Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
UNC2891 Threat Actors Hacked ATM Networks Using 4G Raspberry Pi Device

UNC2891 Threat Actors Hacked ATM Networks Using 4G Raspberry Pi Device

Posted on July 31, 2025July 31, 2025 By CWS

A financially motivated menace group often called UNC2891 orchestrated a classy assault on banking infrastructure by bodily putting in a 4G-equipped Raspberry Pi gadget immediately into an ATM community, safety researchers from Group-IB revealed this week.

The marketing campaign represents a uncommon occasion of cybercriminals combining bodily entry with superior anti-forensics methods to focus on essential monetary methods.

The assault, which was in the end thwarted earlier than completion, demonstrated how menace actors are evolving past conventional digital infiltration strategies to use bodily vulnerabilities in banking networks.

Key Takeaways1. Hackers used a Raspberry Pi with 4G to breach ATM networks, bypassing defenses.2. They hid malware utilizing a complicated Linux technique and disguised it as reliable processes.3. Commonplace forensic instruments failed; solely deep reminiscence and community evaluation uncovered the assault.4. Banks should safeguard each bodily and digital belongings and make use of superior forensic methods.

Investigators found the Raspberry Pi linked on to the identical community change as an ATM, successfully inserting the gadget inside the financial institution’s inner community perimeter.

Bodily Backdoor Establishes Persistent Entry

The attackers outfitted the Raspberry Pi with a 4G modem, enabling distant command-and-control operations by cellular knowledge connections that fully bypassed conventional perimeter firewalls and community defenses.

Utilizing a customized backdoor referred to as TINYSHELL, the gadget established outbound communication channels by way of Dynamic DNS domains, offering steady exterior entry to the compromised community.

“This gadget was linked on to the identical community change because the ATM, successfully inserting it contained in the financial institution’s inner community,” Group-IB researchers famous of their evaluation. The setup enabled the attackers to take care of persistent entry whereas avoiding detection by typical community monitoring methods.

Maybe most importantly, the investigation revealed UNC2891’s use of a beforehand undocumented anti-forensics method involving Linux bind mounts to cover malicious processes from detection instruments.

This technique has since been formally acknowledged by MITRE and cataloged within the ATT&CK framework as method T1564.013 (Disguise Artifacts: Bind Mounts).

The attackers deployed backdoors masquerading as reliable system processes named “lightdm,” mimicking the usual LightDM show supervisor discovered on Linux methods.

Nonetheless, these malicious binaries have been situated in uncommon directories together with /tmp/lightdm and /var/snap/.snapd/lightdm, with command-line arguments designed to look reliable.

Commonplace forensic triage instruments did not detect these processes as a result of the menace actors used bind mounts to overlay malicious course of directories with benign ones, successfully rendering the backdoors invisible to standard evaluation strategies.

The last word goal of UNC2891’s marketing campaign was to deploy CAKETAP, a classy rootkit designed to govern {Hardware} Safety Module (HSM) responses and facilitate fraudulent ATM money withdrawals.

The malware was engineered to intercept card and PIN verification messages, enabling unauthorized transactions whereas sustaining the looks of regular operations.

The assault highlighted essential gaps in conventional forensic approaches. Preliminary triage did not reveal the backdoors as a result of they have been hidden throughout system idle states, requiring reminiscence forensics and steady community monitoring to uncover the malicious exercise.

Safety consultants now advocate implementing a number of defensive measures: monitoring mount and umount system calls by way of instruments like auditd or eBPF, alerting on uncommon /proc/[pid] mounts, blocking executions from non permanent directories, securing bodily community infrastructure, and incorporating reminiscence evaluation in incident response procedures.

Combine ANY.RUN TI Lookup along with your SIEM or SOAR To Analyses Superior Threats -> Attempt 50 Free Trial Searches

Cyber Security News Tags:Actors, ATM, Device, Hacked, Networks, Raspberry, Threat, UNC2891

Post navigation

Previous Post: Browser Extensions Pose Serious Threat to Gen-AI Tools Handling Sensitive Data 
Next Post: API Security Firm Wallarm Raises $55 Million

Related Posts

Hackers Actively Attacking Cisco and Palo Alto Networks VPN Gateways to Gain Login Access Hackers Actively Attacking Cisco and Palo Alto Networks VPN Gateways to Gain Login Access Cyber Security News
Microsoft Defender Vulnerability Allows Attackers to Elevate Privileges Microsoft Defender Vulnerability Allows Attackers to Elevate Privileges Cyber Security News
Windows Packer pkr_mtsi Powers Widespread Malvertising Campaigns Delivering Multiple Malware Families Windows Packer pkr_mtsi Powers Widespread Malvertising Campaigns Delivering Multiple Malware Families Cyber Security News
Hackers Exploit Cellular Router’s API to Send Malicious SMS Messages With Weaponized Links Hackers Exploit Cellular Router’s API to Send Malicious SMS Messages With Weaponized Links Cyber Security News
Hackers Weaponize Fake Microsoft Teams Site to Deploy Odyssey macOS Stealer Hackers Weaponize Fake Microsoft Teams Site to Deploy Odyssey macOS Stealer Cyber Security News
Surge in Attacks Targeting RSC-Enabled Services Worldwide Surge in Attacks Targeting RSC-Enabled Services Worldwide Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News