Close Menu
  • Home
  • Latest News
  • Tech News
  • Blog
  • Contact

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Apple September 9, 2025 Event: iPhone 17, Apple Watch Ultra 3, AirPods Pro 3 & More

August 28, 2025

India says goodbye to GPS, to have its own desi navigation system, IRNSS

August 22, 2025

Ad Blockers Could be Banned in Germany

August 22, 2025
Facebook X (Twitter) Instagram
Today Bridge
  • Home
  • Latest News
  • Tech News
  • Blog
  • Contact
Facebook X (Twitter) Instagram
Today Bridge
Home » ATM Heist Foiled: Hackers Used 4G Raspberry Pi
Latest News

ATM Heist Foiled: Hackers Used 4G Raspberry Pi

Todays BridgeBy Todays BridgeAugust 1, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email

In a high-tech twist on an old-school bank heist, a group of sophisticated hackers planted a 4G-enabled Raspberry Pi inside a bank’s internal network in an attempt to loot its ATMs. But thanks to sharp-eyed investigators, the heist was stopped just in time before any financial damage occurred.

Cybersecurity firm Group-IB uncovered a sophisticated intrusion attempt by UNC2891 (aka LightBasin), a financially motivated threat group known for its attacks on banks and telecommunication systems worldwide since 2016. This time, however, the group demonstrated a new level of operational sophistication.

A Physical Break-In Meets Digital Intrusion

At the heart of the attack was a Raspberry Pi—a credit-card-sized computer equipped with a 4G modem. This device was physically installed on the same network switch as the ATM system, bypassing the bank’s firewalls and perimeter defenses via mobile data. It hosted malware and served as a command-and-control node for the attackers, allowing them to move deeper into the network undetected.

Group-IB suspects the hackers either infiltrated the premises themselves or paid off an insider to plant the device.

A Network Under Siege

Once inside, the device hosted a TinyShell backdoor, which established a persistent command-and-control (C2) channel using Dynamic DNS.

From the compromised switch, attackers laterally moved to the Network Monitoring Server, a critical system with connections to almost every other server in the bank’s data center. Once that was under their control, they used it to access the Mail Server, which had direct internet access. Even if the Raspberry Pi was discovered, they had a backup route to keep their foothold.

To evade detection, the attackers employed an undocumented Linux anti-forensics technique using bind mounts (now recognized in MITRE ATT&CK T1564.013) to obscure malicious processes.

The backdoor was disguised as a legitimate system process named lightdm—a known Linux display manager, and executed from non-standard paths like /tmp/lightdm.

Another factor that contributed to the attack’s high degree of stealth was LightBasin mounting alternative filesystems (like tmpfs and ext4) over critical system paths, successfully hiding the backdoor’s process data from standard forensic tools.

The attackers’ objective was to plant a custom rootkit named CAKETAP on the bank’s ATM switching server—a critical system that communicates with the bank’s Hardware Security Module (HSM), a device that authorizes ATM transactions—allowing the hackers to spoof ATM authorization for fraudulent withdrawals and potentially siphon off large sums of cash.

Thankfully, Group-IB detected the operation before this could be achieved.

A Wake-Up Call For The Banking Sector

The incident is a rare but chilling example of how cybercriminals are blending physical access with remote exploitation, making them both difficult to detect and challenging to contain.

Group-IB is urging financial institutions to bolster both their physical and digital security, with recommendations such as:

  • Locking down physical access to network switches, especially near ATM infrastructure.
  • Monitoring for unusual filesystem activity, especially the mounting of /proc
  • Capturing memory images during incident response—not just disk snapshots.
  • Blocking or flagging binaries that execute from suspicious paths like /tmp or .snapd.

This incident highlights how a low-cost device like a Raspberry Pi can bypass million-dollar defenses if physical access is overlooked. It’s a stark reminder that digital defense must account for physical vulnerabilities too—because even a small hardware can pose a serious threat if placed in the wrong hands

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleMassive $140M Bank Robbery in Brazil Cost Only $2,700 to Pull Off
Next Article Snapchat Adds ‘Home Safe’ Alerts
Todays Bridge
  • Website

A dedicated Fantasy Cricket Analyst with a deep passion for the game, focused on delivering insightful stats and well-researched predictions to empower others in making smart Fantasy Cricket decisions.

Related Posts

Latest News

Apple September 9, 2025 Event: iPhone 17, Apple Watch Ultra 3, AirPods Pro 3 & More

August 28, 2025
Tech News

India says goodbye to GPS, to have its own desi navigation system, IRNSS

August 22, 2025
Tech News

Ad Blockers Could be Banned in Germany

August 22, 2025
Add A Comment
Leave A Reply Cancel Reply

ad

Apple September 9, 2025 Event: iPhone 17, Apple Watch Ultra 3, AirPods Pro 3 & More

August 28, 2025

India says goodbye to GPS, to have its own desi navigation system, IRNSS

August 22, 2025

Ad Blockers Could be Banned in Germany

August 22, 2025

India Squad for Asia Cup 2025

August 22, 2025
Most Popular

Top 10 Most Popular Torrent Sites 2025

January 7, 202585 Views

Toss Prediction for Today’s International Matches – February 13, 2025

December 28, 202466 Views

Apple Agrees to $95 Million Settlement in Siri Privacy Lawsuit

January 7, 202522 Views
Our Picks

Apple September 9, 2025 Event: iPhone 17, Apple Watch Ultra 3, AirPods Pro 3 & More

August 28, 2025

India says goodbye to GPS, to have its own desi navigation system, IRNSS

August 22, 2025

Ad Blockers Could be Banned in Germany

August 22, 2025

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

Facebook X (Twitter) Instagram Pinterest
  • DMCA Policy
  • Terms and Conditions
  • Privacy Policy
  • Get In Touch
© Copyright 2026 Today Bridge . Designed by Web Design & Development.

Type above and press Enter to search. Press Esc to cancel.