The Federal Bureau of Investigation (FBI) has issued a warning over Cuba ransomware attacks targeting critical infrastructure.
As of November 2021, the gang behind Cuba ransomware managed to compromise at least 49 entities in the government, healthcare, financial, information technology, and manufacturing sectors.
To help organizations better defend against this threat, the FBI has released indicators of compromise (IoCs) associated with Cuba ransomware, along with details on the tactics, techniques and procedures (TTPs) employed by the gang, and a series of recommended mitigations.
Distributed through Hancitor, the Cuba file-encrypting ransomware first emerged in late 2019 and is known for appending the “.cuba” extension to the encrypted files.
To date, the cybercriminals behind this operation have demanded at least $74 million in ransom, and might have received over $43.9 million in payments from their victims, the FBI says.
Hancitor operators gain access to victim networks using phishing emails, unpatched vulnerabilities in Microsoft Exchange servers, compromised credentials, and Remote Desktop Protocol (RDP) tools, after which they drop various malware, including ransomware, for further compromise.
Once they have access to a network, the Cuba ransomware gang employs legitimate tools – such as PowerShell, PsExec, and others — and Windows admin privileges to run their malware. A Cobalt Strike beacon is also typically installed on the compromised machines.
After the ransomware is installed, two other files are dropped to steal passwords and gain the ability to write a temporary (TMP) file to the system. The file contains API calls for memory injection.
Leveraging stolen credentials, the Cuba ransomware threat actors log into the compromised network using a specific user account.
To reduce the risk of compromise from this ransomware family, organizations are advised to employ strong and unique passwords, use two-factor authentication, keep all software updated, block unnecessary access to administrative shares, implement network segmentation, scan the network for abnormal activity, and to employ protection solutions such as firewalls and anti-malware software.
Related: ‘Sabbath’ Ransomware Operators Target Critical Infrastructure
Related: Babuk Ransomware Seen Exploiting ProxyShell Vulnerabilities
Related: FBI Warns Ransomware Attack Could Disrupt Food Supply Chain

More from Ionut Arghire
- Ransomware Gang Publishes Data Allegedly Stolen From Maritime Firm Royal Dirkzwager
- Zoom Paid Out $3.9 Million in Bug Bounties in 2022
- Malicious NuGet Packages Used to Target .NET Developers
- Google Pixel Vulnerability Allows Recovery of Cropped Screenshots
- Millions Stolen in Hack at Cryptocurrency ATM Manufacturer General Bytes
- NBA Notifying Individuals of Data Breach at Mailing Services Provider
- Adobe Acrobat Sign Abused to Distribute Malware
- Latitude Financial Services Data Breach Impacts 300,000 Customers
Latest News
- Verosint Launches Account Fraud Detection and Prevention Platform
- Ransomware Gang Publishes Data Allegedly Stolen From Maritime Firm Royal Dirkzwager
- Zoom Paid Out $3.9 Million in Bug Bounties in 2022
- Oleria Scores $8M Seed Funding for ID Authentication Technology
- Exploitation of 55 Zero-Day Vulnerabilities Came to Light in 2022: Mandiant
- News Analysis: UK Commits $3 Billion to Support National Quantum Strategy
- Malicious NuGet Packages Used to Target .NET Developers
- Google Pixel Vulnerability Allows Recovery of Cropped Screenshots
