HomeCyber SecurityUNC2891 Breaches ATM Community through 4G Raspberry Pi, Tries CAKETAP Rootkit for...

UNC2891 Breaches ATM Community through 4G Raspberry Pi, Tries CAKETAP Rootkit for Fraud


Jul 31, 2025Ravie Lakshmanan

UNC2891 Breaches ATM Community through 4G Raspberry Pi, Tries CAKETAP Rootkit for Fraud

The financially motivated risk actor often called UNC2891 has been noticed concentrating on Automated Teller Machine (ATM) infrastructure utilizing a 4G-equipped Raspberry Pi as a part of a covert assault.

The cyber-physical assault concerned the adversary leveraging their bodily entry to put in the Raspberry Pi machine and have it linked on to the identical community swap because the ATM, successfully putting it inside the goal financial institution’s community, Group-IB mentioned. It is at the moment not identified how this entry was obtained.

“The Raspberry Pi was outfitted with a 4G modem, permitting distant entry over cell knowledge,” safety researcher Nam Le Phuong mentioned in a Wednesday report.

Cybersecurity

“Utilizing the TINYSHELL backdoor, the attacker established an outbound command-and-control (C2) channel through a Dynamic DNS area. This setup enabled steady exterior entry to the ATM community, fully bypassing perimeter firewalls and conventional community defenses.”

UNC2891 was first documented by Google-owned Mandiant in March 2022, linking the group to assaults concentrating on ATM switching networks to hold out unauthorized money withdrawals at totally different banks utilizing fraudulent playing cards.

Central to the operation was a kernel module rootkit dubbed CAKETAP that is designed to cover community connections, processes, and information, in addition to intercept and spoof card and PIN verification messages from {hardware} safety modules (HSMs) to allow monetary fraud.

The hacking crew is assessed to share tactical overlaps with one other risk actor UNC1945 (aka LightBasin), which was beforehand recognized compromising managed service suppliers and putting targets inside the monetary {and professional} consulting industries.

Describing the risk actor as possessing in depth information of Linux and Unix-based programs, Group-IB mentioned its evaluation uncovered backdoors named “lightdm” on the sufferer’s community monitoring server which might be designed to ascertain energetic connections to the Raspberry Pi and the inner Mail Server.

Cybersecurity

The assault is important for the abuse of bind mounts to cover the presence of the backdoor from course of listings and evade detection.

The tip aim of the an infection, as seen previously, is to deploy the CAKETAP rootkit on the ATM switching server and facilitate fraudulent ATM money withdrawals. Nonetheless, the Singaporean firm mentioned the marketing campaign was disrupted earlier than the risk actor might inflict any critical injury.

“Even after the Raspberry Pi was found and eliminated, the attacker maintained inner entry by a backdoor on the mail server,” Group-IB mentioned. “The risk actor leveraged a Dynamic DNS area for command-and-control.”

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -
Google search engine

Most Popular

Recent Comments