Tuesday, March 4, 2025
HomeCyber Security NewsHackers Steal Over $5,700 from ATMs Using Raspberry Pi

Hackers Steal Over $5,700 from ATMs Using Raspberry Pi

Published on

SIEM as a Service

Follow Us on Google News

The Raspberry Pi is a budget-friendly Linux computer system board that features GPIO pins for physical computing and IoT exploration. However, besides this, threat actors also abuse this board for several illicit purposes as well.

Recent arrests in Lubbock involve three men accused of using electronic devices to steal money from regional ATMs, as revealed in court documents from EverythingLubbock.

At a hotel in the 6600 block of I-27 on August 3, the following three accused were arrested:-

  • Abel Valdes, 38
  • Yordanesz Sanchez, 41
  • Carlos Jordano Herrera-Ruiz, 33

Hackers Robbed ATMs Using Raspberry Pi 

However, it’s been unveiled that the authorities in Lubbock were already alerted to a group stealing substantial amounts of US currency from ATMs in West Texas, as reported by the Texas Financial Crime Taskforce.

In this event, to access the cash drawer, the trio employed a “Raspberry Pi” device to disable ATM security.

Before the arrest from a 50th Street ATM, the accused had stolen more than $5700 by using Raspberry Pi devices.

Moreover, it’s been detailed in the court documents that authorities found two Raspberry Pi devices in the suspects’ hotel room.

The specific Pi model used by the hackers during this event and their exact use in bypassing security remain unspecified and unconfirmed.

Criminal Offenses

The accused were charged with the following criminal offenses:-

  • Unlawful Interception
  • Use or Disclosure of Wire
  • Oral or Electronic Communications
  • Engaging in criminal activity
  • Forgery

Besides this, at the moment, the accused trio is in federal detention at the Lubbock County Detention Center.

Keep informed about the latest Cyber Security News by following us on Google NewsLinkedinTwitter, and Facebook.

Tushar Subhra
Tushar Subhra
Tushar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Latest articles

Hunters International Claims Tata Technologies Cyberattack

Multinational engineering and technology services firm Tata Technologies has reportedly fallen victim to a...

Authorities Seize $31 Million Linked to Crypto Exchange Hack

U.S. authorities announced the seizure of $31 million tied to the 2021 Uranium Finance...

Google, Meta, and Apple Power the World’s Biggest Surveillance System

Imagine a government that tracks your daily movements, monitors your communications, and catalogs your...

Docusnap for Windows Flaw Exposes Sensitive Data to Attackers

A recently disclosed vulnerability in Docusnap's Windows client software (CVE-2025-26849) enables attackers to decrypt...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Hunters International Claims Tata Technologies Cyberattack

Multinational engineering and technology services firm Tata Technologies has reportedly fallen victim to a...

Authorities Seize $31 Million Linked to Crypto Exchange Hack

U.S. authorities announced the seizure of $31 million tied to the 2021 Uranium Finance...

Google, Meta, and Apple Power the World’s Biggest Surveillance System

Imagine a government that tracks your daily movements, monitors your communications, and catalogs your...