Cuba Ransomware Breached 49 U.S. Critical Organizations

Share post:

The Federal Bureau of Investigation (FBI) announced that the Cuba ransomware gang was able to break through the networks of at least 49 organizations classified as critical U.S. infrastructure sectors.

“The FBI has identified, as of early November 2021 that Cuba ransomware actors have compromised at least 49 entities in five critical infrastructure sectors, including but not limited to the financial, government, healthcare, manufacturing, and information technology sectors. Cuba ransomware actors have demanded at least US $74 million and received at least U.S. $43.9 million in ransom payments,” the FBI said.

The FBI added that the ransomware group has earned more than $40 million since it began attacking US companies.

Cuba ransomware is able to penetrate the networks of victims via the malware downloader Hancitor, which allows the ransomware group to have easier access to already compromised corporate networks.

Hancitor (Chancitor) is notorious for providing information stealers, Remote Access Trojans (RATs), and other types of malware.

To breach their victims’ systems, Hancitor uses phishing emails and stolen credentials, exploits Microsoft Exchange vulnerabilities, or break-in through Remote Desktop Protocol (RDP) tools.

Cuba ransomware operators use legitimate Windows services such as gPowerShell, PsExec and other unspecified services to deploy their ransomware payloads remotely and encrypt files via the “.cuba” extension.

In addition, the FBI urged system administrators and security professionals who are able to detect Cuba ransomware activity in their corporate networks, to share all the important information they have with their local FBI Cyber Squad, such as “boundary logs showing communication to and from foreign IP addresses, Bitcoin wallet information, the decryptor file, and/or a benign sample of an encrypted file.”

The FBI also advised against ransomware payments, as there is no guarantee that the payment will prevent data leaks or future attacks.

For more information, read the original story in Bleeping Computer.

Featured Tech Jobs


Related articles

Abuse of valid accounts by threat actors hits a high, says IBM

Attackers are finding that obtaining valid credentials is an easier route to achieving their goals, s

Cyber Security Today, Feb. 21, 2024 – A patch warning from ConnectWise, the latest ransomware news, and more

This episode reports on a report comparing business email compromise attacks against ransomware

UK leads takedown of LockBit ransomware gang’s website

The LockBit ransomware gang’s website has been seized, several news agencies reported late Monday. The Reuters news agency and The Register are carrying stories based on a new splash screen that has appeared on the gang’s website. It says, “This site is now under the control of the National Crime Agency of the UK, working

Cyber Security Today, Feb. 19, 2024 – Fake police data breach notification fools Maine’s AG site

This episode reports a recent fake data breach report and two real ones, a man pleads guilty to being involved in malware distribution

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways