top of page

The Invisible Email Scam: How Fraudsters Blind Dispatchers and Steal Loads

  • 6 days ago
  • 5 min read

A freight dispatcher's inbox is the nerve center of their operation. On any given day, dozens of load offers, rate confirmations, and broker communications flow through that inbox, each representing a potential revenue opportunity. The invisible email scam exploits this reliance by turning the dispatcher's own inbox against them — silently hiding legitimate load offers in the spam folder while a criminal intercepts and accepts those same loads under the carrier's name.


This tactic is a critical component of the broader carrier identity theft ecosystem. It is particularly insidious because it requires no technical sophistication to execute once an email account has been compromised, and it can go undetected for weeks. Numeo's AI-powered platform is specifically designed to detect and neutralize this attack, alerting carriers the moment their broker communications are being suppressed.

How the Invisible Email Scam Works

The invisible email scam typically begins with a phishing attack. The fraudster sends a convincing email to a dispatcher or owner-operator, impersonating a load board, a broker, or even a government agency such as the FMCSA. The email contains a link to a fake login page that captures the dispatcher's email credentials when they attempt to sign in.

With access to the email account, the attacker sets up inbox rules — automated filters that most email platforms support — to redirect specific emails to the spam or trash folder. These rules are typically configured to target emails from high-value brokers: the companies that send the most load offers and represent the most revenue for the carrier.

From the dispatcher's perspective, the inbox simply goes quiet. They stop receiving offers from those brokers and assume that freight is slow or that the brokers are using other carriers. Meanwhile, the attacker is receiving those same emails, responding to the brokers as the legitimate carrier, and arranging fraudulent load pickups.

Attack Phase

What the Attacker Does

What the Dispatcher Sees

Duration Before Detection

1. Credential Theft

Phishes dispatcher's email password

Nothing unusual

Immediate

2. Rule Injection

Creates inbox rules to move broker emails to spam

Inbox goes quiet from certain brokers

Days to weeks

3. Load Interception

Accepts loads as the legitimate carrier

No load offers from targeted brokers

Days to weeks

4. Cargo Theft

Dispatches fraudulent driver to pick up cargo

Broker calls asking where shipment is

After delivery window

Why This Scam Is So Effective

The invisible email scam succeeds because it exploits a fundamental trust in the reliability of email. Dispatchers are trained to respond to what is in their inbox, not to question what might be missing from it. When a broker stops sending load offers, the natural assumption is a business reason — the broker found a cheaper carrier, freight volumes are down, or the broker is using a different load board.

The scam is also self-concealing. Unlike a DNS hijacking attack, which requires changes to external infrastructure that can be detected by monitoring services, inbox rule injection happens entirely within the carrier's own email account. Without an intelligent monitoring system that understands what normal communication patterns look like, there is no automated way to know that emails are being suppressed.

According to a 2025 report by FreightWaves, impersonation scams are becoming increasingly sophisticated, with criminal organizations investing in tools and techniques that make their attacks harder to detect and attribute. The invisible email scam is a prime example of this trend: it is low-tech in execution but high-impact in outcome.

The Financial Impact on Carriers

Loss Category

Description

Estimated Impact

Direct cargo loss

Value of stolen shipment

$50,000 – $500,000+ per incident

Insurance deductible

Out-of-pocket cost before insurance pays

$5,000 – $25,000

Broker relationship damage

Brokers may blacklist carrier after fraud incident

Loss of recurring revenue

Legal costs

Defense against shipper/broker claims

$10,000 – $100,000+

Operational disruption

Time spent investigating and recovering

Days to weeks of reduced productivity

Reputational harm

Negative reviews and word-of-mouth

Long-term revenue reduction

Source: Industry estimates based on NICB cargo theft data (2025) and FMCSA fraud reporting guidelines.

Numeo's Intelligent Email Monitoring

Numeo's approach to the invisible email scam is grounded in behavioral analysis. Rather than simply scanning for known malware or phishing signatures, Numeo's AI builds a model of what normal communication looks like for each carrier — which brokers typically send load offers, at what frequency, and during what hours. When the system detects a significant deviation from this baseline — such as a sudden cessation of emails from a high-value broker — it flags the anomaly and alerts the carrier.

This behavioral approach is critical because inbox rules are not inherently malicious. Every email platform supports them, and legitimate users create them all the time to organize their inboxes. What makes an inbox rule suspicious is the context: a rule that moves emails from a major broker to the spam folder, created at 2 AM on a Sunday, is very different from a rule that organizes newsletters into a separate folder.

Numeo's system also works in conjunction with its DNS monitoring service. If an attacker has both compromised the carrier's email account and altered their DNS records, Numeo will detect both attack vectors simultaneously, providing a comprehensive picture of the breach and enabling a faster, more complete response.

A Dispatcher's Security Checklist

Security Practice

Why It Matters

How to Implement

Use a unique, strong password for email

Prevents credential stuffing attacks

Use a password manager (e.g., Bitwarden, 1Password)

Enable 2FA on email account

Blocks access even if password is stolen

Use an authenticator app, not SMS

Review inbox rules monthly

Catches malicious rules before they cause damage

Check Settings > Rules/Filters in your email client

Verify sender before clicking links

Prevents phishing credential theft

Hover over links to see the real URL before clicking

Use Numeo's email monitoring

Detects suppressed emails automatically

Available on Numeo's free Lite tier

Frequently Asked Questions

How can I tell if my inbox has been compromised by this scam?

The most common signs are: brokers you regularly work with suddenly stop sending load offers; a broker calls to say they sent you a load offer that you never received; or you notice inbox rules in your email settings that you did not create. Numeo's monitoring service will alert you automatically if it detects that emails from known brokers are being suppressed.

Does Numeo monitor my email content?

Numeo analyzes communication patterns — such as which senders you typically receive emails from and at what frequency — rather than reading the content of individual emails. This behavioral analysis approach allows Numeo to detect anomalies without compromising the privacy of your business communications.

What should I do if I find unauthorized inbox rules?

Delete the rules immediately, then change your email account password and enable two-factor authentication. Review your sent folder for any emails you did not send, and contact any brokers whose emails were being suppressed to inform them of the situation. Report the incident to the FMCSA and your insurance provider.

References

Book a Demo

Book a demo to see how it works.

bottom of page