• Home
    • What is
    • Computer security
      • Windows security
      • Mac security
      • Linux security
    • Mobile security
      • Android security
      • iOS Security
    • Data security
    • SCCM
    • Reviews
      • Case studies
    • Advertise
    • Contact
      • Privacy Policy
  • Subscribe now

    Loading
  • Home
  • What is
  • Computer security
    • Windows security
    • Mac security
    • Linux security
  • Mobile security
    • Android security
    • iOS Security
  • Data security
  • SCCM
  • Reviews
    • Case studies
  • Advertise
  • Contact
    • Privacy Policy
Home » Breaking Computer security Cyber Security Device security Latest Cybersecurity News

Cuba Ransomware hits 49 US organizations says the FBI

William Marshal Posted On December 6, 2021
0



Cuba Ransomware

The FBI has identified and disclosed that 49 US organizations have been compromised by Cuba Ransomware Gang. This was disclosed as part of the FBI flash report and has been mentioned that the Cuba ransomware actors have compromised these organizations as on November 2021, which includes almost all the industries in the market starting with government, healthcare, information technology, manufacturing, and federal bodies.

And as per the FBI, the ransomware actors have already made $40 million over such horrendous acts. The FBI together with CISA were able to share the details of these incidents and the numbers as a report.

How was Cuba ransomware distributed?

The ransomware operators have made use of the Hancitor malware downloader to distribute the Cuba ransomware to the organizations. Hancitor has been a popular means for distributing Remote Access Trojans (RATs), Stealers, and other ransomware.

Zscaler did identify that Hancitor was used in distribution of Vawtrak trojan, then later the same Hancitor had facilitated the deployment of Pony, Ficker, Cobalt Striker and other malware.

Hancitor initially uses the most common breaching technique ‘Phishing’, then steals the credentials of the targeted audience, exploits the MS vulnerabilities, and then breach via RDP tools for lateral distribution.

In the Cuba ransomware case the legitimate services from Windows were used for distribution and remote deployments. The encryption happens then with ‘.cuba’ extension.

FBI requests for assistance if Cuba ransomware is spotted

The FBI has requested for information from sysadmins and security professionals if they detect .cuba extension in their network. The boundary logs with communication involving the IP addresses, Bitcoin wallet info, and other details are requested for further investigation and narrowing down the ransomware actors.

Though the organizations are cornered to make ransom payments if they fall for Cuba, the FBI has advised not to do so as there is no guarantee that the threat actors will play a fair game here. Hence if organizations face such threats they are advised to reach out to the local FBI offices for assistance.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, Instagram, Twitter and Reddit. You can reach out to us via Twitter or Facebook, for any advertising requests.

Share the article with your friends


Cuba RansomwareCuba Ransomware attackCuba Ransomware GangCybersecuritydata securityRansomware attack


Author

William Marshal

William has been one of the key contributors to 'The Cybersecurity Times' with 9.5 years of experience in the cybersecurity journalism. Apart from writing, he also like hiking, skating and coding.

You may also like
Top 9 Best Log Management Tools for 2025
September 20, 2025
Top 4 Remote Support Tools for 2025- Best Remote Support Solution
September 18, 2025
Top 5 Best Unified Endpoint Management (UEM) Software for 2025
September 12, 2025
Leave A Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  • Subscribe to our newsletter

    Loading
  • Windows security

    • Top 9 Best Log Management Tools for 2025
      September 20, 2025
    • Top 4 Remote Support Tools for 2025- Best Remote Support...
      September 18, 2025
    • Top 5 Best Unified Endpoint Management (UEM) Software...
      September 12, 2025
    • Top 5 Threat Intelligence Tools For 2025
      July 25, 2025
    • Top 5 Best Microsoft Intune Alternatives to Consider...
      July 23, 2025


  • About us

    Our vision is to deliver the trending and happening cyber events to the enthusiasts.

    We believe in delivering educational and quality content for hassle-free understanding of the subject.

  • Subscribe to our newsletter

    Loading
  • Follow us

  • Advertise with us

    You can reach us via Facebook, Linkedin, or Twitter for advertising purposes.


© The Cybersecurity Times 2022. All rights reserved.
Press enter/return to begin your search