[フレーム]

UNC2891 Hackers Use Linux Malware in Major Banking Security Heists

UNC2891 has been working its way through gaps in ATM security and broader banking security by slipping small hardware implants into places most teams assume are locked down. Investigators found Raspberry Pi systems sitting near ATM transaction switches, quietly feeding access back to the operators while Linux tooling handled the heavier work inside the network. The group paired that access with cloned cards and a mule network that turned compromised infrastructure into predictable cashouts.

The whole operation shows how easily a determined crew can turn physical access and an overlooked embedded device into long-term leverage inside a financial environment that otherwise looks hardened on paper.

How Did UNC2891 Breach ATM Security Using Hardware Implants and Linux Malware?

[画像:Linuxmalware Esm W400][画像:Linuxmalware Esm W400][画像:Linuxmalware Esm W400]Investigators traced the initial access point to a series of Raspberry Pi boards tucked into network paths that should never see unvetted hardware. Each device sat close to the ATM transaction switch, which gave the operators a clean line into systems that handle the core transaction flow. A small 4G modem handled the outbound channel, letting the attackers reach those boards without touching the bank’s perimeter or dealing with its change controls.

Once inside, the group leaned on familiar Linux and Unix tooling. CAKETAP used CVE-2021-3156 to climb privileges on older hosts that had not fully cycled through patching. SLAPSTICK exploited CVE-2021-4034 through Polkit to reach the same goal on better-maintained systems. TINYSHELL kept things simple by giving the operators a lightweight remote shell that blended into normal process lists. None of these tools was complex, but they were quiet and reliable.

The more interesting part came from the way UNC2891 relied on bind mounts to mask activity. By shifting sensitive paths into controlled views, they hid directories, logs, and even some of the tooling from routine inspections. It is the kind of trick that slips past teams that rely heavily on perimeter sensors and assume internal hosts are stable.

With control of the transaction switch and the surrounding infrastructure, the group moved from reconnaissance to monetization. Cloned cards were produced using data from the compromised environment, and mule crews handled the withdrawals across several countries. The hardware implants and the Linux malware stack gave them a foothold that survived audits for years because nothing looked obviously broken in the banking security stack.

Banking Security Risks and Real-World Campaign Activity

[画像:Ethical Hacking Esm W400][画像:Ethical Hacking Esm W400][画像:Ethical Hacking Esm W400]By the time forensic teams pieced the campaign together, it was clear UNC2891 had been active far longer than anyone assumed. Several banks in Southeast Asia reported activity dating back to 2017, which means the group operated through multiple hardware refresh cycles and at least one core-network redesign. That kind of persistence tells you the operators understood how ATM networks are built and where the weak seams sit between on-prem systems and switching infrastructure.

The affected systems weren’t limited to the ATMs themselves. The intrusion paths stretched across Linux and Unix hosts that supported transaction processing, card-issuing systems, and internal monitoring pipelines. Those hosts were often segmented on paper, but still exposed enough shared services to give an attacker room to move once the hardware implant was in place. Physical access gave them the starting point, and host-level access filled in the rest.

The financial losses tied to the cloned-card withdrawals added up quickly because the activity looked like routine consumer traffic at first glance. Mules cashed out across different ATM fleets and different regions, which made correlation harder until analysts started comparing timestamps and withdrawal patterns. It became clear that the issue wasn’t a single ATM model or a software defect. It was a structural weakness in how ATM security controls are layered inside modern banking environments.

For many teams, the uncomfortable part of this case is how ordinary the attack chain was. Nothing about the malware or operational playbook would surprise anyone who has worked in incident response. The scale came from patience, physical access, and a banking security model that still assumes internal networks are trusted once you get past the branch perimeter.

Strengthening ATM Security and Banking Security Controls

[画像:Screenshot 2025 11 26 At 9.50.45 PM Esm W400][画像:Screenshot 2025 11 26 At 9.50.45 PM Esm W400][画像:Screenshot 2025 11 26 At 9.50.45 PM Esm W400]Most of the recommendations that came out of this investigation were not new. What changed was the emphasis. Teams realized how much trust had accumulated around network closets, switch cabinets, and other places that rarely see routine inspection. Locking those areas down and tracking who enters them became just as important as patching a high-severity Linux bug. Once the Raspberry Pi boards were removed, several banks started logging physical access through the same lens they use for privileged account activity.

Scanning for unauthorized hardware turned into a practical exercise instead of a theoretical one. Some teams added periodic sweeps of ATM network segments with simple inventory scripts, backed by NAC policies that flag devices with unexpected MAC prefixes or cellular interfaces. This isn’t glamorous work, but it closes the gap that allowed the 4G implants to sit unnoticed for so long.

Segmentation reviews followed. Many banks had ATM networks separated on paper while still sharing authentication paths, update channels, or internal monitoring systems with the broader environment. Cleaning up those links took time, and in some cases, it required coordination with vendors who had quietly relied on those shared services. Once those pathways were clarified, the Linux privilege-escalation vulnerabilities used by CAKETAP and SLAPSTICK became less useful to an attacker.

Operational teams also began monitoring for unusual bind-mount behavior. Bind mounts are common in container platforms and maintenance workflows, but they stand out on hosts that normally run a predictable set of banking applications. Alerting on that activity gave analysts something concrete to investigate instead of relying on signature-based detections.

The last piece involved fraud teams. They rebuilt their processes for spotting mule behavior and repeated cloned-card withdrawals. Instead of monitoring only per-card anomalies, they began correlating ATM usage across regions and providers. This tied the operational side of banking security to the cash-out phase in a way that hadn’t been done before.

Closing Thoughts: What This Means for Linux, ATM Security, and Modern Banking Security

[画像:Cybersec Esm W400][画像:Cybersec Esm W400][画像:Cybersec Esm W400]The UNC2891 case shows how much risk sits in the gaps between well-defended systems. The Linux hosts involved in this incident were not fragile or outdated. They were typical production machines running standard banking workloads, and they failed only because an attacker reached them through a path no one was watching. Once the hardware implant was in place, the group had time to learn the environment and adjust their tooling until it blended in.

It also highlights how hybrid operations are becoming normal for financially motivated crews. They mix physical access, off-the-shelf hardware, and quiet Linux malware to build a foothold that lasts. This is less about zero-day exploits and more about understanding how real networks behave when they age. The longer the infrastructure remains unchanged, the more predictable it becomes to someone who has already found a way inside.

For security teams, the insight is simple but uncomfortable. Strong perimeter controls and regular patching are not enough when the attacker starts from a position that bypasses both. Modern banking security depends on treating every layer, including the physical one, as part of the threat surface. That means monitoring embedded devices, verifying internal assumptions, and treating unexpected behavior on stable systems as a signal rather than noise.

Finally, the case is a reminder that the people involved in these operations matter as much as the tooling. The cashouts only worked because mule networks were available and coordinated. Without that human layer, the malware and the Raspberry Pi hardware would have been interesting but unprofitable. Understanding how these mule networks operate helps teams see where technical controls stop being effective and where operational gaps begin.

Related Articles

Get the Latest News & Insights

Sign up to get the latest security news affecting Linux and open source delivered straight to your inbox.

Please enable the javascript to submit this form
© 2024 Guardian Digital, Inc All Rights Reserved
You are now being logged in using your Facebook credentials

AltStyle によって変換されたページ (->オリジナル) /