Diesel Vortex Phishing Campaign Targets Freight and Logistics Organizations
Summary
Hide ▲
Show ▼
A financially motivated threat group, Diesel Vortex, has been conducting a phishing campaign since September 2025, targeting freight and logistics organizations in the U.S. and Europe. The group has stolen 1,649 unique credentials from critical platforms in the freight industry, using 52 domains and sophisticated phishing techniques. The campaign was disrupted through a coordinated effort involving multiple cybersecurity firms.
Timeline
-
25.02.2026 01:57 1 articles · 3h ago
Diesel Vortex Phishing Campaign Disrupted
A coordinated effort involving GitLab, Cloudflare, Google Threat Intelligence, CrowdStrike, and Microsoft Threat Intelligence Center disrupted the Diesel Vortex phishing campaign. The campaign had been active since September 2025, stealing 1,649 unique credentials from freight and logistics operators in the U.S. and Europe.
Show sources
- Phishing campaign targets freight and logistics orgs in the US, Europe — www.bleepingcomputer.com — 25.02.2026 01:57
Information Snippets
-
Diesel Vortex has stolen 1,649 unique credentials from freight and logistics operators.
First reported: 25.02.2026 01:571 source, 1 articleShow sources
- Phishing campaign targets freight and logistics orgs in the US, Europe — www.bleepingcomputer.com — 25.02.2026 01:57
-
The campaign has been active since September 2025.
First reported: 25.02.2026 01:571 source, 1 articleShow sources
- Phishing campaign targets freight and logistics orgs in the US, Europe — www.bleepingcomputer.com — 25.02.2026 01:57
-
The threat actor uses 52 domains and sophisticated phishing techniques, including Cyrilic homoglyph tricks and voice phishing.
First reported: 25.02.2026 01:571 source, 1 articleShow sources
- Phishing campaign targets freight and logistics orgs in the US, Europe — www.bleepingcomputer.com — 25.02.2026 01:57
-
The group is believed to be Armenian-speaking and connected to Russian infrastructure.
First reported: 25.02.2026 01:571 source, 1 articleShow sources
- Phishing campaign targets freight and logistics orgs in the US, Europe — www.bleepingcomputer.com — 25.02.2026 01:57
-
The campaign was disrupted through a coordinated effort involving GitLab, Cloudflare, Google Threat Intelligence, CrowdStrike, and Microsoft Threat Intelligence Center.
First reported: 25.02.2026 01:571 source, 1 articleShow sources
- Phishing campaign targets freight and logistics orgs in the US, Europe — www.bleepingcomputer.com — 25.02.2026 01:57