Most common cyberattacks in the logistics sector

By Esteban Sardanyés on Oct 14, 2025 8:30:17 AM

most-common-cyberattacks-logistics

Logistics is the engine that keeps the global economy running.

Every shipment, every route, and every container now depend on interconnected digital systems. This digitalization has improved efficiency but has also made the sector one of the main targets for cybercriminals.

With a network made up of multiple players, carriers, warehouses, port operators, and technology providers, a single breach can bring the entire supply chain to a halt.

But what kinds of cyberattacks are we talking about? Below, as cybersecurity specialists, we analyze the most common types of attacks in the logistics sector. We’ll also discuss how to address them and protect systems against these threats.

Nueva llamada a la acción

Most common cyberattacks in the logistics sector

Ransomware

Ransomware is a type of attack that encrypts a company’s information, preventing access to it, and then demands a ransom payment in exchange for recovery. This type of attack is widely used by cybercriminals and can completely halt critical operations such as route management, inventory control, or billing.

In most cases, cybercriminals exploit vulnerabilities or security breaches in servers to infiltrate systems.

Their goal is clear: to force the company to pay in order to regain access to its systems or data, and to prevent that information from becoming public.

Real Case: GEFCO (France, 2020)

In September 2020, GEFCO, a logistics operator for the PSA Group, suffered a ransomware attack.

Consequences:

It disrupted the company’s global operations, affecting several of its transport services.

GEFCO activated alternative processes to ensure a certain level of operational continuity while working to restore its systems.

Nueva llamada a la acción

Phishing and social engineering

Phishing refers to fraudulent messages that impersonate clients or suppliers to trick the recipient into taking an action such as downloading or opening a file that installs malware on their systems, stealing credentials, or diverting payments.

Due to the high volume of emails and invoices handled in the logistics industry, companies in this sector become an attractive target for cybercriminals looking to launch phishing campaigns and gain financial benefits.

Real Case: Geopost / DPD Spain (2024)

In June 2024, Geopost (parent company of DPD) reported a cybersecurity incident in its Spanish subsidiary.

Consequences:

The compromised data included only what was strictly necessary for transport services: names, surnames, postal addresses, email addresses, and, in some cases, phone numbers.

Geopost reported the incident to INCIBE and the Spanish Data Protection Agency (AEPD), reinforced its security measures, and launched an investigation.

Although it was not a ransomware attack or a massive operational disruption, this case illustrates how logistics companies can still be affected by data theft—leading to reputational and legal risks.

Nueva llamada a la acción

Direct cyberattacks on the supply chain

Supply chain attacks are a type of cyberattack in which criminals do not target the company directly, but instead infiltrate or compromise one of its suppliers, partners, or intermediaries to reach the intended target.

In other words, the attacker exploits the trust between organizations in a supply chain to introduce malicious software, steal data, or alter products and services before they reach the end user.

Real Case: Scania (Sweden, 2025)

In May 2025, around 34,000 documents related to insurance claims were leaked after an attack in which the attackers used credentials stolen from an external supplier.

Consequences:

The leak was carried out using malware designed to steal credentials (infostealer).

Additionally, an extortion campaign was launched targeting employees following the leak.

IoT Device Cyberattacks

Cyberattacks on IoT devices (Internet of Things) target the millions of internet-connected objects, such as cameras, sensors, appliances, routers, vehicles, or medical equipment, that constantly collect and transmit data.

These devices are often vulnerable due to limited processing power, weak built-in security, or default passwords, making them attractive entry points for attackers.

Every connected vehicle, container, or warehouse represents a potential entry point. An attacker could manipulate coordinates, falsify delivery statuses, or alter transport conditions, causing economic and logistical losses that are difficult to trace.

DDoS attacks and data theft

DDoS attacks aim to disrupt booking portals or tracking platforms, while data breaches are often used for extortion or sale on the dark web. In both cases, reputational damage can be as severe as financial losses.

Real Case: Maersk (Denmark, 2017) – NotPetya Attack

Maersk’s experience with the NotPetya malware is one of the most comprehensive examples of what can happen in logistics when companies are unprepared for sophisticated threats.

Consequences:

The initial vector was an infection through compromised Ukrainian accounting software (M.E.Doc). From there, the malware spread rapidly by exploiting unpatched vulnerabilities.

Approximately 76 port terminals worldwide were affected.

Around 4,000 servers, 45,000 personal computers, and 2,500 applications had to be reinstalled or reset in the days following the attack.

Another real case

Hellmann Worldwide Logistics (Germany, 2021)

Hellmann, a company with air, sea, and land transport operations in many countries, reported suffering a cyberattack that forced the temporary shutdown of its central data center.

Consequences: 

  • This disconnection affected their global operations, at least temporarily.
  • It has not been publicly confirmed whether the attack involved ransomware, and the exact attack vector was not disclosed in available sources.

The logistics sector has shifted from moving goods to moving data, and this transition has made it a prime target for cybercriminals. Each incident, whether ransomware, credential theft, or system sabotage, demonstrates that cybersecurity is not just an IT issue but a critical element for maintaining daily operations and the trust of clients and partners.

Protecting the digital supply chain requires going beyond simple antivirus software or traditional firewalls.

Today, the difference between stopping an attack in time and experiencing a total operational shutdown lies in having automated detection and response systems, continuous audits, and an active security culture throughout the organization.

At ESED, we help logistics companies anticipate these threats with solutions that monitor, detect, and neutralize malware before it impacts operations.