Trojan Driver Scam Puts Cargo Thieves Inside the Cab Before Pickup
Organized theft groups are placing fake drivers inside legitimate carriers to steal loads from within. What small fleets should verify before handing over the keys.

Organized cargo theft groups are no longer waiting for a truck to leave the yard. They are placing their own drivers inside legitimate carriers before the load is ever picked up.
Scott Cornell, Chief Risk Officer at SPG Cargo & Logistics, calls it the Trojan Driver scam. The pattern emerged when Cornell noticed small inconsistencies across multiple theft cases — trucks parked in unexplained locations, routes that did not match the planned stop, identifying information that came back inconsistent. None of those details alone proved fraud. Together, they revealed a new method.
How does the Trojan Driver scam work?
The scam starts with a planted driver. Organized theft groups have spent years placing insiders in warehouses, brokerages, and distribution centers to gather shipment information. What changed is the role. The insider is now the driver.
The fake driver joins a legitimate carrier — often a small fleet that does not run deep background checks or verify employment history with previous carriers. The driver waits for a high-value load assignment. Once dispatched, the driver picks up the freight using the carrier's legitimate authority and paperwork. Everything appears normal at the shipper's dock. The truck leaves. The load disappears.
Cornell first spotted the pattern in a single case that looked like a standard theft. The truck was parked somewhere the driver could not explain. Communication became difficult. Basic identifying information did not match. When Cornell began discussing the case with other industry contacts — first in smaller groups, then publicly at a conference — more companies reported similar situations. Different freight. Different carriers. Same inconsistencies.
What red flags did carriers miss?
The carriers hit by Trojan Driver schemes missed verification steps that would have surfaced the fake identity. Most small fleets do not run criminal background checks on new hires. Many do not verify employment history with the driver's previous carrier. Some do not confirm the driver's CDL with the state DMV before the first dispatch.
The fake drivers often present stolen or fabricated CDLs. They provide references that do not check out when called. They list previous employers that either do not exist or have no record of the driver. The theft groups are sophisticated enough to create plausible work histories, but the details fall apart under basic verification.
Carriers also missed behavioral red flags once the driver was on the road. The driver stopped communicating after pickup. The truck's GPS showed stops that did not match the planned route. The driver could not explain delays or location changes when dispatched called. By the time the carrier realized something was wrong, the load was gone.
Why are theft groups shifting to inside jobs?
Placing a driver inside a legitimate carrier bypasses the verification steps that have made traditional cargo theft harder. When a fake carrier tries to pick up a load using stolen or fabricated authority, shippers and brokers can catch the fraud by checking the carrier's MC number, verifying insurance, and calling the carrier's listed phone number. When the driver works for a real carrier with valid authority, those checks pass.
The shift also reflects how much harder it has become to steal freight after pickup. GPS tracking, geofencing, and real-time monitoring make it difficult to divert a truck without triggering alarms. Email hijacking and pickup-point fraud have surged as criminals move to digital methods, but those schemes still require bypassing shipper verification at the dock. The Trojan Driver scam eliminates that friction. The driver walks in with legitimate paperwork from a legitimate carrier.
Cornell noted that organized theft groups have been trying to place insiders for years. What changed is the scale. More groups are using the method. More small carriers are getting hit. The pattern is no longer isolated.
What should small fleets verify before hiring a driver?
Small fleets should add three verification steps to their driver onboarding workflow:
Run a criminal background check. Many small carriers skip this step to save money or speed up hiring. Theft groups know this. A basic background check through a commercial screening service costs $30 to $50 per driver and surfaces criminal history, identity fraud, and previous theft charges.
Verify employment history with previous carriers. Call the carrier the driver lists as their last employer. Ask for the driver's dates of employment, the equipment they drove, and whether the carrier would rehire them. If the carrier has no record of the driver, or if the phone number does not connect to a real company, the driver is lying.
Confirm the CDL with the state DMV. Fake CDLs are common in cargo theft schemes. Most state DMVs allow carriers to verify a CDL online or by phone. The verification takes five minutes and confirms the license number, class, endorsements, and expiration date match what the driver provided.
Carriers should also verify the driver's identity documents — Social Security number, home address, and emergency contact — against public records. If the driver cannot provide a consistent address or if the Social Security number does not match the name, the carrier should not dispatch the driver.
What should dispatchers watch for after the driver is on the road?
Dispatchers should flag drivers who stop communicating after pickup, especially on high-value loads. If a driver does not answer calls or texts for more than two hours without explanation, the dispatcher should check the truck's GPS location and call the shipper to confirm the load is still secure.
Dispatchers should also flag unexplained route deviations. If the truck's GPS shows the driver stopped at a location that is not on the planned route, the dispatcher should call the driver immediately and ask for an explanation. If the driver cannot explain the stop or if the explanation does not match the GPS data, the carrier should assume the load is at risk.
Carriers should establish a check-in protocol for high-value loads — drivers must call or text the dispatcher at specific intervals (e.g., after pickup, every four hours, before delivery). If the driver misses a check-in, the dispatcher escalates immediately.
Three checks to add before handing over the keys
The Trojan Driver scam works because small carriers skip basic verification. Theft groups are counting on that. Carriers should add these three checks to their driver onboarding workflow:
First, run a criminal background check and verify the driver's employment history with their previous carrier. If the previous carrier has no record of the driver, do not hire them.
Second, confirm the driver's CDL with the state DMV before the first dispatch. If the CDL does not verify, the driver is using a fake license.
Third, establish a check-in protocol for high-value loads and flag drivers who stop communicating or deviate from the planned route. If the driver cannot explain a stop or a delay, assume the load is at risk and escalate immediately.
The cost of verification is $50 per driver. The cost of a stolen load is $100,000 or more. The math is clear.


