{"id":20741,"date":"2022-12-08T09:10:21","date_gmt":"2022-12-08T17:10:21","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/12\/08\/news-14474\/"},"modified":"2022-12-08T09:10:21","modified_gmt":"2022-12-08T17:10:21","slug":"news-14474","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/12\/08\/news-14474\/","title":{"rendered":"CISA and the FBI issue alert about Cuba ransomware"},"content":{"rendered":"<p>In the latest #StopRansomware effort of publicizing ransomware information for network defenders, the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have issued&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/alerts\/aa22-335a\" target=\"_blank\">a joint Cybersecurity Advisory (CSA)<\/a>&nbsp;on the ransomware known as &#8220;Cuba.&#8221; Though named &#8220;Cuba,&#8221; the ransomware and its operators have no known link to the country.&nbsp;The recent advisory is&nbsp;reportedly&nbsp;an update from&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.ic3.gov\/Media\/News\/2021\/211203-2.pdf\" target=\"_blank\">an FBI Flash notice on December 2021<\/a>. As such, updated tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) are included in this advisory.<\/p>\n<p>Since the aforementioned FBI Flash notice, CISA and the FBI have noted that US-based organizations victimized by Cuba ransomware have doubled. Third-party and open-source reports have also discovered a possible connection between Cuba ransomware actors,&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/11\/romcom-trojan-now-targets-english-speaking-countries\">RomCom RAT (remote access Trojan)<\/a>&nbsp;actors, and&nbsp;<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/industrial-spy-data-extortion-market-gets-into-the-ransomware-game\/\" target=\"_blank\" rel=\"noreferrer noopener\">Industrial Spy ransomware<\/a>&nbsp;actors.&nbsp;<\/p>\n<h2>Cuba ransomware 101<\/h2>\n<p>Despite its name, threat actors behind Cuba ransomware haven&#8217;t indicated a connection or affiliation with the Republic of Cuba.<\/p>\n<p>Cuba ransomware is a Windows malware written in C++ that surfaced&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/unit42.paloaltonetworks.com\/cuba-ransomware-tropical-scorpius\/\" target=\"_blank\">in late 2019<\/a>. Like other ransomware groups, its threat actors use double extortion tactics,&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/fbi-cuba-ransomware-raked-in-60-million-from-over-100-victims\/\" target=\"_blank\">predominantly<\/a>&nbsp;targeting organizations in the US in five critical infrastructure sectors: critical manufacturing, financial services, government facilities, healthcare and public health, and information technology. All stolen sensitive information is posted to their leak site, accessible only via Tor, the online tool that allows for anonymous browsing and internet connections.<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/12\/easset_upload_file47118_250528_e.png\" alt=\"\" width=\"725\" height=\"424\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/>Overview of Cuba ransomware&rsquo;s leak page, ransom note, and a trove of encrypted files.<br \/>(Source: Malwarebytes Threat Intelligence Team)<\/p>\n<p>This ransomware arrives on target networks via spam campaigns, meaning emails are sent out to organizations with no particular target. In more recent campaigns, the Cuba ransomware&nbsp;has been seen being dropped by the malware downloader&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2018\/03\/hancitor-fileless-attack-with-a-copy-trick\">Hancitor<\/a>&nbsp;(also known as Chancitor).<\/p>\n<p>The spam email contains a download link where a Word document with malicious macros can be downloaded and opened. If users enable the macro when prompted, this document extracts and executes Hancitor. This malware then communicates with its command-and-control (C2) server to download several tools, facilitate lateral movement, and extract data.<\/p>\n<p>It then drops and installs Cuba ransomware using PowerShell or PsExec.<\/p>\n<p>Cuba ransomware&nbsp;has already been involved in several noteworthy attacks. In&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/us-cities-disclose-data-breaches-after-vendors-ransomware-attack\/\" target=\"_blank\">February 2021<\/a>, it hit the widely used payment processor Automatic Funds Transfer Services (AFTS), affecting cities and agencies in Washington and California. In October 2022, Cuba ransomware threat actors impersonated the press office of the General Staff of the Armed Forces of Ukraine in a phishing campaign.&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/profero.io\/posts\/cubaransomware\/\" target=\"_blank\">According to Profero<\/a>, a company specializing in rapid incident response involved in negotiations between Cuba ransomware victims and attackers, the threat actors speak Russian.<\/p>\n<h2>Mitigating Cuba ransomware attacks<\/h2>\n<p>CISA and the FBI issued mitigations for network defenders to follow to reduce attack risks from Cuba ransomware. Some of these are as follows:<\/p>\n<ul>\n<li>Create and implement a recovery plan (if you don&rsquo;t have one yet) to maintain and retain copies of pertinent and proprietary data.<\/li>\n<li>All accounts that use passwords must at least comply with&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/pages.nist.gov\/800-63-3\/\" target=\"_blank\">National Institute for Standards and Technology (NIST) standards<\/a>.<\/li>\n<li>Enable&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/glossary\/multi-factor-authentication-mfa\">multi-factor authentication (MFA)<\/a>&nbsp;on all accounts, especially those that access critical systems.<\/li>\n<li>Ensure all software you use are updated to their latest versions and fully patched.<\/li>\n<li>Audit accounts, paying particular attention to those with administrator privileges, and configure control accordingly.<\/li>\n<\/ul>\n<p>You can read the complete and detailed list of recommended mitigations on&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/alerts\/aa22-335a\" target=\"_blank\">this page<\/a>. Various IOCs (associated files, email addresses, a Jabber address, IP addresses, Bitcoin wallets, and ransom notes) and MITRE ATT&amp;CK techniques are also found on that page.<\/p>\n<hr \/>\n<p><strong>We don&#8217;t just report on threats&mdash;we remove them<\/strong><\/p>\n<p>Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by <a href=\"https:\/\/www.malwarebytes.com\/for-home\">downloading&nbsp;Malwarebytes today<\/a>.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/12\/cisa-and-fbi-issue-alert-about-cuba-ransomware\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<table cellpadding=\"10\">\n<tr>\n<td valign=\"top\" align=\"left\">\n<p>Categories: <a href=\"https:\/\/www.malwarebytes.com\/blog\/category\/news\" rel=\"category tag\">News<\/a><\/p>\n<p>Categories: <a href=\"https:\/\/www.malwarebytes.com\/blog\/category\/ransomware\" rel=\"category tag\">Ransomware<\/a><\/p>\n<p>Tags: Cuba ransomware<\/p>\n<p>Tags:  ransomware<\/p>\n<p>Tags:  double extortion<\/p>\n<p>Tags:  Cybersecurity Advisory<\/p>\n<p>Tags:  CSA<\/p>\n<p>Tags:  CISA<\/p>\n<p>Tags:  FBI<\/p>\n<p>Cuba ransomware is spotlighted in a recent cybersecurity advisory (CSA) in the ongoing #StopRansomware campaign spearheaded by CISA and the FBI.<\/p>\n<table width=\"100%\">\n<tr>\n<td align=\"right\">\n<p><b>(<a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/12\/cisa-and-fbi-issue-alert-about-cuba-ransomware\" title=\"CISA and the FBI issue alert about Cuba ransomware\">Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/12\/cisa-and-fbi-issue-alert-about-cuba-ransomware\">CISA and the FBI issue alert about Cuba ransomware<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[23583,25132,28045,25133,28046,6627,32,3765],"class_list":["post-20741","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-cisa","tag-csa","tag-cuba-ransomware","tag-cybersecurity-advisory","tag-double-extortion","tag-fbi","tag-news","tag-ransomware"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/20741","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=20741"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/20741\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=20741"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=20741"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=20741"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}