Hackers are targeting transportation firms as the industry embraces digitalization, the IoT, and smartphone apps. But there are protective steps these firms can take, experts say.
Ben Ames has spent 20 years as a journalist since starting out as a daily newspaper reporter in Pennsylvania in 1995. From 1999 forward, he has focused on business and technology reporting for a number of trade journals, beginning when he joined Design News and Modern Materials Handling magazines. Ames is author of the trail guide "Hiking Massachusetts" and is a graduate of the Columbia School of Journalism.
Computer hackers loom large in newspaper headlines and Hollywood movies, but transportation and supply chain workers haven’t traditionally seen them as a real threat. After all, driving a truck or a forklift meant you were seldom even near a computer keyboard, and there’s nothing digital about booking freight loads using a clipboard and a phone.
However, in the past five years, the logistics industry has been awash in cybertrends like supply chain digitalization, the Internet of Things (IoT), and the expanded use of electronic logging devices (ELDs), not to mention the smartphones that most Americans carry in their pockets or purses these days.
Most of those attacks used “ransomware” to lock down the victims’ computer networks, hobbling their logistics operations until they cracked the code or paid a ransom to the data-kidnappers. As a rule, the targets of these cybercriminals do not disclose the details of the extortion to avoid encouraging future attacks.
The financial damage aside, the mere act of freezing a company’s operations for a few days can damage the victim’s reputation. Even the names of the bugs and viruses deployed by hackers sound frightening, including malware like Azorult, Hawkeye, Kwampirs, Locky, Lokibot, Nanocore, Netwired, Remcos, and Shamoon.
Despite the growing danger posed by cyberthreats, logistics firms can follow some basic rules to greatly reduce their exposure, such as educating employees, putting proper network controls in place, and creating disaster recovery plans.
PROTECT THE WEAKEST LINK
One way companies can protect themselves is by defining a single set of best practices for all employees, regardless of their role in the organization, says Chris Sandberg, vice president of information security for supply chain technology company Trimble Transportation.
Trimble, a provider of fleet management and transportation management software, says many of its clients rely on a compex IT (information technology) infrastructure in their daily operations, noting that a typical logistics service provider might have servers in its back office, telematics hardware on its trucks, and cloud-based networks used to manage maintenance and other critical tasks. “It’s important to have that standard so the same … controls are in place across all the different [types] of technology a customer might be using, because a chain is only as strong as its weakest link,” Sandberg says.
Another critical step in cyber self-defense is to establish a recovery plan before a problem ever develops. “The best time to develop your disaster plan is not during the disaster,” Sandberg says. “If you’re a trucking company and you get stuck with a crypto-lock virus, how do you continue operations? If you’ve identified certain elements as critical resources, you can come up with mitigation strategies.”
As logical as that might sound, smaller carriers often lack the resources to prepare disaster recovery plans ahead of time, Sandberg says. On top of that, they frequently lack the IT capabilities to distinguish between “white hat” hackers—who are basically using their skills to help companies identify their digital vulnerabilities—and “black hat” hackers who are plotting serious crimes, Sandberg says. A cybercriminal looking for a big payout might threaten a company by freezing its data and demanding a ransom, by stealing and selling a company’s data, or by collecting demographic information on its employees in an attempt to hire them away.
In many cases, an employee won’t even realize that they’ve become the victim of a hack until it’s too late, he says. “If someone sends out an email with malware links, they’re not targeting someone; it’s indiscriminate. They’re just trying to get someone to click on the link so they can freeze the account and get them to pay a ransom,” he says.
In another approach, a hacker might target truck drivers by offering them a free smartphone app that provides discounts on food and fuel, for example. That sounds harmless at first, but all data has value, Sandberg says. “Most people don’t read the disclaimers before they download an app,” he says. “Then, the hacker can scrape demographic information from them [and share it with] competing carriers. With the driver shortage, those carriers could use that information to target their advertising to a specific population of drivers and hire away those employees.”
For operations facing such threats, the best defense is education, says Jane Jazrawy, CEO of CarriersEdge, a provider of online driver-training platforms. And that’s become particularly important since the onset of the Covid-19 pandemic, which has made supply chain firms even more vulnerable to cyberthreats, she says.
What’s made them more vulnerable is the widespread adoption of work-from-home policies designed to curb the spread of the virus, Jazrawy explains. In the past few months, thousands of logistics professionals have migrated from the traditional office to the home office, leaving the safety of the corporate IT infrastructure and logging onto personal laptops using home data networks that are seldom up to date.
“Networks at home don’t have the same firewalls and protection” as at work, Jazrawy says. “You may not have a password on your router. Or you may be using your neighbor’s Wi-Fi, or you haven’t updated Norton Antivirus for three years. So as everybody goes home to work, the hackers are coming. They’re just itching to go; it’s like Christmas for hackers.”
“WE’RE ALL TECH WORKERS NOW”
The supply chain sector has also become more vulnerable to security breaches because fleets today share their data with more partners than ever before in order to provide real-time shipment visibility. “When a customer sends data to a trucking company, a whole chain of data then moves between the dispatcher, planner, loadboards, truck stops, drivers, and more,” Jazrawy says.
As supply chain companies enter the computer age, they need to be aware they are now moving data as well as freight, and criminals see both as valuable targets. “People in the transportation industry don’t think of themselves as technology workers; they don’t think they’re important enough that anyone would want their data,” she says. “But hackers are usually just trying to get their data so they can use it to get even more data and then commit a larger, more profitable crime.”
In order to protect themselves, companies must guard against two types of risk: technological and human. “Most hackers are not so much trying to use technology, but to use social engineering,” Jazrawy says. “If you can get someone to cough up their password, that’s way easier than trying random passwords forever until you get into their system.”
Computer users can defend themselves against those threats by studying the risks and staying vigilant, she says. Most social engineering—or “phishing” attacks—use psychological tactics, preying on fear, greed, or some other human emotion. “So now we’re seeing all these Covid-19 email messages that are playing on fear,” Jazrawy says. “But it’s usually phishing; saying ‘Click here and we’ll solve all your problems.’”
If a transportation worker does click on one of those links by mistake, they should follow two simple steps, she says: First, don’t panic, and second, disconnect from the network—whether it’s a cord or Wi-Fi—and run a virus scan to identify any malware that might have been installed.
Cybercrime in the supply chain sector is definitely on the rise. But across the industry, IT experts agree that there are steps logistics company leaders can take to protect their operations from hackers, including educating employees and putting proper network controls in place. “The more you know and are aware and are vigilant,” Jazrawy says, “[the better your chances of avoiding] the threat.”
There’s a photo from 1971 that John Kent, professor of supply chain management at the University of Arkansas, likes to show. It’s of a shaggy-haired 18-year-old named Glenn Cowan grinning at three-time world table tennis champion Zhuang Zedong, while holding a silk tapestry Zhuang had just given him. Cowan was a member of the U.S. table tennis team who participated in the 1971 World Table Tennis Championships in Nagoya, Japan. Story has it that one morning, he overslept and missed his bus to the tournament and had to hitch a ride with the Chinese national team and met and connected with Zhuang.
Cowan and Zhuang’s interaction led to an invitation for the U.S. team to visit China. At the time, the two countries were just beginning to emerge from a 20-year period of decidedly frosty relations, strict travel bans, and trade restrictions. The highly publicized trip signaled a willingness on both sides to renew relations and launched the term “pingpong diplomacy.”
Kent, who is a senior fellow at the George H. W. Bush Foundation for U.S.-China Relations, believes the photograph is a good reminder that some 50-odd years ago, the economies of the United States and China were not as tightly interwoven as they are today. At the time, the Nixon administration was looking to form closer political and economic ties between the two countries in hopes of reducing chances of future conflict (and to weaken alliances among Communist countries).
The signals coming out of Washington and Beijing are now, of course, much different than they were in the early 1970s. Instead of advocating for better relations, political rhetoric focuses on the need for the U.S. to “decouple” from China. Both Republicans and Democrats have warned that the U.S. economy is too dependent on goods manufactured in China. They see this dependency as a threat to economic strength, American jobs, supply chain resiliency, and national security.
Supply chain professionals, however, know that extricating ourselves from our reliance on Chinese manufacturing is easier said than done. Many pundits push for a “China + 1” strategy, where companies diversify their manufacturing and sourcing options beyond China. But in reality, that “plus one” is often a Chinese company operating in a different country or a non-Chinese manufacturer that is still heavily dependent on material or subcomponents made in China.
This is the problem when supply chain decisions are made on a global scale without input from supply chain professionals. In an article in the Arkansas Democrat-Gazette, Kent argues that, “The discussions on supply chains mainly take place between government officials who typically bring many other competing issues and agendas to the table. Corporate entities—the individuals and companies directly impacted by supply chains—tend to be under-represented in the conversation.”
Kent is a proponent of what he calls “supply chain diplomacy,” where experts from academia and industry from the U.S. and China work collaboratively to create better, more efficient global supply chains. Take, for example, the “Peace Beans” project that Kent is involved with. This project, jointly formed by Zhejiang University and the Bush China Foundation, proposes balancing supply chains by exporting soybeans from Arkansas to tofu producers in China’s Yunnan province, and, in return, importing coffee beans grown in Yunnan to coffee roasters in Arkansas. Kent believes the operation could even use the same transportation equipment.
The benefits of working collaboratively—instead of continuing to build friction in the supply chain through tariffs and adversarial relationships—are numerous, according to Kent and his colleagues. They believe it would be much better if the two major world economies worked together on issues like global inflation, climate change, and artificial intelligence.
And such relations could play a significant role in strengthening world peace, particularly in light of ongoing tensions over Taiwan. Because, as Kent writes, “The 19th-century idea that ‘When goods don’t cross borders, soldiers will’ is as true today as ever. Perhaps more so.”
Hyster-Yale Materials Handling today announced its plans to fulfill the domestic manufacturing requirements of the Build America, Buy America (BABA) Act for certain portions of its lineup of forklift trucks and container handling equipment.
That means the Greenville, North Carolina-based company now plans to expand its existing American manufacturing with a targeted set of high-capacity models, including electric options, that align with the needs of infrastructure projects subject to BABA requirements. The company’s plans include determining the optimal production location in the United States, strategically expanding sourcing agreements to meet local material requirements, and further developing electric power options for high-capacity equipment.
As a part of the 2021 Infrastructure Investment and Jobs Act, the BABA Act aims to increase the use of American-made materials in federally funded infrastructure projects across the U.S., Hyster-Yale says. It was enacted as part of a broader effort to boost domestic manufacturing and economic growth, and mandates that federal dollars allocated to infrastructure – such as roads, bridges, ports and public transit systems – must prioritize materials produced in the USA, including critical items like steel, iron and various construction materials.
Hyster-Yale’s footprint in the U.S. is spread across 10 locations, including three manufacturing facilities.
“Our leadership is fully invested in meeting the needs of businesses that require BABA-compliant material handling solutions,” Tony Salgado, Hyster-Yale’s chief operating officer, said in a release. “We are working to partner with our key domestic suppliers, as well as identifying how best to leverage our own American manufacturing footprint to deliver a competitive solution for our customers and stakeholders. But beyond mere compliance, and in line with the many areas of our business where we are evolving to better support our customers, our commitment remains steadfast. We are dedicated to delivering industry-leading standards in design, durability and performance — qualities that have become synonymous with our brands worldwide and that our customers have come to rely on and expect.”
In a separate move, the U.S. Environmental Protection Agency (EPA) also gave its approval for the state to advance its Heavy-Duty Omnibus Rule, which is crafted to significantly reduce smog-forming nitrogen oxide (NOx) emissions from new heavy-duty, diesel-powered trucks.
Both rules are intended to deliver health benefits to California citizens affected by vehicle pollution, according to the environmental group Earthjustice. If the state gets federal approval for the final steps to become law, the rules mean that cars on the road in California will largely be zero-emissions a generation from now in the 2050s, accounting for the average vehicle lifespan of vehicles with internal combustion engine (ICE) power sold before that 2035 date.
“This might read like checking a bureaucratic box, but EPA’s approval is a critical step forward in protecting our lungs from pollution and our wallets from the expenses of combustion fuels,” Paul Cort, director of Earthjustice’s Right To Zero campaign, said in a release. “The gradual shift in car sales to zero-emissions models will cut smog and household costs while growing California’s clean energy workforce. Cutting truck pollution will help clear our skies of smog. EPA should now approve the remaining authorization requests from California to allow the state to clean its air and protect its residents.”
However, the truck drivers' industry group Owner-Operator Independent Drivers Association (OOIDA) pushed back against the federal decision allowing the Omnibus Low-NOx rule to advance. "The Omnibus Low-NOx waiver for California calls into question the policymaking process under the Biden administration's EPA. Purposefully injecting uncertainty into a $588 billion American industry is bad for our economy and makes no meaningful progress towards purported environmental goals," (OOIDA) President Todd Spencer said in a release. "EPA's credibility outside of radical environmental circles would have been better served by working with regulated industries rather than ramming through last-minute special interest favors. We look forward to working with the Trump administration's EPA in good faith towards achievable environmental outcomes.”
Editor's note:This article was revised on December 18 to add reaction from OOIDA.
A Canadian startup that provides AI-powered logistics solutions has gained $5.5 million in seed funding to support its concept of creating a digital platform for global trade, according to Toronto-based Starboard.
The round was led by Eclipse, with participation from previous backers Garuda Ventures and Everywhere Ventures. The firm says it will use its new backing to expand its engineering team in Toronto and accelerate its AI-driven product development to simplify supply chain complexities.
According to Starboard, the logistics industry is under immense pressure to adapt to the growing complexity of global trade, which has hit recent hurdles such as the strike at U.S. east and gulf coast ports. That situation calls for innovative solutions to streamline operations and reduce costs for operators.
As a potential solution, Starboard offers its flagship product, which it defines as an AI-based transportation management system (TMS) and rate management system that helps mid-sized freight forwarders operate more efficiently and win more business. More broadly, Starboard says it is building the virtual infrastructure for global trade, allowing freight companies to leverage AI and machine learning to optimize operations such as processing shipments in real time, reconciling invoices, and following up on payments.
"This investment is a pivotal step in our mission to unlock the power of AI for our customers," said Sumeet Trehan, Co-Founder and CEO of Starboard. "Global trade has long been plagued by inefficiencies that drive up costs and reduce competitiveness. Our platform is designed to empower SMB freight forwarders—the backbone of more than $20 trillion in global trade and $1 trillion in logistics spend—with the tools they need to thrive in this complex ecosystem."
Global trade will see a moderate rebound in 2025, likely growing by 3.6% in volume terms, helped by companies restocking and households renewing purchases of durable goods while reducing spending on services, according to a forecast from trade credit insurer Allianz Trade.
The end of the year for 2024 will also likely be supported by companies rushing to ship goods in anticipation of the higher tariffs likely to be imposed by the coming Trump administration, and other potential disruptions in the coming quarters, the report said.
However, that tailwind for global trade will likely shift to a headwind once the effects of a renewed but contained trade war are felt from the second half of 2025 and in full in 2026. As a result, Allianz Trade has throttled back its predictions, saying that global trade in volume will grow by 2.8% in 2025 (reduced by 0.2 percentage points vs. its previous forecast) and 2.3% in 2026 (reduced by 0.5 percentage points).
The same logic applies to Allianz Trade’s forecast for export prices in U.S. dollars, which the firm has now revised downward to predict growth reaching 2.3% in 2025 (reduced by 1.7 percentage points) and 4.1% in 2026 (reduced by 0.8 percentage points).
In the meantime, the rush to frontload imports into the U.S. is giving freight carriers an early Christmas present. According to Allianz Trade, data released last week showed Chinese exports rising by a robust 6.7% y/y in November. And imports of some consumer goods that have been threatened with a likely 25% tariff under the new Trump administration have outperformed even more, growing by nearly 20% y/y on average between July and September.