Business Insights
  • Home
  • Crypto
  • Finance Expert
  • Business
  • Invest News
  • Investing
  • Trading
  • Forex
  • Videos
  • Economy
  • Tech
  • Contact

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • August 2023
  • January 2023
  • December 2021
  • July 2021
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019

Categories

  • Business
  • Crypto
  • Economy
  • Finance Expert
  • Forex
  • Invest News
  • Investing
  • Tech
  • Trading
  • Uncategorized
  • Videos
Apply Loan
Money Visa
Advertise Us
Money Visa
  • Home
  • Crypto
  • Finance Expert
  • Business
  • Invest News
  • Investing
  • Trading
  • Forex
  • Videos
  • Economy
  • Tech
  • Contact
Criminal hackers smuggled a Raspberry Pi into a bank’s ATM network and nearly pulled off a perfect digital heist
  • Tech

Criminal hackers smuggled a Raspberry Pi into a bank’s ATM network and nearly pulled off a perfect digital heist

  • August 9, 2025
  • Roubens Andy King
Total
0
Shares
0
0
0
Total
0
Shares
Share 0
Tweet 0
Pin it 0


  • Hackers installed a 4G Raspberry Pi inside a bank’s ATM switch to gain network access
  • The device was disguised and communicated every 600 seconds, avoiding typical detection systems
  • Malware used fake Linux names and obscure directories to blend into legitimate system activity

A criminal group recently attempted an unusual, and sophisticated intrusion, into a bank’s ATM infrastructure by deploying a 4G-enabled Raspberry Pi.

A report from Group-IB revealed the device was covertly installed on a network switch used by the ATM system, placing it inside the internal banking environment.

The group behind the operation, UNC2891, exploited this physical access point to circumvent digital perimeter defenses entirely, illustrating how physical compromise can still outpace software-based protection.


You may like

Exploiting physical access to bypass digital defenses

The Raspberry Pi served as a covert entry point with remote connectivity capabilities via its 4G modem, which allowed persistent command-and-control access from outside the institution’s network, without triggering typical firewall or endpoint protection alerts.

“One of the most unusual elements of this case was the attacker’s use of physical access to install a Raspberry Pi device,” Group-IB Senior Digital Forensics and Incident Response Specialist Nam Le Phuong wrote.

“This device was connected directly to the same network switch as the ATM, effectively placing it inside the bank’s internal network.”

Using mobile data, the attackers maintained a low-profile presence while deploying custom malware and initiating lateral movements within the bank’s infrastructure.

Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

A particular tool, known as TinyShell, was used to control network communications, enabling data to pass invisibly across multiple internal systems.

Forensics later revealed UNC2891 used a layered approach to obfuscation.

The malware processes were named “lightdm,” imitating legitimate Linux system processes.

These backdoors ran from atypical directories such as /tmp, making them blend in with benign system functions.

Also, the group used a technique known as Linux bind mounts to hide process metadata from forensic tools, a method not typically seen in active attacks until now.

This technique has since been cataloged in the MITRE ATT&CK framework due to its potential to elude conventional detection.

The investigators discovered that the bank's monitoring server was silently communicating with the Raspberry Pi every 600 seconds, network behavior which was subtle and thus didn’t immediately stand out as malicious.

However, deeper memory analysis revealed the deceptive nature of the processes and that these communications extended to an internal mail server with persistent internet access.

Even after the physical implant was removed, the attackers had maintained access via this secondary vector, showing a calculated strategy to ensure continuity.

Ultimately, the aim was to compromise the ATM switching server and deploy the custom rootkit CAKETAP, which can manipulate hardware security modules to authorize illegitimate transactions.

Such a tactic would allow fraudulent cash withdrawals while appearing legitimate to the bank’s systems.

Fortunately, the intrusion was halted before this phase could be executed.

This incident shows the risks associated with the growing convergence of physical access tactics and advanced anti-forensic techniques.

It also reveals that beyond remote hacking, insider threats or physical tampering can facilitate identity theft and financial fraud.

You might also like

Total
0
Shares
Share 0
Tweet 0
Pin it 0
Roubens Andy King

Previous Article
Three Catalysts That Could Push Bitcoin Beyond 0K
  • Crypto

Three Catalysts That Could Push Bitcoin Beyond $120K

  • August 9, 2025
  • Roubens Andy King
Read More
Next Article
Apple analyst rethinks price target after 0 billion U.S. investment
  • Trading

Apple analyst rethinks price target after $100 billion U.S. investment

  • August 9, 2025
  • Roubens Andy King
Read More
You May Also Like
Disney Settles FTC Complaint With YouTube Over Children’s Data Collection
Read More
  • Tech

Disney Settles FTC Complaint With YouTube Over Children’s Data Collection

  • Roubens Andy King
  • September 3, 2025
This HP laptop with an astonishing 32GB of RAM is just 1
Read More
  • Tech

This HP laptop with an astonishing 32GB of RAM is just $261

  • Roubens Andy King
  • September 3, 2025
Hot deal: Samsung Galaxy S25 Edge plummets to record-low price!
Read More
  • Tech

Hot deal: Samsung Galaxy S25 Edge plummets to record-low price!

  • Roubens Andy King
  • September 3, 2025
007 First Light looks like a hit, man
Read More
  • Tech

007 First Light looks like a hit, man

  • Roubens Andy King
  • September 3, 2025
Amazon’s Tomb Raider series will star Sophie Turner as Lara Croft
Read More
  • Tech

Amazon’s Tomb Raider series will star Sophie Turner as Lara Croft

  • Roubens Andy King
  • September 3, 2025
Orchard Robotics, founded by a Thiel fellow Cornell dropout, raises M for farm vision AI 
Read More
  • Tech

Orchard Robotics, founded by a Thiel fellow Cornell dropout, raises $22M for farm vision AI 

  • Roubens Andy King
  • September 3, 2025
Meta launches an Instagram app for the iPad, 15 years after its mobile app; it is slightly different than the mobile app, opening directly to a feed of Reels (Mia Sato/The Verge)
Read More
  • Tech

Meta launches an Instagram app for the iPad, 15 years after its mobile app; it is slightly different than the mobile app, opening directly to a feed of Reels (Mia Sato/The Verge)

  • Roubens Andy King
  • September 3, 2025
Acer Swift Air 16 laptop weighs less than 1kg, with a 16-inch screen, up to 32GB memory, and up to 1TB storage
Read More
  • Tech

Acer Swift Air 16 laptop weighs less than 1kg, with a 16-inch screen, up to 32GB memory, and up to 1TB storage

  • Roubens Andy King
  • September 3, 2025

Recent Posts

  • Crypto investor loses $3M in advanced phishing attack
  • Bitcoin ETFs see $2 billion inflow as institutional interest reignites
  • Rithm (RITM) Suffers a Larger Drop Than the General Market: Key Insights
  • Vitalik’s Research and Ecosystem Update
  • Security alert [Implementation of BLOCKHASH instruction in C++ and Go clients can potentially cause consensus issue – Fixed. Please update.]
Featured Posts
  • Crypto investor loses M in advanced phishing attack 1
    Crypto investor loses $3M in advanced phishing attack
    • September 13, 2025
  • Bitcoin ETFs see  billion inflow as institutional interest reignites 2
    Bitcoin ETFs see $2 billion inflow as institutional interest reignites
    • September 13, 2025
  • Rithm (RITM) Suffers a Larger Drop Than the General Market: Key Insights 3
    Rithm (RITM) Suffers a Larger Drop Than the General Market: Key Insights
    • September 13, 2025
  • Vitalik’s Research and Ecosystem Update 4
    Vitalik’s Research and Ecosystem Update
    • September 13, 2025
  • Security alert [Implementation of BLOCKHASH instruction in C++ and Go clients can potentially cause consensus issue – Fixed. Please update.] 5
    Security alert [Implementation of BLOCKHASH instruction in C++ and Go clients can potentially cause consensus issue – Fixed. Please update.]
    • September 13, 2025
Recent Posts
  • Why Array Technologies, Inc. (ARRY) Dipped More Than Broader Market Today
    Why Array Technologies, Inc. (ARRY) Dipped More Than Broader Market Today
    • September 13, 2025
  • Dogecoin Breaks Out, Eyes Historic Surge Between alt=
    Dogecoin Breaks Out, Eyes Historic Surge Between $0.41–$0.97 – What To Expect
    • September 13, 2025
  • Bitcoin Bears Shaken—Analyst Says Local Bottom 90% Likely Set
    Bitcoin Bears Shaken—Analyst Says Local Bottom 90% Likely Set
    • September 13, 2025
Categories
  • Business (2,057)
  • Crypto (1,686)
  • Economy (123)
  • Finance Expert (1,687)
  • Forex (1,685)
  • Invest News (2,362)
  • Investing (1,606)
  • Tech (2,056)
  • Trading (2,024)
  • Uncategorized (2)
  • Videos (817)

Subscribe

Subscribe now to our newsletter

Money Visa
  • Privacy Policy
  • DMCA
  • Terms of Use
Money & Invest Advices

Input your search keywords and press Enter.