Raspberry Pi Planted in Failed ATM Heist

Raxis Chief Penetration Tester Brian Tant discusses the Raspberry Pi used in a recent ATM heist and how Raxis uses the same type of device in our pentesting.

Categories: , ,

Posted on

By

Raspberry Pi Planted in Failed ATM Heist

At Raxis, we’re always keeping an eye on real-world attacks so that we are on top of current exploits that may affect our customers if we don’t find them so they can remediate first. Recently we read about a failed bank ATM heist that included planting a raspberry pi device on the bank’s network. This is very relevant to me because I lead the Raxis Transporter initiative that allows our customers to receive full cloud/internal network and wireless network penetration tests remotely.

Here I’d like to chat about the power of a malicious actor successfully planting such a device and also how we use them to proactively find weaknesses that organizations can fix.

The Raspberry Pi Network Implant

Attempting to compromise a bank’s ATM infrastructure, the hacking group UNC2891 deployed a Raspberry Pi with a 4G modem as a physical network implant. They connected it to an ATM switch to establish persistent access over a cellular link, even after other activities had been detected. This allowed lateral movement to critical systems, using a rootkit intended to spoof authorizations and enable unauthorized withdrawals. While investigators discovered the plot and took corrective action, this cautionary tale exemplifies the stealthy utility of network implants in real-world attacks.

Raxis routinely employs these same techniques in penetration testing and red team exercises to simulate adversarial tactics, uncover vulnerabilities, and strengthen defenses before malicious actors strike. Raxis also uses Raspberry Pis on internal network assessments to facilitate persistent reverse connections and enable numerous other C2 solutions when called for during an assessment.

Raxis Transporter devices
Raxis Transporter

The Pentester’s Swiss Army Knife

The Raspberry Pi shines in multiple threat models due to its affordability, compact size, and Linux compatibility, making it ideal for “dropbox” implants, devices physically placed in target networks to provide remote access during engagements. Running distributions like Kali Linux, a Pi can host an arsenal of pentesting tools, from scanning tools to exploitation frameworks, all while blending into the environment as innocuous hardware.

The Raspberry Pi is incredibly versatile. It can be readily extended beyond its native capabilities using commercially available hardware, enhancing stealth and multi-vector persistence. The Pi’s four USB ports accommodate specialized dongles such as 802.11 wireless adapters, additional ethernet connections, Bluetooth radios, LoRa nodes, and even cellular modems for direct, long range remote access.

The Raspberry Pi has few substitutes as one of the best tools to exploit physical security lapses, such as unsecured server rooms or unused network ports in office areas. Penetration testing, augmented with network implants, often reveals blind spots that may get missed in a unipolar assessment.


Ready to See Raxis One In Action?

See how we transform traditional pen testing into interactive security intelligence that keeps you informed every step of the way. From real-time attack progression to detailed remediation guidance, Raxis One gives you unprecedented visibility into your security posture as it’s being tested.

More From Raxis

  • PSE & Red Team Series: The Power of Grip to Enhance the Under-Door Tool

    PSE & Red Team Series: The Power of Grip to Enhance the Under-Door Tool

    By Brad Herring • August 12, 2025
  • Choosing a Penetration Testing Company: Part 3

    Choosing a Penetration Testing Company: Part 3

    By Caroline Kelly • July 29, 2025
  • Microsoft Releases Security Patch for Actively Exploited On-Premises SharePoint Vulnerabilities

    Microsoft Releases Security Patch for Actively Exploited On-Premises SharePoint Vulnerabilities

    By Jason Taylor • July 22, 2025
  • OWASP Top 10 for LLM Applications

    OWASP Top 10 for LLM Applications Penetration Testing

    By Jason Taylor • July 15, 2025