Tuesday, April 22, 2025
HomeCyber Security NewsHackers Steal Over $5,700 from ATMs Using Raspberry Pi

Hackers Steal Over $5,700 from ATMs Using Raspberry Pi

Published on

SIEM as a Service

Follow Us on Google News

The Raspberry Pi is a budget-friendly Linux computer system board that features GPIO pins for physical computing and IoT exploration. However, besides this, threat actors also abuse this board for several illicit purposes as well.

Recent arrests in Lubbock involve three men accused of using electronic devices to steal money from regional ATMs, as revealed in court documents from EverythingLubbock.

At a hotel in the 6600 block of I-27 on August 3, the following three accused were arrested:-

- Advertisement - Google News
  • Abel Valdes, 38
  • Yordanesz Sanchez, 41
  • Carlos Jordano Herrera-Ruiz, 33

Hackers Robbed ATMs Using Raspberry Pi 

However, it’s been unveiled that the authorities in Lubbock were already alerted to a group stealing substantial amounts of US currency from ATMs in West Texas, as reported by the Texas Financial Crime Taskforce.

In this event, to access the cash drawer, the trio employed a “Raspberry Pi” device to disable ATM security.

Before the arrest from a 50th Street ATM, the accused had stolen more than $5700 by using Raspberry Pi devices.

Moreover, it’s been detailed in the court documents that authorities found two Raspberry Pi devices in the suspects’ hotel room.

The specific Pi model used by the hackers during this event and their exact use in bypassing security remain unspecified and unconfirmed.

Criminal Offenses

The accused were charged with the following criminal offenses:-

  • Unlawful Interception
  • Use or Disclosure of Wire
  • Oral or Electronic Communications
  • Engaging in criminal activity
  • Forgery

Besides this, at the moment, the accused trio is in federal detention at the Lubbock County Detention Center.

Keep informed about the latest Cyber Security News by following us on Google NewsLinkedinTwitter, and Facebook.

Tushar Subhra
Tushar Subhra
Tushar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Latest articles

TP-Link Router Vulnerabilities Allow Attackers to Execute Malicious SQL Commands

Cybersecurity researchers have uncovered critical SQL injection vulnerabilities in four TP-Link router models, enabling...

Faster Vulnerability Patching Reduces Risk and Lowers Cyber Risk Index

Trend Micro's Cyber Risk Exposure Management (CREM) solution has highlighted the critical role that...

Malicious npm Packages Target Linux Developers with SSH Backdoor Attacks

In a sophisticated onslaught targeting the open-source ecosystem, reports have emerged detailing several malicious...

Samsung One UI Vulnerability Leaks Sensitive Data in Plain Text With No Expiration!

A glaring vulnerability has come to light within Samsung's One UI interface: the clipboard...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

TP-Link Router Vulnerabilities Allow Attackers to Execute Malicious SQL Commands

Cybersecurity researchers have uncovered critical SQL injection vulnerabilities in four TP-Link router models, enabling...

Faster Vulnerability Patching Reduces Risk and Lowers Cyber Risk Index

Trend Micro's Cyber Risk Exposure Management (CREM) solution has highlighted the critical role that...

Malicious npm Packages Target Linux Developers with SSH Backdoor Attacks

In a sophisticated onslaught targeting the open-source ecosystem, reports have emerged detailing several malicious...