Key findings
- Proofpoint monitored a cargo theft actor’s post‑compromise activity for more than a month in a decoy environment operated by Deception.pro.
- The attacker abused multiple remote access tools to establish persistence, including the use of a previously unknown third‑party signing‑as‑a‑service capability.
- Proofpoint also observed extensive reconnaissance to identify financial access, payment platforms, and cryptocurrency assets to enable freight fraud and broader financial theft.
- Reconnaissance specifically targeting fuel card services, fleet payment platforms, and load board operators was likely intended to enable transportation‑related crimes, including cargo theft.
Overview
In late February 2026, Proofpoint researchers executed a malicious payload from a threat actor targeting transportation organizations inside a controlled decoy environment operated by our partners at Deception.pro. While the environment did not represent a transportation carrier, it remained compromised for more than a month—offering rare, extended visibility into post‑compromise operations, tooling, and decision‑making.
Proofpoint previously documented this actor’s campaigns against trucking and logistics companies to facilitate cargo theft and freight fraud. In this case, the extended interaction revealed persistence through multiple remote management tools, the use of a previously unknown signing‑as‑a‑service capability designed to evade detection and suppress security warnings, and extensive post-compromise reconnaissance activity.
This reconnaissance focused on identifying financial access—such as banking, accounting, tax software, and money transfer services—as well as transportation‑related entities, including fuel card services, fleet payment platforms, and load board operators. The latter activity was likely designed to support crimes against the transportation industry, including cargo theft and related financial fraud.
A familiar actor, a new view
In November 2025, Proofpoint published research describing a threat actor leveraging compromised load boards to gain access to trucking companies, enabling freight diversion and cargo theft. While that research focused on initial access and target impact, opportunities to observe the actor’s post-compromise operations were limited.
This engagement changed that.
Following payload execution inside the Deception.pro environment in late February, the actor maintained access for more than a month. Their ensuing activity provided Proofpoint researchers with an unusually detailed view of post‑compromise tooling, scripting, reconnaissance behavior, and operator‑driven decision‑making.
Initial access and payload delivery
On February 27, 2026, after compromising a load board platform, the actor delivered a malicious payload via email to transportation carriers inquiring about fraudulent advertised loads. Load board platforms are online marketplaces that connect shippers and freight brokers with motor carriers by advertising available loads. The payload consisted of a Visual Basic Script (VBS) file that, when executed:
- Downloaded and executed a PowerShell script
- Installed the ScreenConnect remote access tool
- Displayed a decoy broker‑carrier agreement to mask malicious activity

Figure 1. Email content sent after responding to a fraudulent load posted on a load board.

Figure 2. Actor-controlled web page hosting a malicious VBS payload.
Establishing persistence with multiple RMM tools
Once access was established, the actor focused heavily on remote administration and redundancy.
Over the following month, the actor leveraged existing access to install:
- Four separate ScreenConnect instances
- Pulseway Remote Monitoring and Management (RMM)
- SimpleHelp RMM
The use of multiple concurrent RMM platforms suggests deliberate redundancy designed to preserve access even if one tool is detected or disabled.
A previously unknown signing‑as‑a‑service capability
The fourth ScreenConnect instance, downloaded in late March, stood apart from earlier installations.
This installation chain began when the attacker used an existing ScreenConnect session to launch an initial PowerShell script. That script bypassed normal PowerShell controls, downloaded and executed a second‑stage PowerShell payload with parameters specific to the ScreenConnect installer, and then deleted itself to reduce forensic artifacts. The second‑stage script performed the core deployment using a third‑party signing‑as‑a‑service provider, which re‑signed ScreenConnect installers and components with a valid—but fraudulent—code‑signing certificate.
Specifically, the second‑stage script:
- Built a ScreenConnect MSI download URL from the attacker’s ScreenConnect infrastructure hosted at amtechcomputers[.]net.
- Submitted that MSI URL to an external signing service hosted at signer[.]bulbcentral[.]com
- Polled the service until signing was completed
- Downloaded the newly signed MSI from a separate, signer‑controlled URL hosted at services-sc-files.s3.us-east-2.amazonaws[.]com
- Verified that the MSI’s Authenticode signature was valid
- Silently installed the signed MSI on the system
After installation, the script optionally downloaded a ZIP archive from the same S3 infrastructure. This ZIP contained ScreenConnect component binaries (e.g., ScreenConnect.Client.exe) re‑signed with the same certificate used for the MSI. The script extracted these files and replaced the originally installed components—backing up existing files, stopping and restarting the ScreenConnect service as needed. This step eliminated ScreenConnect binaries signed with now‑revoked ConnectWise certificates and ensured that all installed components were uniformly signed with a certificate that Windows still treated as trusted.
In combination, these actions allowed the attacker to establish and maintain persistent remote access while actively circumventing certificate revocations, security warnings, and trust‑based endpoint controls. By laundering trust through an external signing service and replacing revoked vendor‑signed binaries, the attacker preserved long‑term, stealthy access and reduced the likelihood of user awareness or control‑based detection.
Proofpoint researchers collaborated with security researcher @Squiblydoo to analyze the signing service and successfully revoke the associated certificate:
SignerName: STEPHEN WHANG, CPA, INC.
ValidFrom 5:00 PM 12/23/2025
ValidTo 4:59 PM 12/24/2026
SerialNumber 38 4B 49 3A B7 6F AE 54 F8 3A E6 BF A8 7E 5C 10
Thumbprint D45D60B20006BC3A39AE1761CB5F5F5B067B4EE5
CertIssuer Sectigo Public Code Signing CA EV R36
Interactive hands-on-keyboard (HOK) post-compromise activity
With persistent access in place, the actor conducted hands‑on-keyboard activity and tooling execution:
- Approximately three days after intrusion, the actor manually accessed the PayPal website through the user’s browser.
- Eight days into the intrusion, the actor used ScreenConnect to execute a PyInstaller‑packed binary designed to scan for browser extension and desktop cryptocurrency wallets and exfiltrate positive findings to attacker‑controlled Telegram bots.
These actions indicate discretionary, operator‑driven targeting rather than purely automated malware execution.
Reconnaissance through PowerShell automation
During the intrusion, Proofpoint observed at least 13 PowerShell scripts executed by the threat actor which, collectively, focused on determining whether the compromised host belonged to a financially valuable user.
Script Capabilities:
- Enumerate all local user accounts and browser profiles
- Extract browsing history from Chrome, Edge, Firefox, and Chromium‑based variants
- Copy locked browser databases to temporary locations
- Identify hard‑coded URLs associated with banking, payments, logistics, fleet services, and accounting platforms
- Exfiltrate metadata—such as hostname, browser type, profile counts, and match frequency—to attacker‑controlled Telegram bots
This telemetry provides the actor with rapid insight into a victim’s financial authority, payment access, and business role.
Consistent behaviors across scripts
Across multiple scripts, Proofpoint identified consistent behaviors:
- Scanning browser history across all user profiles
- Querying SQLite databases and performing binary pattern matching
- Searching for access to specific logistics, payment, and financial services
- Storing artifacts in hidden directories (e.g., C:\H)
- Executing successfully under SYSTEM context
- Sending summary results to Telegram for operator review
- In one instance, creating delayed SYSTEM scheduled tasks to evade proxy controls
The scripts searched for indicators of access to the following platforms, among others:
- U.S. financial institutions and banks
- Money transfer services
- Online accounting platforms
- Interbank payment systems
- Fleet fuel card and payment providers
- Freight brokerage and load management platforms
The breadth of these targets strongly aligns with financially motivated theft, fraud, and cargo diversion operations tied to transportation workflows. In particular, targeting of fuel card services, fleet payment platforms, and freight brokerage systems indicates intent to enable crimes against the transportation industry, including freight diversion and cargo theft.
A final PowerShell script
In late March, the attacker ran an additional PowerShell script through ScreenConnect’s custom property feature to quietly collect endpoint intelligence and report it back to the attacker through the existing remote‑access channel. It enumerated installed antivirus software and checked for the presence of high‑value financial, tax, accounting, and cryptocurrency applications. The results were automatically returned to the attacker’s ScreenConnect console without generating separate network traffic or alerts.
Conclusion
This extended intrusion highlights how financially motivated threat actors targeting transportation organizations operate well beyond initial access, prioritizing persistence, reconnaissance, and credential harvesting to identify opportunities for financial exploitation across transportation and related financial platforms. Portions of this activity are also consistent with preparatory behavior observed in freight theft and cargo diversion operations.
Notably, the use of a signing‑as‑a‑service capability underscores a growing trend toward attacker use of legitimate trust mechanisms to evade detection.
For transportation, logistics, and freight organizations, these findings reinforce the importance of monitoring for unauthorized remote management tools, suspicious PowerShell activity, and abnormal browser telemetry associated with financial platform access.
Emerging Threats signatures
2049863 - SimpleHelp Remote Access Software Activity
2049805 - Simplehelp Remote Administration Suite HTTP Server Value in Response
2066799 - Kaseya Pulseway Domain in DNS Lookup (pulseway .s3-accelerate .amazonaws .com)
2066797 - Kaseya Pulseway RMM Domain in DNS Lookup (pulseway .com)
2066798 - Observed Kaseya Pulseway Domain (pulseway .com) in TLS SNI
2066800 - Observed Kaseya Pulseway Domain (pulseway .s3-accelerate .amazonaws .com) in TLS SNI
Indicators of compromise*
*First Uploaded to VirusTotal by Proofpoint
|
Indicator |
Description |
First Seen |
|
1f89a432471ec2efe58df788c576007d6782bbdf5b572a5fbf5da40df536c9f5 |
SHA256 VBS Payload |
2026-02-27 |
|
hxxps://carrier-packets-docs[.]com/FREEDOM_FREIGHT_SERVICES_CARRIERS_ONBOARDING.vbs |
URL VBS Staging |
2026-02-27 |
|
hxxps://qto12q[.]top/pdf.ps1 |
URL PowerShell Staging |
2026-02-27 |
|
f4977bfeae2a957add1aaf01804d2de2a5a5f9f1338f719db661ac4f53528747 |
SHA256 ScreenConnect |
2026-02-27 |
|
nq251os[.]top |
Domain ScreenConnect C2 |
2026-02-27 |
|
d9832d9208b2c4a34cf5220b1ebaf11f0425cf638ac67bf4669b11c80e460f58 |
SHA256 Pulseway RMM |
2026-02-27 |
|
7f54cf5e2beb3f1f5d2b3ba1c6a16ce1927ffecd20a9d635329b1e16cb74fb14* |
SHA256 ScreenConnect |
2026-02-27 |
|
officcee404[.]com |
Domain ScreenConnect C2 |
2026-02-27 |
|
de30bb1e367d8c9b8b7d5e04e5178f2758157302638f81480ba018331a6f853e* |
SHA256 ScreenConnect |
2026-02-28 |
|
af124i1agga.anondns[.]net |
Hostname ScreenConnect C2 |
2026-02-28 |
|
b861e3682ca3326d6b29561e4b11f930f4a9f10e9588a3d48b09aa6c36a8ea80 |
SHA256 SimpleHelp |
2026-02-28 |
|
147.45.218[.]0 |
Domain SimpleHelp C2 |
2026-02-28 |
|
82d603c0b387116b7effdee6f361ca982c188de0c208e681e942300a0139c03f |
SHA256 Cryptocurrency Wallet Stealer |
2026-03-07 |
|
8a3d6a6870b64767ad2cc9ad4db728abf08bae84726b06be6cb97faac6c14ae4* |
SHA256 ScreenConnect |
2026-03-24 |
|
screlay[.]amtechcomputers[.]net |
Hostname ScreenConnect C2 |
2026-03-24 |
|
3dcb89430bae8d89b9879da192351506f4fdb7c67e253a27f58b3bf52101cd4c* |
PowerShell Script Signing Service |
2026-03-24 |
|
signer.bulbcentral[.]com |
Hostname Signing Service |
2026-03-24 |
|
services-sc-files.s3.us-east-2.amazonaws[.]com |
Hostname Signing Service |
2026-03-24 |