January 31, 2026
Back to all stories

Bluspark Shipping Platform Left Freight Data Exposed for Months

Security researcher Eaton Zveare reports that Bluspark Global’s Bluvoyix freight‑management platform, used by hundreds of shippers and major U.S. retailers, grocery chains and manufacturers, had basic security flaws that left decades of shipment records and customer data exposed to anyone on the internet. In October he found that a publicly accessible API, advertised as requiring authentication, in fact returned sensitive account data including plaintext passwords and allowed creation of new administrator‑level accounts, effectively giving an attacker full control of the system and access to shipment data back to 2007. Zveare says Bluspark also left security tokens easily bypassed and had no clear vulnerability‑disclosure process, forcing him to spend weeks emailing, calling and messaging on LinkedIn before he could get the company’s attention; a maritime‑security group also tried and failed to reach Bluspark before other channels finally worked. The company now says it has fixed five vulnerabilities, including the plaintext passwords and remote‑access bugs, but has not publicly detailed how long the system was exposed or whether any criminal groups exploited it, amid broader law‑enforcement concern that organized cargo‑theft rings are pivoting to hacking logistics platforms to silently reroute shipments. For U.S. supply chains already strained by theft and geopolitical risk, the case underscores how a single unprotected SaaS provider can create systemic vulnerability, and how weak disclosure practices can leave critical infrastructure open for far too long.

Cybersecurity and Supply Chains Corporate Data Breaches

📌 Key Facts

  • Bluspark Global’s Bluvoyix platform is used by hundreds of companies, including major retailers, grocery chains and manufacturers, to manage and track worldwide freight.
  • Researcher Eaton Zveare discovered in October that Bluspark’s API exposed user data and allowed unauthenticated creation of admin‑level accounts, with shipment records accessible back to 2007.
  • Zveare says it took weeks of emails, voicemails and LinkedIn messages, plus help from the Maritime Hacking Village, before Bluspark responded; the company says five vulnerabilities have now been fixed, including plaintext password storage and remote‑interaction flaws.

📰 Source Timeline (1)

Follow how coverage of this story developed over time