ATM Under Siege

July 31, 2025

How UNC2891 Used a 4G Raspberry Pi to Breach Bank Networks

What happens when hackers go hands-on with your infrastructure?
Meet
UNC2891—a financially motivated threat group that’s redefining ATM attacks by blending physical infiltration with surgical cyber tactics. Their latest weapon? A 4G-enabled Raspberry Pi, physically planted inside a bank’s network. (For those unfamiliar, a Raspberry Pi is a tiny, fully functional computer that you can program and run offline. Think of it as a mini tech “brain” you control—it can run a custom operating system and manage gadgets or even security systems. It’s the kind of device hackers love to exploit, akin to a Flipper Zero hacking tool or something straight out of a spy thriller.)


The goal of UNC2891’s daring ploy? To sidestep firewalls, inject malware, and potentially hijack ATM cash operations with a rootkit known as CAKETAP.


๐Ÿง  Anatomy of a Cyber-Physical Breach

This was no ordinary remote hack—it was a hands-on break-in, a “spy gadget meets malware” operation. Here’s how it went down:

Step 1: Physical Infiltration – The attackers gained physical access to a secure ATM area (possibly with insider help). They plugged a 4G-modem-equipped Raspberry Pi into the network switch that the ATM was connected to. Suddenly, this tiny implant was an insider on the bank’s network, effectively bypassing all the bank’s firewalls and security monitoring systems upstream.

Step 2: Covert Control – Once the Pi was in place, it immediately phoned home over its cellular connection. It ran a stealthy backdoor program (TinyShell) and used a dynamic DNS service to set up a hidden command-and-control (C2) link back to the attackers. In plain terms, the hackers now had a remote control inside the ATM network—without tripping any alarms.

Step 3: Hiding in Plain Sight – Here’s where it gets clever. The attackers abused a Linux trick called bind mounts (MITRE ATT&CK technique T1564.013) to mask their presence. They essentially overlaid clean, innocuous files on top of their malicious files—like putting fresh wallpaper over a cracked wall. Security tools scanning the system saw only the clean “wallpaper,” not the dangerous malware lurking underneath.

Step 4: Preparing a Digital Heist – Finally, the attackers attempted to deploy a kernel rootkit dubbed CAKETAP. This malicious module was designed to spoof the bank’s Hardware Security Module (HSM) responses. In simple terms, it could fake the authorization signals that control ATM cash disbursements.


If CAKETAP had been activated, the hackers might have triggered ATMs to spit out cash on command, at scale. Fortunately, investigators discovered the scheme just in time, preventing the rootkit’s deployment and foiling the cash-out plot.


๐Ÿ” What This Means for Banks and Enterprises

This breach wasn’t just technical—it was tactical. It shows how the old adage still holds true:


“If an attacker can touch your hardware, they can own your network.”

Key Lessons:

  • Physical access = digital compromise. If someone can physically plug a rogue device into your system, assume they can breach it. Every exposed port or unsecured switch is a potential entry point, so security must extend beyond software.
  • Memory & network forensics beat file scans. Standard antivirus and disk scans missed the rootkit entirely. Only deep analysis of memory and live network connections revealed the hidden malware. In modern attacks, looking at running processes and RAM can be more important than checking the hard drive.
  • Perimeter defenses aren’t enough. Traditional firewalls and monitoring failed here because the Raspberry Pi used its own 4G connection to communicate. The device was inside the network and off the radar, so the usual perimeter security never saw any malicious traffic. Internal threats or implants must be assumed as a possibility.


๐Ÿ›ก๏ธ How to Stay Ahead of Hybrid Threats

To defend against these hybrid physical-cyber attacks, organizations should bolster both their physical security and cyber defenses:

  • ๐Ÿ” Secure every port and device: Lock down physical access to critical hardware. Padlock server rooms, secure network switches, and control who can plug in new devices. If there’s an open port in a public area, it’s a risk waiting to be exploited.
  • ๐Ÿง  Watch memory, not just disks: Use advanced security tools (EDR/XDR) that monitor real-time system behavior, not only files on disk. Analyze system memory and running processes for anomalies. This helps catch malware that hides in RAM or camouflages itself (as in this case).
  • ๐Ÿ“ก Monitor internal traffic: Keep an eye on network activity within your perimeter. Set up alerts for unusual beaconing or devices suddenly reaching out over cellular networks. If a box in your network starts talking to an unknown external server at odd hours, investigate immediately.
  • ๐Ÿ“‚ Detect the undetectable: Implement checks for sneaky techniques like bind mounts or hidden file systems. For example, monitor for unexpected mount/unmount operations or strange behavior in system directories. Any sign of tampering with system files or configurations should raise flags.
  • ๐Ÿงฐ Drill for blended attacks: Train and drill your incident response team on scenarios that combine physical breaches with cyber attacks. Run realistic simulations where a hacker might have insider access. The faster your team can respond to a device secretly added to your network, the better you can contain and eradicate the threat.


๐Ÿ‘๏ธ The Big Picture

Attacks like these prove we’ve entered a new era of cyber-physical warfare. The line between digital and physical security is blurring, and attackers are thinking outside the traditional playbook. A tiny gadget planted in an office can lead to a massive data breach or financial heist. Hackers are thinking beyond code—so must we.


At KromeIT, we help enterprises build smarter, safer, and more human-centric defenses—where every endpoint, cable, and port is accounted for.


Are your systems ready for an attack that walks in the front door?
โžก๏ธ Visit KromeIT.com and fortify your future.

August 1, 2025
Why Simply “Using AI” Is Not a Strategy—It’s a Starting Line
July 29, 2025
Securing the Enterprise in an Era of Intelligent Threats
July 28, 2025
How a Dating-Safety App's Breach Exposed 72,000 Images and Shattered Illusions of Privacy
July 21, 2025
The New Age of Precision Cyber Attacks: How one zero-day breach on Microsoft SharePoint exposed global enterprises—and what it signals for the future of cybersecurity ๏ปฟ
July 9, 2025
๐ŸŽ™๏ธ AI Voice Cloning Just Fooled the Government
July 7, 2025
Is Your Business Next? On July 6, 2025, the gaming world didn’t just lose access to a fan-favorite title—it received a cybersecurity wake-up call that CEOs and founders can’t afford to ignore. Call of Duty: WWII was pulled from PC platforms after a Remote Code Execution (RCE) vulnerability allowed attackers to seize control of players’ computers—all through an in-game match. This wasn’t just about video games. It was a demonstration of how real-time, high-revenue platforms are being weaponized as testing grounds for far more devastating cyberattacks. If a titan like Activision can be compromised, what’s protecting your enterprise? ๐ŸŽฎ From Game Glitch to System Takeover Shortly after a routine maintenance window on July 2, hackers began exploiting an RCE vulnerability in Call of Duty: WWII. The result? Player PCs were hijacked—wallpapers changed, files accessed, even explicit content pushed to screens. Xbox users were unaffected, shielded by the console’s closed system architecture. But PC users were left exposed, prompting Activision to yank the game offline. ๐Ÿงจ The Real Fallout: Trust, Transparency, and Brand Damage Beyond the technical impact, the reputational blow was severe. Players were incensed—not just by the breach, but by Activision’s vague, delayed response. In a world where transparency is currency, silence costs more than any breach. This reflects a universal business truth: during a crisis, how you communicate is as critical as how you respond. According to Cybersecurity Ventures, global cybercrime costs are projected to hit $10.5 trillion in 2025. One poorly handled breach can spiral into lost customers, investor distrust, and long-term brand damage. ๐Ÿงช Cybercrime’s New Petri Dish: Gaming Gaming platforms are ideal proving grounds for hackers: high concurrency, vocal communities, and huge revenue stakes. It’s not a matter of “if” this testing spills over into enterprise targets—it’s already happening. The same infrastructure—cloud servers, APIs, multiplayer data pipelines—that fuels online games also powers your SaaS tools, customer portals, and IoT networks. If hackers are probing game platforms today, your business systems might be next in line. ๐Ÿ›ก๏ธ KromeIT’s Proactive Cybersecurity Strategy At KromeIT , we don’t just respond—we anticipate. Our cybersecurity team conducts red-team simulations, penetration testing, and proactive RCE defense modeling to stress-test your organization before hackers do. From AI-assisted threat modeling to supply chain risk audits, our services are tailored to outsmart modern threats. Waiting for a real-world breach is like insuring your car after a crash. Be smarter. Be safer. โœ… Don’t Be the Next Headline If a $200 billion industry giant can fall victim to hackers, what’s shielding your business? Act now : Visit KromeIT.com to explore advanced cybersecurity and crisis management solutions designed to protect your future. ๏ปฟ Don’t become the next test case—fortify your systems and your brand with KromeIT’s smarter, safer, and more human approach to cybersecurity.
July 3, 2025
๐Ÿง  Why "Human + Tech" is the Only Cybersecurity Strategy That Will Survive 2025
LLM, artificial intelligence, technology, blockchain, AI
July 2, 2025
How Cybercriminals Are Exploiting LLMs—and What You Can Do About It
Artificial Intelligence, AI, Cyber, Security, Cyber Security, Blockchain, CEO
February 20, 2025
Artificial Intelligence a threat to businesses?