Cargo Theft Has Evolved Three Times. Most Brokers Are Still Defending Against Generation One.
Cargo theft in trucking evolved from parking lots to identity fraud to cyber attacks. Each generation exploits the blind spot the last defense created.
In January 2026, a mid-size brokerage in Dallas discovered that 14 loads had been redirected over a two-week period. Nobody cut a lock. Nobody impersonated a carrier. Nobody called with a stolen MC number. Instead, someone had compromised a dispatcher's load board login through a phishing email that looked like a routine password reset. Using that access, the attacker monitored the brokerage's posted loads, identified high-value shipments before they were booked, and contacted shippers directly, posing as the brokerage, to redirect pickups to trucks the brokerage had never dispatched. The freight moved. The brokerage didn't know anything was wrong until shippers started calling about loads that had already been "picked up" by someone else. Total losses across the 14 loads: $2.8 million.
The brokerage had strong carrier vetting. Callback verification, DOT matching at pickup, tracking on every load. None of it mattered. The attack didn't go through the carrier. It went through the brokerage's own systems.
Cargo theft in trucking has evolved through three distinct generations, and each generation emerged specifically because the industry built defenses that closed the previous one. Generation 1 was physical: bolt cutters, stolen trailers, pilferage at truck stops. The industry responded with GPS trackers, trailer locks, secure parking, and driver awareness protocols. Those defenses worked, so thieves evolved. Generation 2 was identity-based: stolen carrier credentials, fictitious pickups, deceptive schemes that exploit the gap between verifying a carrier's record and verifying the person. The industry is responding with callback verification, DOT matching, and carrier identity tools. Those defenses are working, so thieves are evolving again. Generation 3 is cyber-enabled: phishing attacks on broker systems, compromised TMS and load board accounts, and system-level interception that bypasses carrier vetting entirely because the attack targets the broker, not the carrier. Most brokerages have built strong defenses against Generation 1. Many are now building defenses against Generation 2. Almost none are prepared for Generation 3.
The Three Generations of Cargo Theft in Trucking
| Generation 1: Physical | Generation 2: Identity | Generation 3: Cyber | |
|---|---|---|---|
| Era | Pre-2020 (still active) | 2020-present (fastest growth) | 2025-present (emerging) |
| Method | Cut locks, steal trailers, pilfer parked freight | Impersonate legitimate carriers using stolen MC/DOT credentials | Compromise broker TMS, load board accounts, or shipper systems |
| Attack target | The truck or trailer | The broker's vetting process | The broker's information systems |
| What makes it work | Freight left unattended | Brokers verify records but not people | Brokers trust their own systems |
| Share of incidents (2025) | ~55% of events (CargoNet) | ~35% of events | ~10% of events (fastest growing) |
| Avg. loss per incident | $80,000 to $150,000 | $250,000 to $400,000 | $150,000 to $500,000+ per event |
| What stops it | GPS, locks, secure parking, driver protocols | Callback verification, DOT matching at dock | MFA, system monitoring, access controls |
| Who it targets | Any freight left vulnerable | Brokers who skip identity verification | Brokers with weak IT security |
Generation 1: The Parking Lot Era (Physical Theft)
Physical cargo theft is the oldest form of freight crime and still accounts for approximately 55% of all incidents by count, per CargoNet's 2025 annual report. A thief targets freight that is physically unattended, cuts a lock, breaches a seal, or drives away with a trailer. No deception required. No systems compromised. Just opportunity meeting unprotected cargo.
How Generation 1 Works
Physical theft operates on a simple model: find freight that's sitting still and unguarded, take it.
- Pilferage at truck stops. The most common variant. A driver parks at a truck stop overnight. Someone cuts the trailer seal between 2 and 5 AM, removes pallets from the nose of the trailer (the portion closest to the doors), and is gone before the driver wakes. Pilferage accounts for 43% of all recorded cargo theft (CargoNet 2025 data).
- Full trailer theft from unsecured yards. A loaded trailer left in a distribution center yard, a drop lot, or a customer's property is hitched to a thief's tractor and driven away. This produces the highest per-incident loss in the physical category because the entire load is taken.
- Hijacking. Rare in 2026 but still present. The driver is forced to surrender the truck through threat or violence, typically at a delivery stop, a rest area, or a fueling station. Almost all hijacking targets high-value, easily fenced commodities.
What Beat Generation 1
The freight industry responded with physical security measures that have measurably reduced the success rate of parking lot theft:
- GPS trailer tracking made it possible to locate stolen trailers within minutes
- High-security trailer locks (kingpin locks, air cuff locks, rear door locks) made it harder to move or open trailers
- Secure parking facilities with fencing, surveillance, and controlled access reduced the pool of vulnerable locations
- Driver training and awareness protocols reduced the window of vulnerability during stops
These defenses didn't eliminate physical theft. It still accounts for the majority of incidents. But they made physical theft harder, riskier, and less profitable per attempt. That pressure pushed organized theft operations toward a method that these physical defenses couldn't touch.
Generation 2: The Identity Era (Deceptive Pickups)
Identity-based cargo theft grew 35% year over year in 2025 and now accounts for roughly 35% of all incidents when including double brokering schemes that result in stolen or diverted freight. This generation emerged because physical security measures made it harder to steal freight from trailers and yards, but did nothing to prevent someone from walking up to a shipper's dock and taking the freight through the front door.
How Generation 2 Works
Identity-based theft exploits the gap between verifying a carrier's Federal Motor Carrier Safety Administration (FMCSA) record and verifying that the person presenting those credentials is actually that carrier.
- Harvest a carrier identity. The thief searches FMCSA's public database for a carrier with clean records: active authority, good safety scores, current insurance. Everything needed to impersonate the carrier is published for free. Read our carrier identity theft guide for the specific data points involved.
- Book a load using the stolen identity. The thief contacts a broker or shipper, provides the legitimate carrier's MC and DOT numbers, and books a high-value load. The broker checks the FMCSA record. Everything comes back clean because the record belongs to a real carrier.
- Send an unauthorized truck to pickup. The thief dispatches a rented, borrowed, or stolen truck to the shipper's dock. The driver presents paperwork that appears legitimate.
- Divert the freight. The truck leaves the dock with the freight and never delivers it to the intended destination. The cargo is moved to a transfer location and sold through fencing networks, typically within 48 hours.
The average identity-based theft produces losses of $250,000 to $400,000, roughly double the average physical theft, because the method allows thieves to be selective about which loads they target. They choose high-value commodities and they know exactly what's on the truck before they send a driver to pick it up.
What's Beating Generation 2
The industry's response to identity-based theft mirrors its response to physical theft: build specific defenses that target the attack mechanism.
- Callback verification to the FMCSA-registered phone number catches impersonation at the point of booking. The MCS-150 is the biennial filing every carrier submits to FMCSA. MCS-150 stands for Motor Carrier Safety form 150. The phone number on this filing requires the carrier's FMCSA PIN to change, so a fraudster using a stolen identity cannot alter it. Use the MC/DOT lookup, which displays the FMCSA-registered phone number alongside authority and insurance data, to run this check.
- DOT verification at the dock catches impersonation at the point of pickup by confirming the truck's DOT number matches the booked carrier
- Carrier identity verification tools cross-reference contact information against FMCSA records automatically
- Network analysis catches chameleon carriers by mapping connections between entities
These defenses are working. Brokerages that have implemented callback verification report catching multiple impersonation attempts per month that would have previously resulted in lost freight. But the same evolutionary pressure that pushed thieves from parking lots to identity theft is now pushing them from identity theft to something harder to defend against.
For a full treatment of how to defend against Generation 2, including the three-tier prevention protocol and the five risk variables that determine your exposure, read our cargo theft prevention guide.
Generation 3: The Cyber Era (System-Level Attacks)
Cyber-enabled cargo theft is the fastest-growing threat vector by percentage growth, though it still represents approximately 10% of total incidents. This generation bypasses carrier vetting entirely because the attack doesn't go through a carrier. It goes through the broker's own information systems.
How Generation 3 Works
Cyber-enabled theft targets the digital infrastructure that brokers use to manage loads, communicate with shippers, and coordinate carriers. The attacker doesn't need to impersonate a carrier if they can impersonate the broker.
- Credential harvesting through phishing. The attacker sends emails that look like password reset requests from load boards, TMS platforms, or email providers. When a dispatcher or broker clicks the link and enters their credentials, the attacker captures the login. This is the most common entry point and the one that hit the Dallas brokerage in the opening scenario.
- TMS account compromise. Once inside the TMS, the attacker can see every active load: origin, destination, commodity, value, pickup time, carrier assignment. They identify high-value loads and either redirect them (by contacting the shipper as the broker) or insert themselves as the carrier (by modifying dispatch records).
- Load board account takeover. The attacker gains access to a broker's load board account. They can see posted loads before carriers do, accept loads using the broker's credentials, and dispatch their own trucks. The broker's legitimate carrier vetting never fires because the attacker is operating inside the broker's own systems.
- Shipper communication interception. The attacker monitors email threads between the broker and shipper. At the right moment, they send a message from the broker's compromised email (or a spoofed address) instructing the shipper to release freight to a different truck, citing a "carrier change" or "equipment swap." The shipper complies because the instruction appears to come from their trusted broker contact.
- Carrier notification disruption. In a sophisticated variant, the attacker contacts the legitimate carrier assigned to a load and tells them the load has been cancelled or rescheduled. Meanwhile, the attacker's truck picks up the freight. By the time the broker and carrier realize the load wasn't cancelled, the freight is gone.
Why Generation 3 Is Different
The first two generations of cargo theft can be stopped by the broker's carrier vetting process. Physical theft is stopped by requiring carriers to use secure parking and tracking. Identity theft is stopped by verifying the carrier's identity before booking. Both defenses sit between the broker and the carrier.
Cyber-enabled theft attacks from a different direction. It doesn't challenge the carrier vetting process. It goes around it. When an attacker is operating inside the broker's TMS, every subsequent action looks legitimate because it originates from a trusted system. The shipper follows instructions because they came from the broker's email. The carrier stands down because the cancellation came from the broker's account. No amount of callback verification or DOT matching helps when the attack is inside the broker's own infrastructure.
This is what makes Generation 3 structurally different and why the brokerage with the best carrier vetting in the industry can still be vulnerable.
How Common Is Cyber-Enabled Cargo Theft?
CargoNet and the Transportation Intermediaries Association (TIA) estimate that cyber-enabled theft accounts for roughly 10% of cargo theft incidents in 2025, but the percentage is growing faster than any other category. The true incidence is likely higher because many cyber-enabled thefts are misclassified as identity theft (when the broker doesn't realize their systems were the entry point) or not reported at all (when the brokerage discovers the breach and handles it internally to avoid reputational damage).
The financial impact per incident tends to be higher than single-load identity theft because a compromised system provides access to multiple loads over days or weeks before detection. The Dallas brokerage lost 14 loads in two weeks. A single compromised account can generate millions in losses before the breach is discovered.
How Each Generation Created the Next: The Evolutionary Pressure
Cargo theft evolves because defenses change the economics of each method. When one method becomes too risky or too low-return, the operators who are organized enough to adapt move to the next method. This isn't theory. The timeline matches.
Physical Security Pushed Thieves to Identity Fraud
Through the 2010s, the freight industry invested heavily in GPS tracking, high-security locks, secure parking, and driver protocols. These measures didn't eliminate physical theft, but they increased the risk of getting caught and decreased the success rate. A thief cutting a lock on a tracked trailer had minutes before law enforcement could respond. A thief stealing from a facility with cameras was creating evidence.
The economic response was predictable: organized theft operations shifted toward a method where none of those physical defenses applied. A fictitious pickup doesn't require cutting a lock. The shipper hands over the freight willingly. GPS tracking doesn't help because the legitimate tracking is on a truck that was never dispatched. Cameras capture a truck and driver that can't be traced because the identity was stolen.
The rise of identity-based theft from roughly 5% of incidents in 2019 to 35% in 2025 (CargoNet data) directly tracks with the increased deployment of physical security measures. The defenses worked. The thieves adapted.
Identity Verification Is Pushing Thieves to Cyber Fraud
The same pattern is now repeating. As callback verification, DOT matching, and carrier identity tools spread through the industry, the success rate of identity-based theft is beginning to decline for operators targeting brokerages that have implemented these defenses. A fraudster who calls a broker using a stolen MC number and gets a callback to the real carrier's phone has wasted their setup investment.
The economic response is the same: organized operations are shifting toward methods that bypass identity verification entirely. If the broker's vetting process can catch you at the point of booking, don't go through the booking process. Go through the broker's systems instead.
The growth of cyber-enabled theft from nearly zero before 2023 to approximately 10% of incidents in 2025 tracks with the adoption of identity verification tools. The same arms race that created Generation 2 is creating Generation 3.
What Generation 4 Might Look Like
If the pattern holds, Generation 4 will emerge in response to improved broker cybersecurity. The likely candidates: compromised shipper systems (attacking the shipper's WMS or dock scheduling rather than the broker), supply chain data manipulation (altering shipment records in transit management platforms to redirect loads at the system level), or AI-generated social engineering that can pass the verbal verification checks that currently stop identity theft. These are not hypothetical. Each has been observed in proof-of-concept or early-stage incidents. The timeline for widespread deployment depends on how quickly the industry closes the Generation 3 vulnerability.
Defending Across All Three Generations: The Layered Security Model
Effective cargo theft prevention in 2026 requires simultaneous defense against all three generations because all three are active and targeting different weaknesses.
Layer 1: Physical Security (Generation 1 Defense)
Physical security stops the 55% of cargo theft that still involves direct access to the freight.
- Require GPS tracking on every load. Tracking is the baseline defense that makes physical theft detectable in real time.
- Specify secure parking for high-value loads. Fenced, surveilled facilities for any overnight stop on loads over $100,000.
- Use covert secondary trackers on high-value freight. A hidden GPS device provides backup location data when criminals disable the primary tracker.
- Avoid overnight stops in high-theft corridors. California's LA basin and Central Valley, the DFW metroplex, and the NJ warehouse corridor are the highest-risk areas per CargoNet geographic data. For the full corridor-level breakdown, read our cargo theft data report.
Layer 2: Identity Verification (Generation 2 Defense)
Identity verification stops the 35% of cargo theft that uses stolen carrier credentials.
- Run callback verification on every new carrier. Call the FMCSA-registered phone number, not the number the caller provided, and confirm they accepted the load.
- Verify DOT at the dock. Include the booked carrier's DOT number in pickup instructions. Require the shipper to confirm the truck's DOT matches before releasing freight.
- Check authority age and inspection density. Carriers under 120 days of authority with zero inspections warrant elevated scrutiny. Use the authority checker, which shows grant dates and operating duration, to assess this.
- Cross-reference carrier officers against revoked entities. Catches chameleon carriers that pass identity checks because they are who they claim to be, just with a hidden enforcement history.
Layer 3: Cyber Defense (Generation 3 Defense)
Cyber defense stops the 10% of cargo theft that targets broker systems directly, and this is the layer most brokerages haven't built yet.
- Enable multi-factor authentication (MFA) on every system. MFA is multi-factor authentication, a security method that requires two or more verification steps (password plus a code from a phone app, for example) to log into a system. Enable it on your TMS, load boards, email accounts, and any platform that touches load data. MFA alone blocks the majority of credential-harvesting phishing attacks because a stolen password isn't enough to log in.
- Train dispatchers to recognize phishing. Phishing is a social engineering attack where a fraudulent email mimics a trusted sender to trick the recipient into entering their credentials or clicking a malicious link. Run quarterly phishing simulations. The dispatcher who clicks a fake password reset link is the entry point for a $2.8 million loss.
- Implement session monitoring on your TMS. Set alerts for logins from unusual locations, logins outside business hours, and logins from new devices. A dispatcher in Dallas who suddenly logs in from a VPN exit point in another country is a compromised account.
- Verify load changes through a second channel. If a shipper receives instructions to change a carrier, redirect a pickup, or hold a load, those instructions should be confirmed through a phone call to a known contact number, not just through email. This single policy stops the shipper communication interception variant.
- Audit load board and TMS access quarterly. Remove accounts for former employees. Reset credentials for accounts that haven't been used in 90 days. Every dormant account with active credentials is a door a phishing attack can open.
- Separate load visibility from load control. Where your TMS allows it, configure permissions so that load tracking (read-only) and load dispatch (write access) require different authorization levels. A compromised read-only account can see your loads but can't redirect them.
Worked Scenario: A Cyber-Enabled Theft vs. a Prepared Brokerage
The attack: A phishing email targeting a broker's load board account. The email looks like a routine "verify your account" message from a major load board platform. It includes the platform's logo, formatting, and a link to what appears to be the login page.
Brokerage A (unprepared): A dispatcher clicks the link and enters their credentials. The attacker now has load board access. Over the next five days, the attacker identifies three high-value electronics loads, contacts the shippers posing as the brokerage, and redirects pickups to unauthorized trucks. Total losses: $680,000 in cargo. The breach is discovered on day six when a shipper calls about a load that was "already picked up." The brokerage had no MFA on the load board account, no session monitoring, and no policy requiring shippers to verify load changes by phone.
Brokerage B (prepared): The same phishing email reaches a different dispatcher. The dispatcher enters their credentials on the fake page. But the load board account has MFA enabled. The attacker has the password but can't complete the login without the code from the dispatcher's phone. Login fails. An alert fires to the brokerage's IT contact showing a failed login attempt from an unfamiliar IP address. IT resets the dispatcher's password, flags the phishing email, and sends a company-wide alert. No loads compromised. Total cost: 15 minutes of IT time.
The difference between $680,000 in losses and zero losses: multi-factor authentication. A setting that takes five minutes to enable.
Frequently Asked Questions
How has cargo theft evolved in trucking?
Cargo theft has evolved through three generations. Generation 1 (physical theft) uses bolt cutters, trailer theft, and pilferage at truck stops. Generation 2 (identity-based theft) uses stolen carrier credentials to book and steal loads through fictitious pickups. Generation 3 (cyber-enabled theft) compromises broker TMS and load board accounts to redirect freight without ever interacting with the carrier vetting process. Each generation emerged because defenses against the previous generation forced thieves to adapt.
What is cyber-enabled cargo theft?
Cyber-enabled cargo theft is a method where criminals compromise broker information systems (TMS platforms, load board accounts, or email) and use that access to redirect freight, intercept loads, or impersonate the brokerage to shippers. Unlike identity-based theft, which impersonates a carrier, cyber-enabled theft impersonates the broker by operating inside the broker's own systems. It bypasses carrier vetting entirely.
How do hackers steal freight?
The most common entry point is phishing: a fraudulent email that tricks a dispatcher into entering their login credentials on a fake website. Once inside the broker's TMS or load board account, the attacker identifies high-value loads, contacts shippers posing as the brokerage, and redirects pickups to unauthorized trucks. In a more advanced variant, the attacker monitors email threads and sends a shipper instructions to release freight to a different carrier, appearing to be the broker.
Can callback verification stop cyber cargo theft?
No. Callback verification stops Generation 2 (identity-based) theft by confirming the carrier's identity. Generation 3 (cyber-enabled) theft doesn't impersonate a carrier. It compromises the broker's systems and impersonates the broker to shippers and carriers. Callback verification is still necessary for identity theft prevention, but it doesn't address the cyber threat vector. Stopping cyber-enabled theft requires MFA, phishing training, session monitoring, and second-channel verification for load changes.
What is the most common type of cargo theft in 2026?
Physical theft (pilferage and trailer theft) still accounts for roughly 55% of all incidents by count, per CargoNet 2025 data. Identity-based theft (fictitious pickups and deceptive schemes) accounts for approximately 35% and is the fastest-growing category by incident count. Cyber-enabled theft accounts for approximately 10% but is the fastest-growing category by percentage increase. By dollar value, identity-based theft causes the most total damage because of the higher average loss per incident.
How do I protect my brokerage from cyber freight fraud?
Enable multi-factor authentication on every system that touches load data: TMS, load boards, email, accounting platforms. Train dispatchers to recognize phishing emails through quarterly simulations. Set up session monitoring that alerts on unusual login locations or times. Establish a policy requiring shippers to verify any load change instructions through a phone call to a known number. Audit system access quarterly and remove dormant accounts. These steps block the primary entry points for Generation 3 attacks.
Is cargo theft getting worse?
Yes across all three generations. CargoNet reported $725 million in losses across 2,576 incidents in 2025, up 60% in dollar value and 16% in incidents from 2024. Identity-based theft grew 35% year over year. Cyber-enabled theft is growing faster by percentage than either physical or identity-based methods, though from a smaller base. Industry projections estimate roughly 2,900 total incidents in 2026. The total is increasing because new generations of theft don't replace old ones. They stack on top.
Why doesn't good carrier vetting prevent all cargo theft?
Carrier vetting prevents identity-based theft (Generation 2), which is roughly 35% of incidents. It does not prevent physical theft (Generation 1, ~55% of incidents) because the carrier is legitimate and the theft happens after pickup. It does not prevent cyber-enabled theft (Generation 3, ~10% of incidents) because the attack targets the broker's systems, not the carrier's credentials. Effective cargo theft prevention requires three layers: physical security, identity verification, and cyber defense.
Bottom Line
The Dallas brokerage that lost $2.8 million across 14 loads had callback verification, DOT matching, and tracking on every load. Their carrier vetting was strong. None of it mattered because the attack came through a dispatcher's compromised load board login, not through a stolen MC number.
Cargo theft doesn't stand still. Every defense the industry builds creates the pressure that produces the next attack method. Locks created identity fraud. Identity tools are creating cyber fraud. The brokerage that only defends against the generation that last burned them is always one evolution behind. Enable MFA on every system your team touches today. It takes five minutes and it's the single step that separates the brokerages losing millions to Generation 3 from the ones that aren't.
Sources: