UNC2891 Unmasked: The ATM Fraud Saga That Left Indonesian Banks Reeling
The UNC2891 ATM fraud campaign has given “money laundering” a whole new twist. With Raspberry Pi infiltration and a touch of TeamViewer coordination, this group turned ATMs into their personal piggy banks. Their secret weapon? A CAKETAP rootkit, proving that even cybercriminals appreciate a good dessert metaphor while bypassing PINs.

Hot Take:
Well, if you thought the only thing you had to worry about at an ATM was the grumpy person behind you wondering why it’s taking so long, think again! UNC2891 has turned ATM transactions into a high-stakes game of cat and mouse. Who knew Raspberry Pi would be the key ingredient in the recipe for robbing banks? It seems like these cybercriminals are more persistent than that one friend who still insists on texting “LOL” after every single message.
Key Points:
- UNC2891 orchestrated a multi-year ATM fraud campaign against two Indonesian banks.
- The threat group used Raspberry Pi devices and developed malware like CAKETAP for ATM transaction manipulation.
- Money mules were recruited using Google ads and Telegram channels to facilitate cash withdrawals.
- Persistence was achieved through custom backdoors like TINYSHELL, SLAPSTICK, and SUN4ME.
- Anti-forensics measures were implemented using tools like LOGBLEACH and MIGLOGCLEANER.
