Offensive security in TMS, WMS, connected fleet, last-mile and freight platforms.
Why now
A carrier paralyzed by ransomware is a paralyzed fleet — trucks idle, perishable cargo spoiling, late-delivery fines, customers migrating. Organized crime targeting cargo theft already uses digital intel before the strike.
Applicable regulation
/attack-surface
Every engagement is designed for your environment. The points below are part of our standard playbook for this sector — final scope is adapted to your stack and contract.
Route manipulation, trip assignment, pre-strike intel.
GPS, jamming detection, insurer integration.
Registration bypass, delivery proof fraud.
Warehouse management, picking, dispatch.
SEFAZ integration, MDFe, manifest and CTe.
/methodology
Automated scanners find what's documented. Real attackers find what isn't. 90% of the work is manual — performed by specialists holding OSCP, CISSP, CRTO and GPEN.
Target mapping, OSINT, footprint, sector-specific threat modeling.
Deep enumeration, complementary scanning, manual exposure identification.
Manual validation with controlled PoC, finding chaining, escalation.
Executive + technical, step-by-step replication, mapped to applicable regulation.
/why-trust
iFood client — extreme-scale logistics operations.
Technical assessment recognized in highly regulated, mission-critical environments — the pentest that finds what nobody had found before.
Douglas Lopes
Founder · CEO · intrus.io
/faq
Yes. Driver registration, RNTRC, MDFe and other ANTT obligations.
Yes. Hardware, cellular/satellite communication, integration with monitoring OS.
/contact
Schedule a confidential meeting. Within 48h we'll send a proposal with scope, timeline and pricing.