Rexing Companies Breach Incident Score: Analysis & Impact (COSREX1767166389)
The Rankiteo video explains how the company Rexing Companies has been impacted by a Cyber Attack on the date December 30, 2025.
Incident Summary
If the player does not load, you can open the video directly.
Key Highlights From This Incident Analysis
- Timeline of Rexing Companies's Cyber Attack and lateral movement inside company's environment.
- Overview of affected data sets, including SSNs and PHI, and why they materially increase incident severity.
- How Rankiteoโs incident engine converts technical details into a normalized incident score.
- How this cyber incident impacts Rexing Companies Rankiteo cyber scoring and cyber rating.
- Rankiteoโs MITRE ATT&CK correlation analysis for this incident, with associated confidence level.
Full Incident Analysis Transcript
In this Rankiteo incident briefing, we review the Rexing Companies breach identified under incident ID COSREX1767166389.
The analysis begins with a detailed overview of Rexing Companies's information like the linkedin page: https://www.linkedin.com/company/rexingcompanies, the number of followers: 742, the industry type: Transportation, Logistics, Supply Chain and Storage and the number of employees: 18 employees
After the initial compromise, the video explains how Rankiteo's incident engine converts technical details into a normalized incident score. The incident score before the incident was 749 and after the incident was 723 with a difference of -26 which is could be a good indicator of the severity and impact of the incident.
In the next step of the video, we will analyze in more details the incident and the impact it had on Rexing Companies and their customers.
On 12 December 2023, Rexing Companies disclosed Cyber Cargo Theft (Fictitious Pickup) issues under the banner "Fictitious Pickup Cargo Theft of Lobster Meat".
A shipment of lobster meat worth $400,000 was stolen from a Massachusetts cold storage facility by a person posing as a truck driver for a legitimate freight carrier.
The disruption is felt across the environment, plus an estimated financial loss of $400,000.
In response, and stakeholders are being briefed through Public disclosure via media (Insurance Journal).
The case underscores how Ongoing (FBI and local police), teams are taking away lessons such as Need for stricter verification of driver credentials and shipping paperwork to prevent fictitious pickups. Cargo theft is a widespread issue requiring legislative and law enforcement attention, and recommending next steps like Implement multi-factor verification for driver credentials and shipping documents, Enhance collaboration between logistics companies, law enforcement, and regulatory bodies to combat organized cargo theft and Advocate for new legislation and additional resources to address cybercrimes and cargo theft scams, with advisories going out to stakeholders covering Freight brokers, storage facilities, and retailers should review and strengthen their verification processes for cargo pickups.
Finally, we try to match the incident with the MITRE ATT&CK framework to see if there is any correlation between the incident and the MITRE ATT&CK framework.
The MITRE ATT&CK framework is a knowledge base of techniques and sub-techniques that are used to describe the tactics and procedures of cyber adversaries. It is a powerful tool for understanding the threat landscape and for developing effective defense strategies.
Rankiteo's analysis has identified several MITRE ATT&CK tactics and techniques associated with this incident, each with varying levels of confidence based on available evidence. Under the Initial Access tactic, the analysis identified Phishing: Spearphishing Attachment (T1566.001) with moderate to high confidence (70%), supported by evidence indicating forged shipping documents and impersonate legitimate truck drivers and Compromise Accounts (T1586) with moderate to high confidence (80%), supported by evidence indicating stolen data to forge shipping documents and impersonate legitimate truck drivers. Under the Credential Access tactic, the analysis identified Gather Victim Identity Information: Credentials (T1589.001) with moderate to high confidence (80%), supported by evidence indicating fraudulent commercial driverโs license and fake paperwork. Under the Defense Evasion tactic, the analysis identified Use Alternate Authentication Material: Application Access Token (T1550.001) with moderate to high confidence (80%), supported by evidence indicating fake paperwork and a fraudulent commercial driverโs license and Forge Web Credentials (T1622) with moderate to high confidence (70%), supported by evidence indicating forged shipping documents and impersonate legitimate truck drivers. Under the Exfiltration tactic, the analysis identified Exfiltration Over Alternative Protocol: Exfiltration Over Symmetric Encrypted Non-C2 Protocol (T1048.001) with high confidence (90%), supported by evidence indicating $400,000 shipment of lobster meat... stolen from a Massachusetts cold storage facility. These correlations help security teams understand the attack chain and develop appropriate defensive measures based on the observed tactics and techniques.
Sources
- Rexing Companies Rankiteo Cyber Incident Details: http://www.rankiteo.com/company/rexingcompanies/incident/COSREX1767166389
- Rexing Companies CyberSecurity Rating page: https://www.rankiteo.com/company/rexingcompanies
- Rexing Companies Rankiteo Cyber Incident Blog Article: https://blog.rankiteo.com/cosrex1767166389-cyber-attack-december-2025/
- Rexing Companies CyberSecurity Score History: https://www.rankiteo.com/company/rexingcompanies/history
- Rexing Companies CyberSecurity Incident Source: https://www.insurancejournal.com/news/east/2025/12/30/852632.htm
- Rankiteo A.I CyberSecurity Rating methodology: https://www.rankiteo.com/static/rankiteo_algo.pdf
- Rankiteo TPRM Scoring methodology: https://static.rankiteo.com/model/rankiteo_tprm_methodology.pdf





