓鱼服务平台,并且这个组织结构复杂,有呼叫中心、邮件支持等。此外,还有亚美尼亚语使用者参与其中,部分犯罪分子位于俄罗斯。最后,多个安全公司合作关停了这个基础设施。 现在要将这些信息浓缩到100字以内。重点包括:俄罗斯网络犯罪、针对货运公司、窃取凭证、拦截货物、钓鱼平台、组织结构复杂、涉及亚美尼亚语使用者、安全公司合作关停。 组合起来大概是:俄罗斯网络犯罪分子针对货运公司实施钓鱼攻击,窃取凭证并拦截货物。研究者发现其运作细节及钓鱼平台,并揭示其复杂组织结构。涉及亚美尼亚语使用者和俄罗斯关联企业。多安全公司合作关停该基础设施。 检查一下字数是否在100字以内,并确保没有使用特定的开头词。 </think> 俄罗斯网络犯罪分子针对美国和欧洲货运公司实施钓鱼攻击,窃取1600多个登录凭证并拦截货物。研究者发现其运作细节及“MC Profit Always”钓鱼平台,并揭示其复杂组织结构。涉及亚美尼亚语使用者和俄罗斯关联企业。多安全公司合作关停该基础设施。 2026-2-24 20:45:49 Author: therecord.media(查看原文) 阅读量:6 收藏

Researchers have uncovered and taken down the infrastructure of a phishing operation run by Russian cybercriminals targeting freight companies in the U.S. and Europe. 

Over a five-month period, the group, dubbed Diesel Vortex, stole more than 1,600 login credentials from accounts at logistics platforms, which allowed thieves to intercept and divert freight shipments and commit check fraud. 

The researchers with the domain protection platform Have I Been Squatted discovered an exposed .git directory, which revealed the ins and outs of the operation, including messages sent between the cybercriminals. 

The leaked repository exposed a phishing-as-a-service platform that was in the works to be marketed to customers as “MC Profit Always,” a likely reference to “motor carriers.” 

The Diesel Vortex cybercriminals built phishing infrastructure targeting users of the platforms that power the freight and logistics industries, like load boards — marketplaces where shippers, brokers and carriers connect — fleet management portals and fuel card systems. 

They impersonated carriers and brokers and were able to access freight systems. Messages seem to show them engaged in “double-brokering,” when loads are booked with a stolen carrier identity before the freight is reassigned to a different carrier. 

The researchers were able to find the outfit’s organizational map, revealing a sophisticated operation including a call center, mail support and employees responsible for connecting with drivers and other logistics contacts.

“This blueprint only reinforced what the codebase had already made clear: this was not an opportunistic campaign. It was a deliberate, structured criminal enterprise with defined roles, revenue targets, and a long-term growth strategy,” Have I Been Squatted researchers wrote. 

The company worked in collaboration with the cyber threat research outfit Ctrl-Alt-Int3l, which discovered in the phishing panel source code mention of a domain registered through a Russian provider and linked to a Russian-registered email address.

That email was then linked through corporate records to several Russian companies working in warehousing, transportation and wholesale trade. Recorded Future News reached out to the email address for comment and as of press time had not received a reply.  

Along with clear links to Russia, Armenian-speaking operators were also involved in the operation, with one of the criminals telling another he was located in Yerevan. In one chat, a member of the group asks in Armenian if they have the credentials of a carrier with “250k cargo” — in other words, one insured to carry high-value freight. 

According to the researchers, Google Threat Intelligence Group, Cloudflare, GitLab, IPInfo and Ping Identity were involved in taking down the infrastructure. 

Cargo theft has exploded in recent years, driven by the increasingly digital nature of the business, with annual losses estimated to be around $35 billion. In November, researchers at Proofpoint documented a hacking campaign with links to organized crime targeting trucking and logistics companies with remote monitoring tools.  

Last month, the House Judiciary Committee advanced the “Combatting Organized Retail Crime Act of 2025,” a bill to establish a coordinated federal response to cargo theft. It would also create new criminal penalties for the laundering of illicit proceeds or the sale of stolen goods.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

Recorded Future

No previous article

No new articles

James Reddick

James Reddick

has worked as a journalist around the world, including in Lebanon and in Cambodia, where he was Deputy Managing Editor of The Phnom Penh Post. He is also a radio and podcast producer for outlets like Snap Judgment.


文章来源: https://therecord.media/phishing-operation-russia-armenia-targeting-us-european-cargo
如有侵权请联系:admin#unsafe.sh