March 2026
NMFTA Cyber Intelligence Newsletter
The National Motor Freight Traffic Association, Inc.® (NMFTA)™ has designed this monthly e-newsletter to arm you with intelligence, tools, and defense tactics. Each month we cover enterprise system and rolling asset security, trending reports, and more.
North America's Premier Cybersecurity Event for the Trucking Industry
Early bird registration is live for the NMFTA 2026 Cybersecurity Conference, and this is your chance to lock in $50 off before prices increase.
Join trucking cybersecurity professionals defending the transportation industry at the 2026 NMFTA Cybersecurity Conference, September 29-October 2 in Long Beach, CA.
NMFTA is Helping the Industry Respond to Rising Rates of Freight Fraud
The Freight Fraud Prevention Hub is a new industry initiative designed to bring together education, best practices, verification resources, and collaborative solutions in one centralized destination. The Hub combines expertise from across NMFTA including cybersecurity, classification, Standard Carrier Alpha Code® (SCAC™) identity verification, and digital standards to help the industry educate teams, detect fraud signals earlier, and prevent incidents before they occur.
Plus: Join the Freight Fraud Prevention Hub Quarterly Webinar Series on March 19, 1:00–2:00 PM ET to learn practical steps for detecting and preventing freight fraud.
Join the Fight Against Freight Fraud
NMFTA is seeking industry partners to help strengthen collaboration and share freight fraud prevention resources across the supply chain. Learn how you can get involved and support industry-wide protection efforts.
Explore How Modern Cyberattacks Unfold
in the 2026 Cybersecurity Trends Report
Threat actors operate like full-scale enterprises. They recruit specialists, divide responsibilities, share resources, and collaborate across networks with the same efficiency as legitimate transportation operations.
The 2026 Transportation Industry Cybersecurity Trends Report explores how modern threat actors operate and what it takes to stay ahead of them.
Download the report and equip your team with the intelligence needed to move from reactive defense to proactive protection.
Operational Security is Organizational Security
Operational security plays a critical role in protecting organizations from cyber-enabled threats and freight fraud. Learn how everyday operational patterns and shared information can unintentionally expose vulnerabilities, and how stronger operational awareness can help reduce risk.
Cybersecurity: Not Just a Technical Choice, a Legal Obligation
Cybersecurity is becoming a legal obligation for organizations across the supply chain. Read how evolving regulations are changing the way companies must approach cyber risk and compliance.
Your Monthly Webinar Delivered
Stop Clicking On...Stuff!
April 16, 2026 | 1:00-2:00 pm ET
Join NMFTA experts and James McQuiggan, a cybersecurity veteran with 25+ years of experience, as they walk through the dramatic rise of several new social engineering groups who have been attacking our industry and discuss what you can do to defend against them.
Stay Updated on This Year's Conference
In This Month's Report...
- Iranian State-Sponsored Threat Actors are Using Fake Software Downloads to Break Into Critical Infrastructure Companies
- Google Addresses Actively Exploited Chrome Vulnerability CVE-2026-2441 - SecPod Blog
- VShell and SparkRAT Observed in Exploitation of BeyondTrust Critical Vulnerability (CVE-2026-1731)
- 2026 Global Threat Report | Latest Cybersecurity Trends & Insights | CrowdStrike
- The 2026 Annual Cyber Threat Report | ReliaQuest Threat Research 2026 Automotive Cybersecurity Report
Iranian State-Sponsored Threat Actors are Using Fake Software Downloads to Break Into Critical Infrastructure Companies.
A state-sponsored threat group with ties to Iran’s government is running an active campaign targeting US critical infrastructure. Transportation and Logistics companies are in scope.
The advanced persistent threat (APT) group known as MuddyWater has been running a widespread software poisoning campaign since at least early February 2026. The group creates convincing fake download pages and installer files for commonly used business software, including Obsidian, FreeCAD, and Tableau. When an employee downloads and runs one of these files, it installs a backdoor on their device, inside the company's network, giving the attackers access and persistence.
MuddyWater is affiliated with Iran's Ministry of Intelligence and Security (MOIS). This is not an opportunistic criminal group. These are nation-state operators with specific strategic objectives.
Confirmed targets to date include a US bank, a US airport, a US and Canadian non-profit, and a US software company that supplies the defense and aerospace sectors. The transportation sector is explicitly listed as an elevated-risk industry for the near term.
In this attack, there is no phishing email that needs to be opened, no attachment to scrutinize. This campaign is utilizing a delivery technique known as SEO poisoning. Attackers manipulate search engine results so that fake software download pages rank high enough that users click them. Then when an employee searches for software they need, they click what looks like a legitimate result, download the installer, and run it. That is the entire attack chain.
The Tools, Tactics and Procedures (TTPs) being leveraged include two distinct backdoors have been identified in this campaign:
• Dindoor: Uses the Deno JavaScript runtime and has been found on the networks of a software company, a US bank, and a Canadian non-profit.
• Fakeset: A Python-based backdoor downloaded from Backblaze, a legitimate cloud storage service. It was found on a US airport network and a US non-profit. Using legitimate cloud services as a delivery mechanism makes this traffic difficult to detect and block.
Deploying two different backdoors against the same targets is not accidental. If defenders detect and remove one, the other maintains access. This is deliberate operational resilience.
The tactics used in this campaign overlap with known Akira ransomware delivery infrastructure. This means the same initial access event may serve both Iranian state espionage and financially motivated ransomware actors simultaneously. A single infected installer could lead to both data exfiltration and a ransomware deployment.
The geopolitical context matters here. This campaign accelerated in early 2026 in direct response to ongoing US and Israeli military operations. Cyber activity is being used as a retaliatory instrument. The assessment is that this campaign will expand in scope and intensity over the next one to three months.
The controls that stop this attack are not complex or expensive. They are some of the same controls that appear throughout the NMFTA Cybersecurity Best Practices Guidebook: application control, MFA, software procurement discipline, and user awareness. The difference between an organization that gets breached by this campaign and one that does not may be as simple as having good cyber hygiene.
This is a nation-state campaign with active infrastructure, confirmed victims across US critical sectors, and an assessed trajectory of escalation. The trucking industry is a named target category. The attack vector, fake software installers delivered through search results, is specifically designed to bypass the training most employees have received about phishing emails.
Google Addresses Actively Exploited Chrome Vulnerability CVE-2026-2441 - SecPod Blog
The discovery of CVE-2026-2441 reveals a critical zero-day vulnerability in Google Chrome that is actively being exploited in the wild. Successful exploitation could allow remote attackers to execute arbitrary code within Chrome’s sandbox environment, putting millions of users across Windows, macOS, and Linux at risk.
A high-severity use-after-free vulnerability, tracked as CVE-2026-2441, has been identified in Google Chrome’s CSS component. The issue stems from an iterator invalidation flaw within the CSSFontFeatureValuesMap implementation, which manages CSS font feature values.
In practical terms, this means:
-
Memory that has already been released can be re-accessed.
-
Attackers may manipulate heap memory layout to control reclaimed memory regions.
-
Carefully crafted HTML/CSS content can influence memory allocation patterns to increase exploit reliability.
When a victim visits a malicious webpage containing specially crafted CSS rules, the vulnerability can be triggered during style recalculation or rendering. Successful exploitation may allow an attacker to achieve arbitrary code execution within Chrome’s sandbox environment.
Because the flaw exists in the browser’s rendering process, no additional user interaction beyond visiting a webpage is required. This significantly lowers the exploitation barrier and increases real-world attack feasibility.
Security researchers reported the issue to Google on February 11, 2026. Google acknowledged that the vulnerability was being actively exploited in the wild prior to patch availability, classifying it as a zero-day vulnerability.
While exploitation is currently limited to code execution within the sandbox, sophisticated attackers may chain this flaw with additional vulnerabilities to attempt a sandbox escape, potentially leading to full system compromise.
VShell and SparkRAT Observed in Exploitation of BeyondTrust Critical Vulnerability (CVE-2026-1731)
On Feb. 6, 2026, BeyondTrust released a security advisory regarding CVE-2026-1731. BeyondTrust is an identity and access management platform. This specific vulnerability involves a pre-authentication remote code execution (RCE) issue within BeyondTrust remote support software. It could allow attackers to execute operating system commands in the context of the site user, which may lead to system compromise, including unauthorized access, data exfiltration and service disruption.
Unit 42 is actively investigating exploitation of this vulnerability and has observed attacker activity consistent with the following:
-
Network reconnaissance and account creation
-
Webshell deployment
-
Command-and-control (C2) traffic
-
Backdoor and remote management tool deployment
-
Lateral movement
- Data Theft
The campaign tracked by Unit 42 has so far affected the following sectors in the U.S., France, Germany, Australia and Canada:
- Financial services
- Legal services
- High technology
- Higher education
- Wholesale and retail
- Healthcare
Due to the severity of the risk and confirmed active exploitation, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added this vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog on Feb. 13, 2026. This addition mandated immediate remediation for federal agencies and signaled urgent prioritization for the private sector.
2026 Global Threat Report | Latest Cybersecurity Trends & Insights | CrowdStrike
Staying informed is critical for organizations across the transportation and logistics industry. The latest 2026 Global Threat Report from CrowdStrike provides an inside look at the tactics, trends, and threat actors shaping today’s cybersecurity landscape. Drawing on real-world intelligence from millions of sensors worldwide, the report highlights how attackers are operating and where businesses remain most vulnerable. For supply chain leaders, the insights offer valuable context on how cyber risks can impact operations, data security, and business continuity. Read the report to better understand the threat environment and strengthen your organization’s defenses.
The 2026 Annual Cyber Threat Report | ReliaQuest Threat
The 2026 Annual Cyber Threat Report from ReliaQuest provides a clear snapshot of how the threat environment shifted from 2024 to 2025 and what those changes mean for security teams. Built from real-world incident data and threat research, the report highlights emerging attacker tactics, rising risks, and the strategies organizations can use to stay ahead of adversaries. It also offers practical insights to help leaders strengthen defenses and better prepare for the next wave of cyber threats. Read the executive summary to quickly understand the trends shaping today’s threat landscape.
2026 Automotive Cybersecurity Report
The 2026 Global Automotive Cybersecurity Report from Upstream Security offers a data-driven look at the latest threats, vulnerabilities, and attack trends impacting connected vehicles and mobility services. Based on real-world incidents and threat intelligence, the report highlights how cyber incidents are increasing in scale, with many capable of affecting thousands to millions of vehicles and mobility assets. It also explores emerging risks tied to software-defined vehicles, ransomware, and the expanding digital infrastructure surrounding transportation systems. **Read the report to understand the evolving automotive threat landscape and what organizations can do to strengthen their cybersecurity posture.
ClickFix Attacks Abuses DNS Lookup Command to Deliver ModeloRAT
A new cyber campaign is exploiting a technique known as ClickFix to trick users into running commands that secretly install malware on their systems. Dark Reading explains how attackers are abusing DNS lookup commands to deliver the ModeloRAT remote-access trojan, a tactic designed to blend malicious activity into normal network traffic and evade detection.
Claude Code Flaws Allow Remote Code Execution and API Key Exfiltration
Newly discovered vulnerabilities in Claude Code, an AI-powered coding assistant developed by Anthropic, show how attackers could exploit malicious repositories to execute remote commands or steal sensitive API keys from developers’ environments. The Hacker News breaks down how these flaws worked, why they pose a growing supply-chain risk in AI-driven development workflows, and what organizations should know as AI tools become more integrated into software development.
Supply Chain Cyber Risk Strategies Shift Toward Resilience
Cyber risk is becoming a major concern across the supply chain as organizations shift their focus from prevention to resilience. Supply Chain Management Review explores how leaders are strengthening cybersecurity strategies to better withstand and recover from disruptions.
Combating Freight Fraud with New Verification Tools
Freight fraud is on the rise, but new tools are helping the industry fight back. Learn how NMFTA's latest verification solutions are helping to reduce freight fraud and strengthen trust across the industry. Read more in this month's CCJ recurring article written by NMFTA's Joe Ohr.
How Cybercrime Is Reshaping Cargo Theft and Fleet Risk in 2026
Artificial intelligence is changing how cybercriminals and cargo thieves target trucking fleets—and how fleets defend themselves. As phishing, impersonation, and cargo theft converge, cybersecurity is becoming a core part of fleet safety and operations. Read more in this month's Heavy Duty Trucking recurring article written by NMFTA's Ben Wilkens.
Welcome to Shop Talk, Hosted by NMFTA's Own Ben Wilkens
Ben "The Trucking Cyber Guy" Wilkens brings a depth of experience and a unique perspective to trucking cybersecurity that few can claim. Having served in the industry from steering wheel, to server room, to boardroom, and now at the front lines of transportation cybersecurity research and education, he brings unique insights with a wholistic view on the industry. On Shop Talk, he brings in guests from across trucking and cybersecurity for candid conversations, hot takes, and plenty of side quests. Grab a coffee and pull up a chair. Welcome to Shop Talk!
Cybersecurity: Like a PM for your Truck
On this Shop Talk episode NMFTA's own Ben Wilken and Artie Crawford discuss why cybersecurity is essential for your fleet and what you can implement in your organization.
Refer a Colleague
Would you like others at your company to be added to the NMFTA Headline Newsletter email distribution list? Send them this link or fill out the form for them on their behalf below!


.png?width=1200&height=600&name=FFPH%20-%20Join%20Fight%20(1).png)
.png?width=400&height=400&name=3PageSpread-2026%20Cyber%20Report%20(1).png)






