With just $700 and a Raspberry Pi — you too can become a cybercriminal

Raspberry Pi 5 close-up on chip
(Image credit: Raspberry Pi Foundation)

Everyone’s favourite single-board microcomputer, the Raspberry Pi, just got sinister, as cybercriminals have been spotted selling software for the devices catering to inexperienced criminals looking to dabble in financial crime.

Don’t try this at home, obviously, but the ‘GEOBOX’ software, with proxy and network traffic routing capabilities, is being sold on Telegram for pretty extortionate prices.

For just $80 a month, or $700 as a one off fee, you too can be investigated for theft and fraud offenses by the security firm Resecurity, who supposedly uncovered the use of GEOBOX in ‘a high-profile banking theft impacting a Fortune 100 company’.

And they would have gotten away with it too...

Detailing the discovery in a blog post (via BleepingComputer), Resecurity explained that “[Pis running GEOBOX] served as proxies, significantly enhancing their anonymity. This approach complicated the investigation and tracking process, especially since, by default, GEOBOX devices do not store any logs.”

There’s nothing less cool than a ‘highly capable tool that can complicate law enforcement tracking and investigation’, but that’s what Resecurity says we’ve got on our hands. Well, even less cooler would be buying software that law enforcement agencies are now almost certainly aware of and actively trying to kill. 

However it might be more complicated than that, as GEOBOX doesn’t contain any features that you can’t find in existing software or operating systems. GPS and IP spoofing, Wi-Fi access-point emulation and VPN protocol support might seem scary on paper, but can be of legitimate use, and aren’t anything that you won’t find in other tools or operating systems.

Still, the problem with GEOBOX is that it packages these features in a lightweight Linux distribution with a UI that massively lowers the barrier of entry to committing evil. Resecurity suggests that crimes well-suited to the GEOBOX include the operation of dark web marketplaces, disinformation campaigns, and, of course, financial fraud. Unsurprisingly, we don’t have buying guides for crime.

We’ve run stories like this before, and we suspect this one won’t be the last: Raspberry Pis are cheap and small, so disposable and easily concealed - which are all legitimate strengths of the device. 

This writer likes that Pis can be hidden behind a monitor or television, be basically forgotten about as they’re near-enough silent, and doesn’t think that stories like this should put you off looking into them if you think they seem neat.

More from TechRadar Pro

Luke Hughes
Staff Writer

 Luke Hughes holds the role of Staff Writer at TechRadar Pro, producing news, features and deals content across topics ranging from computing to cloud services, cybersecurity, data privacy and business software.

Read more
AMD
Eat this, Raspberry Pi 5: Here are 3 powerful AMD Ryzen Mini PCs that sell for under $180 and trounce more expensive SBCs
Dreamfyre Mini PC
Forget about a $120 Raspberry Pi 5 barebone, I found a much better mini PC that has 512GB SSD, a far more powerful CPU, Windows 11 Pro and an actual casing
The 16GB Raspberry Pi 5 board
You can now get a Raspberry Pi 5 with 16GB RAM
Representational image of a cybercriminal
Criminals are spreading malware disguised as DeepSeek AI
The Python banner logo on a computer screen running a code editor.
More malicious Python packages are on the loose, experts warn
Flags of Iran, China, Russia and North Korea on a wall. China North Korea Iran Russia alliance
Cybercrime is helping fund rogue nations across the world - and it's only going to get worse, Google warns
Latest in Security
A graphic showing someone on a tablet working through a supply chain.
Security issue in open source software leaves businesses concerned for systems
ransomware avast
One of the most powerful ransomware hacks around has been cracked using some serious GPU power
person at a computer
Infamous ransomware hackers reveal new tool to brute-force VPNs
person at a computer
Many workers are overconfident at spotting phishing attacks
A fish hook is lying across a computer keyboard, representing a phishing attack on a computer system
Microsoft 365 accounts are under attack from new malware spoofing popular work apps
Data Breach
Thousands of healthcare records exposed online, including private patient information
Latest in News
Panos Panay and Alexa Plus
Amazon's Panos Panay teases future Alexa+ devices from speakers to possible wearables
Metroid Prime 4
I reckon the Nintendo Switch 2 could launch with Metroid Prime 4 – here’s why
Samsung Galaxy Z Fold 6
New rumors predict a foldable iPhone will launch next year – and cost almost twice as much as the iPhone 16 Pro Max
Pebble smartwatch countdown
Pebble confirms its smartwatch announcement is just hours away
Logo of YouTube Shorts
Is YouTube auto-playing Shorts when you open the app? Well, you’re not alone - here’s how to fix it
Google DeepMind panel discussion
“More sovereignty and protection” - Google goes all-in on UK AI with data residency, upskilling projects, and startup investments