this post was submitted on 30 Jul 2025
47 points (98.0% liked)

Pulse of Truth

1421 readers
147 users here now

Cyber Security news and links to cyber security stories that could make you go hmmm. The content is exactly as it is consumed through RSS feeds and wont be edited (except for the occasional encoding errors).

This community is automagically fed by an instance of Dittybopper.

founded 2 years ago
MODERATORS
 

A covert ATM attack used a Raspberry Pi to breach bank systems, employing stealthy malware and anti-forensics techniques

top 6 comments
sorted by: hot top controversial new old
[–] Onomatopoeia@lemmy.cafe 30 points 3 days ago* (last edited 3 days ago) (2 children)

attackers had physical access to a network switch

physically connected a Raspberry Pi device to a network switch shared with an ATM. Equipped with a 4G modem, the device allowed attackers to remotely access the bank’s internal network over mobile data, completely bypassing perimeter firewalls.

Well, no shit. If you don't have physical security, you don't have any security. This is like security 101.

[–] wizardbeard@lemmy.dbzer0.com 13 points 3 days ago (1 children)

There are mitigations possible against allowing unrecognized MAC addresses from getting network connection when plugged into an open port.

Security is meant to have layers. Defense in depth.

[–] ryannathans@aussie.zone 7 points 2 days ago (1 children)

Can't be forgetting 802.1x

[–] ramble81@lemmy.zip 3 points 2 days ago

I’ve seen ATMs using Windows 7 embedded. 802.1x support on 7 (let alone embedded) was extremely janky at best. Also it didn’t support some of the features that modern switches support too. That’s not an excuse for them but most likely their “defense in depth” was very limited and they just didn’t do quite a bit of it.

[–] SolacefromSilence@fedia.io 6 points 3 days ago

Even if you're able to plug into the network, it's a failure that still had access.

[–] AllNewTypeFace@leminal.space 3 points 3 days ago

Given how much money there is up for grabs, I imagine the next such implant won’t be anything as easily detectable as a Raspberry Pi. For a modest outlay that would fit within existing malware budgets, it would be possible to build a device that fits inside an otherwise conventional-looking Ethernet or USB cable and has enough power to relay traffic across the network. (I wouldn’t be surprised if you could buy those pre-built.)