Cybercrooks use Raspberry Pi to steal ATM cash
-
This post did not contain any content.
They hooked a raspberry pi up to the network switch. At this point i think they fucked up security pretty bad
-
This post did not contain any content.
I'm surprised the article went into so much detail as to how they pulled it off.
-
Cybercrooks
I fuckin love these dumbass names they give to hackers.
I love how the name "hacker" was successfully vilified by associating it with criminals, something we already had a word for.
-
Cybercrooks
I fuckin love these dumbass names they give to hackers.
They needed a lot of physical interactions to pull off this cybercaper.
-
I'm surprised the article went into so much detail as to how they pulled it off.
It's the Register, it is targeted to people familiar with technology.
-
Cybercrooks
I fuckin love these dumbass names they give to hackers.
Urban Dictionary: Hacker
Hacker: The media's definition of the real term malicious cracker. A hacker used to be a well respected individual who loved to tinker with gadgets. In the...
Urban Dictionary (www.urbandictionary.com)
"The media's definition of the real term malicious cracker. A hacker used to be a well respected individual who loved to tinker with gadgets.", plus a few other definitions.
-
This post did not contain any content.
I saw cybercrooks and had to take the opportunity
-
This post did not contain any content.
honestly, pretty poor security here. I can't say much cause I don't have inter-device restrictions either... but I'm also not a bank that handles money.
There's no reason a random device should have been able to interface with any of the other devices tbh, I'm guessing the switch wasn't smart so didn't support Mac filtering or port disabling cause that should have not been a valid attack vector.
-
This post did not contain any content.
The backdoor, for example, appeared to be the LightDM display manager often used by Linux systems, demonstrating the group's skillset, which the researchers said spanned Linux, Unix, and Oracle Solaris environments.
The backdoor was the display manager. Well goddamn.
-
This post did not contain any content.
Were they going to the Galleria to play Missile Command?
"Easy money..."
-
They hooked a raspberry pi up to the network switch. At this point i think they fucked up security pretty bad
The criminals, or the people they paid to carry out the physical attack, connected a Raspberry Pi to a bank's network switch, the same one hooked up to the ATM that was subsequently raided.
They're kind of skipping over an important detail here.
Sure the technical details are interesting, but it's a bit like discussing the alloys of the tumblers of the safe deposit box after the team has unexplainably bypassed the main safe door...
-
The criminals, or the people they paid to carry out the physical attack, connected a Raspberry Pi to a bank's network switch, the same one hooked up to the ATM that was subsequently raided.
They're kind of skipping over an important detail here.
Sure the technical details are interesting, but it's a bit like discussing the alloys of the tumblers of the safe deposit box after the team has unexplainably bypassed the main safe door...
Yeah that implies physical access.
Like it takes a ceritain security level to even get into rooms that have those switches.
It was probably some IT worker.
Hope they never get caught lol
-
honestly, pretty poor security here. I can't say much cause I don't have inter-device restrictions either... but I'm also not a bank that handles money.
There's no reason a random device should have been able to interface with any of the other devices tbh, I'm guessing the switch wasn't smart so didn't support Mac filtering or port disabling cause that should have not been a valid attack vector.
I just work a pretty standard engineering job at a large company (basically regular office work, not a critical industry like power or pharma), and any MAC that isn't approved by IT is simply not a allowed to interface with anything whatsoever. It's insane that a bank has this loose IT security.
-
This post did not contain any content.
UNC2891 also used Linux bind mounts to hide its backdoor processes, which, at the time, had not been documented in public threat reports, Group-IB said.
The technique is now recognized by MITRE's ATT&CK framework as T1564.013.
Holy crap. They discovered, and successfully implemented a novel technique. That's impressive af