UNC2891 Hacks ATM Network with 4G Raspberry Pi and Attempts CAKETAP Rootkit for Fraud

Published:

spot_img

Targeting ATMs: The UNC2891 Threat and Its Tactics

A New Kind of ATM Attack

In the realm of cybersecurity, the group known as UNC2891 has emerged as a formidable threat, particularly within the framework of ATM infrastructure. Utilizing a 4G-equipped Raspberry Pi, these attackers executed a covert operation that highlights the ongoing vulnerability of banking systems to sophisticated cyber assaults.

Physical Access and Initial Setup

A key aspect of this attack was the physical placement of the Raspberry Pi device, which was connected to the same network switch as the ATM. This setup effectively embedded the malicious device into the bank’s network, allowing for deeper penetration. The precise method through which the attackers gained physical access to the ATM network remains unclear, but the implications are serious.

Remote Command and Control

Security analyst Nam Le Phuong detailed that the Raspberry Pi was outfitted with a 4G modem, enabling remote access via mobile data. The attackers utilized the TINYSHELL backdoor to create an outbound command-and-control (C2) channel. This clever usage of a Dynamic DNS domain facilitated ongoing access to the ATM network, effectively circumventing perimeter firewalls and standard security defenses.

Background on UNC2891

First identified by Mandiant in March 2022, UNC2891 is linked to a range of attacks on ATM switching networks. Their sophisticated techniques enable unauthorized cash withdrawals from banks using forged cards. The core of their operations revolves around the CAKETAP rootkit, a malicious kernel module designed to obscure various network activities, including the hiding of network connections, processes, and files. This rootkit can also intercept card and PIN verification messages, facilitating the execution of financial fraud.

Interestingly, UNC2891 has shown tactical similarities with another hacking group, UNC1945, also known as LightBasin. This group has previously targeted managed service providers and has a history of intrusion within financial and professional consulting sectors. Group-IB’s analysis highlighted a backdoor, named lightdm, installed on the victim’s network monitoring server, which maintained active connections to the Raspberry Pi and the internal mail server.

Evasion Techniques and Red Flags

The attack exemplifies advanced evasion techniques, particularly through the usage of bind mounts to hide the backdoor from process listings. This strategy poses significant challenges for effective detection by cybersecurity measures. The ultimate aim of this infiltration is consistently to deploy the CAKETAP rootkit on ATM switching servers, enabling illegal cash withdrawals.

Disruption of Attack Campaign

Fortunately, the campaign was disrupted before the hackers could inflict serious damage. Group-IB reports that despite the Raspberry Pi being discovered and removed, the attackers retained internal access via a backdoor on the mail server, demonstrating the resilience of their infiltration strategies. The continued use of a Dynamic DNS domain for command-and-control purposes underlines the sophistication of this cyber threat.

The Importance of Vigilance

As cybersecurity threats continue to evolve, the actions of groups like UNC2891 serve as a stark reminder of the vulnerabilities that exist within financial infrastructures. Organizations must prioritize security measures to mitigate risks associated with physical access and to bolster defenses against advanced persistent threats.

spot_img

Related articles

Recent articles

Iran Strikes Tel Aviv with Cluster Warheads, Escalating Conflict After Assassination of Security Chief

Iran Strikes Tel Aviv with Cluster Warheads, Escalating Conflict After Assassination of Security Chief In a significant escalation of hostilities, Iran has launched missiles equipped...

Ubuntu 24.04 and Later Exposed to Critical Local Privilege Escalation Vulnerability (CVE-2026-3888)

Ubuntu 24.04 and Later Exposed to Critical Local Privilege Escalation Vulnerability (CVE-2026-3888) The Qualys Threat Research Unit has uncovered a significant Local Privilege Escalation (LPE)...

IT/OT Convergence Reshapes Cybersecurity Priorities for Critical Operational Systems

IT/OT Convergence Reshapes Cybersecurity Priorities for Critical Operational Systems The convergence of Information Technology (IT) and Operational Technology (OT) is fundamentally altering the landscape of...

AI Vulnerabilities in Amazon Bedrock, LangSmith, and SGLang Expose Data to Exfiltration and Remote Code Execution

AI Vulnerabilities in Amazon Bedrock, LangSmith, and SGLang Expose Data to Exfiltration and Remote Code Execution Recent cybersecurity research has unveiled critical vulnerabilities in prominent...