Close Menu
OnlyPlanz –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Rethink

    September 27, 2025

    Durga Ashtami 2025 Date, Time, Puja Vidhi, Vrat Vidhi, Muhurat & Significance

    September 27, 2025

    Leonardo DiCaprio Knows It’s ‘Very Important’ To See ‘One Battle After Another’ In a Theater

    September 27, 2025
    Facebook X (Twitter) Instagram
    Trending
    • Rethink
    • Durga Ashtami 2025 Date, Time, Puja Vidhi, Vrat Vidhi, Muhurat & Significance
    • Leonardo DiCaprio Knows It’s ‘Very Important’ To See ‘One Battle After Another’ In a Theater
    • Insta360 announces Insta360 Wave professional-grade speakerphone and AI recording suite
    • AI Is Most Likely To Reshape The Jobs Of Its Creators
    • RIP to a Giant: French Monitor Company Transvideo to Shut Down After 40 Years of Business
    • From lotus to lava custard: Australia’s biggest mooncake sale – in pictures | Food
    • US economic growth revised up on strong consumer spending
    Facebook X (Twitter) Instagram Pinterest Vimeo
    OnlyPlanz –OnlyPlanz –
    • Home
    • Marketing
    • Branding
    • Modeling
    • Video Creation
    • Editing Tips
    • Content
    • Engagement
    • More
      • Tools
      • Earnings
      • Legal
      • Monetization
    OnlyPlanz –
    Home»Tools»In search of riches, hackers plant 4G-enabled Raspberry Pi in bank network
    Tools

    In search of riches, hackers plant 4G-enabled Raspberry Pi in bank network

    onlyplanz_80y6mtBy onlyplanz_80y6mtJuly 31, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    In search of riches, hackers plant 4G-enabled Raspberry Pi in bank network
    Share
    Facebook Twitter LinkedIn Pinterest Email

    “One of the vital uncommon components of this case was the attacker’s use of bodily entry to put in a Raspberry Pi gadget,” Group-IB Senior Digital Forensics and Incident Response Specialist Nam Le Phuong wrote. “This gadget was linked on to the identical community swap because the ATM, successfully inserting it contained in the financial institution’s inner community. The Raspberry Pi was geared up with a 4G modem, permitting distant entry over cell knowledge.”
    To take care of persistence, UNC2891 additionally compromised a mail server as a result of it had fixed Web connectivity. The Raspberry Pi and the mail server backdoor would then talk through the use of the financial institution’s monitoring server as an middleman. The monitoring server was chosen as a result of it had entry to nearly each server throughout the knowledge heart.

    The Community Monitoring Server as an middleman between the Raspberry Pi and the Mail Server.

    Credit score:
    Group-IB

    The Community Monitoring Server as an middleman between the Raspberry Pi and the Mail Server.

    Credit score:

    Group-IB

    As Group-IB was initially investigating the financial institution’s community, researchers observed some uncommon behaviors on the monitoring server, together with an outbound beaconing sign each 10 minutes and repeated connection makes an attempt to an unknown gadget. The researchers then used a forensic instrument to research the communications. The instrument recognized the endpoints as a Raspberry Pi and the mail server however was unable to determine the method names answerable for the beaconing.

    The forensic triage instrument is unable to gather the related course of identify or ID related to the socket.

    Credit score:
    Group-IB

    The forensic triage instrument is unable to gather the related course of identify or ID related to the socket.

    Credit score:

    Group-IB

    The researchers then captured the system reminiscence because the beacons had been despatched. The evaluation recognized the method as lightdm, a course of related to an open supply LightDM show supervisor. The method seemed to be reliable, however the researchers discovered it suspicious as a result of the LightDM binary was put in in an uncommon location. After additional investigation, the researchers found that the processes of the customized backdoor had been intentionally disguised in an try to throw researchers off the scent.
    Phuong defined:
    The backdoor course of is intentionally obfuscated by the menace actor by way of the usage of course of masquerading. Particularly, the binary is known as “lightdm”, mimicking the reliable LightDM show supervisor generally discovered on Linux methods. To reinforce the deception, the method is executed with command-line arguments resembling reliable parameters – for instance,
    lightdm –session little one 11 19 — in an effort to evade detection and mislead forensic analysts throughout post-compromise investigations.
    These backdoors had been actively establishing connections to each the Raspberry Pi and the inner Mail Server.
    As famous earlier, the processes had been disguised utilizing the Linux bind mount. Following that discovery, Group-IB added the method to the MITRE ATT&CK framework as “T1564.013 – Cover Artifacts: Bind Mounts.”
    Group-IB didn’t say the place the compromised switching gear was situated or how attackers managed to plant the Raspberry Pi. The assault was detected and shut down earlier than UNC2891 was capable of obtain its last aim of infecting the ATM switching community with the CakeTap backdoor.

    4Genabled bank hackers Network plant Raspberry riches Search
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleSelf-belief and sex eggs: 10 things we learned about Gwyneth Paltrow from an explosive new biography | Gwyneth Paltrow
    Next Article GitHub Copilot crosses 20 million all-time users
    onlyplanz_80y6mt
    • Website

    Related Posts

    Monetization

    Google is still 210x bigger than ChatGPT in search

    September 26, 2025
    Monetization

    Thousands of Indian bank transfer records found online

    September 26, 2025
    Monetization

    Google Search Live is live in U.S., with voice and camera AI mode

    September 25, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    5 Steps for Leading a Team You’ve Inherited

    June 18, 20255 Views

    A Pro-Russia Disinformation Campaign Is Using Free AI Tools to Fuel a ‘Content Explosion’

    July 1, 20253 Views

    Meera Sodha’s vegan recipe for Thai-style tossed walnut and tempeh noodles | Noodles

    June 28, 20253 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    Editing Tips

    Rethink

    onlyplanz_80y6mtSeptember 27, 2025
    Modeling

    Durga Ashtami 2025 Date, Time, Puja Vidhi, Vrat Vidhi, Muhurat & Significance

    onlyplanz_80y6mtSeptember 27, 2025
    Editing Tips

    Leonardo DiCaprio Knows It’s ‘Very Important’ To See ‘One Battle After Another’ In a Theater

    onlyplanz_80y6mtSeptember 27, 2025

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    SLR reform is happening. Does it matter?

    June 18, 20250 Views

    Panthers in awe of Brad Marchand’s ‘will to win’ in Cup run

    June 18, 20250 Views

    DOJ Offers Divestiture Remedy in Lawsuit Opposing Merger of Defense Companies

    June 18, 20250 Views
    Our Picks

    Rethink

    September 27, 2025

    Durga Ashtami 2025 Date, Time, Puja Vidhi, Vrat Vidhi, Muhurat & Significance

    September 27, 2025

    Leonardo DiCaprio Knows It’s ‘Very Important’ To See ‘One Battle After Another’ In a Theater

    September 27, 2025
    Recent Posts
    • Rethink
    • Durga Ashtami 2025 Date, Time, Puja Vidhi, Vrat Vidhi, Muhurat & Significance
    • Leonardo DiCaprio Knows It’s ‘Very Important’ To See ‘One Battle After Another’ In a Theater
    • Insta360 announces Insta360 Wave professional-grade speakerphone and AI recording suite
    • AI Is Most Likely To Reshape The Jobs Of Its Creators
    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Disclaimer
    • Get In Touch
    • Privacy Policy
    • Terms and Conditions
    © 2025 ThemeSphere. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.