Cargo theft is not new. Trucks have been hijacked, warehouses broken into, and containers pilfered for as long as freight has existed. What is new is the scale, the sophistication, and the method. Strategic cargo theft, the kind where criminals use technology and identity fraud rather than crowbars and ski masks, has increased 1,500% since 2021, according to the American Trucking Associations.
That is not a typo. Fifteen hundred percent.
The industry lost an estimated $725 million to cargo theft in 2025, with the average value per theft reaching $274,000 according to CargoNet. Cyber attacks targeting carriers have surged more than 400%, per Overhaul's annual intelligence report.
How Modern Cargo Theft Actually Works
Forget the old image of a truck getting hijacked on a dark highway. Modern cargo theft is a white-collar crime committed from a laptop. Here is how the most common scheme works.
Step 1: Steal a carrier identity. Criminals obtain a legitimate carrier's MC number, insurance certificate, and operating authority, often through phishing attacks on small carriers or by purchasing compromised credentials on the dark web.
Step 2: Intercept the load. Using the stolen identity, the criminal contacts a broker or load board and accepts a freight tender. The warehouse sees a driver with a valid BOL and a truck that matches the carrier name. They load the freight.
Step 3: Disappear. The truck drives away with the freight and never arrives at the delivery point. The broker does not realize the shipment was stolen until the consignee calls asking where their product is, often 24 to 48 hours later.
This is not a rare, exotic attack. It is happening every day, across every mode and every commodity.
Why Traditional Vetting Is Not Enough
Every responsible shipper and broker runs carrier vetting. Background checks on operating authority, insurance verification, safety scores, FMCSA monitoring. This is necessary. It is table stakes. But it is not sufficient against the current threat.
Vetting validates the carrier, not the transaction. When a criminal steals MC#12345's identity and shows up at your dock, the vetting you did on the real carrier is irrelevant.
Email-based rate confirmations are the vulnerability. The standard industry workflow happens over unencrypted, unauthenticated email. There is no identity verification at the transaction level.
Static vetting cannot detect dynamic fraud. Carrier vetting is a point-in-time check. The criminal who stole their identity last Tuesday is not in any vetting database.
Load boards amplify the risk. Public load boards are the primary hunting ground for cargo thieves.
The Solution: Full Chain of Custody Technology
If vetting validates the carrier and the vulnerability is the transaction, the solution is technology that secures every transaction in the chain of custody, from rate confirmation through final delivery.
Highway Load Lock: Secure the rate confirmation. Load Lock replaces the email-based rate confirmation with a secure portal. Every rate confirmation is issued through Highway's platform with multi-factor authentication. Fraud alerts flag suspicious patterns in real time. Email spoofing does not work because the confirmation never goes through email.
Load Lock+: Secure the physical shipment. Load Lock+ adds a second layer of defense by verifying that the truck that picks up your freight is actually the truck dispatched by the verified carrier. It uses 100% ELD-based tracking with automated vehicle assignment. Real-time anomaly detection flags deviations. Precision geofencing around pickup and delivery locations confirms the right truck arrived at the right place.
Together, these systems create an unbroken chain of custody. A criminal would have to compromise the vetting database, defeat multi-factor authentication, spoof an ELD device, and physically appear at the correct GPS coordinates with the correct vehicle, all simultaneously. That is economically impractical. Criminals move on to easier targets.
The Numbers Behind the Investment
The full Load Lock and Load Lock+ stack adds approximately $30 per load. For a shipper moving 500 loads per month, that is $15,000 per month, or $180,000 per year.
One stolen load at the industry average costs $274,000. One incident wipes out more than a year of security investment. At $30 per load, full chain of custody technology is the cheapest insurance in the supply chain.
What This Looks Like in Practice
Across 89,000 FreightPlus shipments, only one customer experienced targeted cyber theft. After FreightPlus deployed the full Load Lock+ suite, the targeted cyber theft was eliminated completely. Not reduced. Eliminated.
You can read the full case study here.
What Shippers Should Do Now
Keep vetting. It is still the foundation. Carrier onboarding, insurance verification, FMCSA monitoring, Highway Connect, all of it.
Eliminate email from the rate confirmation process. Move to a portal-based system with multi-factor authentication.
Require ELD-based tracking on every load. Not check calls. Not "call the driver." ELD integration that verifies the truck and the driver from pickup to delivery.
Get your freight off public load boards. A managed carrier network with direct tender reduces exposure dramatically.
Budget for security technology. At $30 per load, full chain of custody technology is a fraction of the cost of a single theft.
The cargo theft problem is solvable. Not with better background checks alone, but with technology that secures every step of the chain of custody. The tools exist. The question is whether you deploy them before or after the first incident.