Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

UNC2891 Threat Actors Hacked ATM Networks Using 4G Raspberry Pi Device

Posted on July 31, 2025July 31, 2025 By CWS

A financially motivated menace group often called UNC2891 orchestrated a classy assault on banking infrastructure by bodily putting in a 4G-equipped Raspberry Pi gadget immediately into an ATM community, safety researchers from Group-IB revealed this week.

The marketing campaign represents a uncommon occasion of cybercriminals combining bodily entry with superior anti-forensics methods to focus on essential monetary methods.

The assault, which was in the end thwarted earlier than completion, demonstrated how menace actors are evolving past conventional digital infiltration strategies to use bodily vulnerabilities in banking networks.

Key Takeaways1. Hackers used a Raspberry Pi with 4G to breach ATM networks, bypassing defenses.2. They hid malware utilizing a complicated Linux technique and disguised it as reliable processes.3. Commonplace forensic instruments failed; solely deep reminiscence and community evaluation uncovered the assault.4. Banks should safeguard each bodily and digital belongings and make use of superior forensic methods.

Investigators found the Raspberry Pi linked on to the identical community change as an ATM, successfully inserting the gadget inside the financial institution’s inner community perimeter.

Bodily Backdoor Establishes Persistent Entry

The attackers outfitted the Raspberry Pi with a 4G modem, enabling distant command-and-control operations by cellular knowledge connections that fully bypassed conventional perimeter firewalls and community defenses.

Utilizing a customized backdoor referred to as TINYSHELL, the gadget established outbound communication channels by way of Dynamic DNS domains, offering steady exterior entry to the compromised community.

“This gadget was linked on to the identical community change because the ATM, successfully inserting it contained in the financial institution’s inner community,” Group-IB researchers famous of their evaluation. The setup enabled the attackers to take care of persistent entry whereas avoiding detection by typical community monitoring methods.

Maybe most importantly, the investigation revealed UNC2891’s use of a beforehand undocumented anti-forensics method involving Linux bind mounts to cover malicious processes from detection instruments.

This technique has since been formally acknowledged by MITRE and cataloged within the ATT&CK framework as method T1564.013 (Disguise Artifacts: Bind Mounts).

The attackers deployed backdoors masquerading as reliable system processes named “lightdm,” mimicking the usual LightDM show supervisor discovered on Linux methods.

Nonetheless, these malicious binaries have been situated in uncommon directories together with /tmp/lightdm and /var/snap/.snapd/lightdm, with command-line arguments designed to look reliable.

Commonplace forensic triage instruments did not detect these processes as a result of the menace actors used bind mounts to overlay malicious course of directories with benign ones, successfully rendering the backdoors invisible to standard evaluation strategies.

The last word goal of UNC2891’s marketing campaign was to deploy CAKETAP, a classy rootkit designed to govern {Hardware} Safety Module (HSM) responses and facilitate fraudulent ATM money withdrawals.

The malware was engineered to intercept card and PIN verification messages, enabling unauthorized transactions whereas sustaining the looks of regular operations.

The assault highlighted essential gaps in conventional forensic approaches. Preliminary triage did not reveal the backdoors as a result of they have been hidden throughout system idle states, requiring reminiscence forensics and steady community monitoring to uncover the malicious exercise.

Safety consultants now advocate implementing a number of defensive measures: monitoring mount and umount system calls by way of instruments like auditd or eBPF, alerting on uncommon /proc/[pid] mounts, blocking executions from non permanent directories, securing bodily community infrastructure, and incorporating reminiscence evaluation in incident response procedures.

Combine ANY.RUN TI Lookup along with your SIEM or SOAR To Analyses Superior Threats -> Attempt 50 Free Trial Searches

Cyber Security News Tags:Actors, ATM, Device, Hacked, Networks, Raspberry, Threat, UNC2891

Post navigation

Previous Post: What the 2025 Gartner® Magic Quadrant™ Reveals
Next Post: API Security Firm Wallarm Raises $55 Million

Related Posts

Threat Actors Abuse Windows Run Prompt to Execute Malicious Command and Deploy DeerStealer Cyber Security News
McDonald’s AI Hiring Bot With Password ‘123456’ Leaks Millions of Job-Seekers Data Cyber Security News
SAP’s July 2025 Patch Day Cyber Security News
Weaponized DMV-Themed Phishing Attacking U.S. Citizens to Harvest Personal and Financial Data Cyber Security News
Threat Actors Use Sophisticated Hacking Tools to Destroy Organizations Critical Infrastructure Cyber Security News
OPPO Clone Phone Weak WiFi Hotspot Exposes Sensitive Data Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Echo Raises $15M in Seed Funding for Vulnerability-Free Container Images
  • Bill Aims to Create National Strategy for Quantum Cybersecurity Migration
  • Search Engines are Indexing ChatGPT Conversations!
  • $1 Million Offered for WhatsApp Exploit at Pwn2Own Ireland 2025
  • Hackers Weaponizing Free Trials of EDR to Disable Existing EDR Protections

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Echo Raises $15M in Seed Funding for Vulnerability-Free Container Images
  • Bill Aims to Create National Strategy for Quantum Cybersecurity Migration
  • Search Engines are Indexing ChatGPT Conversations!
  • $1 Million Offered for WhatsApp Exploit at Pwn2Own Ireland 2025
  • Hackers Weaponizing Free Trials of EDR to Disable Existing EDR Protections

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News