FBI: Cuba ransomware breached 49 US critical infrastructure orgs
Researchers discover 14 new data-stealing web browser attacks
Microsoft Edge now bashes Google Chrome when you download it
Russian internet watchdog announces ban of six more VPN products
Malicious KMSPico installers steal your cryptocurrency wallets
Microsoft shares fix for broken Outlook search in Windows 11
Microsoft reverses Windows 11’s annoying default browser setting changes
This CompTIA cybersecurity training is only $9 in a Cyber Week deal
Qualys BrowserCheck
Junkware Removal Tool
How to remove the PBlock+ adware browser extension
Remove the Toksearches.xyz Search Redirect
Remove the Smashapps.net Search Redirect
Remove the Smashappsearch.com Search Redirect
Remove Security Tool and SecurityTool (Uninstall Guide)
How to remove Antivirus 2009 (Uninstall Instructions)
How to Remove WinFixer / Virtumonde / Msevents / Trojan.vundo
How to remove Google Redirects or the TDSS, TDL3, or Alureon rootkit using TDSSKiller
Locky Ransomware Information, Help Guide, and FAQ
CryptoLocker Ransomware Information Guide and FAQ
CryptorBit and HowDecrypt Information Guide and FAQ
CryptoDefense and How_Decrypt Ransomware Information Guide and FAQ
How to make the Start menu full screen in Windows 10
How to install the Microsoft Visual C++ 2015 Runtime
How to open an elevated PowerShell Admin prompt in Windows 10
How to Translate a Web Page in Google Chrome
How to start Windows in Safe Mode
How to remove a Trojan, Virus, Worm, or other Malware
How to show hidden files in Windows 7
How to see hidden files in Windows
IT Certification Courses
Gear + Gadgets
FBI: Cuba ransomware breached 49 US critical infrastructure orgs
The Federal Bureau of Investigation (FBI) has revealed that the Cuba ransomware gang has compromised the networks of at least 49 organizations from US critical infrastructure sectors.
“The FBI has identified, as of early November 2021 that Cuba ransomware actors have compromised at least 49 entities in five critical infrastructure sectors, including but not limited to the financial, government, healthcare, manufacturing, and information technology sectors,” the federal law enforcement agency said.
The FBI also added that this ransomware group had made over $40 million since it started targeting US companies.
“Cuba ransomware actors have demanded at least US $74 million and received at least US $43.9 million in ransom payments,” the FBI added.
This was disclosed in a flash alert issued in coordination with the Cybersecurity and Infrastructure Security Agency (CISA) and focused on sharing indicators of compromised linked with Cuba ransomware.
Cuba ransomware is delivered on victims’ networks through the Hancitor malware downloader, which allows the ransomware gang to gain easier access to previously compromised corporate networks.
Hancitor (Chancitor) is known for delivering information stealers, Remote Access Trojans (RATs), and other types of ransomware. 
Zscaler spotted it distributing the Vawtrak information-stealing trojan. Since then, it switched to password-stealers, including Pony and Ficker, and, more recently, Cobalt Strike.
For initial compromise of their victims’ systems, Hancitor uses phishing emails and stolen credentials, exploits Microsoft Exchange vulnerabilities, or break-in via Remote Desktop Protocol (RDP) tools.
Once in using the access provided by Hancitor, Cuba ransomware operators will use legitimate Windows services (e.g., PowerShell, PsExec, and various other unspecified services) to deploy their ransomware payloads remotely and encrypt files using the “.cuba” extension.
In the flash alert, the FBI also asked systems admins and security professionals who detect Cuba ransomware activity within their enterprise networks to share any related information they have with their local FBI Cyber Squad.
Useful information that can be shared to help identify the attackers behind this ransomware gang includes “boundary logs showing communication to and from foreign IP addresses, Bitcoin wallet information, the decryptor file, and/or a benign sample of an encrypted file.”
The FBI added that it does not encourage ransomware payments and advised targets against it since there’s no guarantee that paying will prevent data leaks or future attacks. 
This, instead, acts as a motivating for ransomware operations to target more victims and incentivizes other cybercrime groups to join them in conducting similar illegal activities.
However, the federal agency recognizes the damage ransomware attacks can inflict on a business since executives could be forced to consider paying the ransoms to protect shareholders, customers, or employees. The FBI strongly urges reporting such incidents to local FBI field offices.
US govt warns of increased ransomware risks during holidays
FBI: Ransomware targets companies during mergers and acquisitions
FBI: Ranzy Locker ransomware hit at least 30 US companies this year
FBI: Online shoppers risk losing over $53M to holiday scams
FBI warns of phishing targeting high-profile brands’ customers
Not a member yet? Register Now
Researchers discover 14 new data-stealing web browser attacks
Fake support agents call victims to install Android banking malware
To receive periodic updates and news from BleepingComputer, please use the form below.
Terms of Use Privacy PolicyEthics Statement
Copyright @ 2003 – 2021 Bleeping Computer® LLC – All Rights Reserved
Not a member yet? Register Now
Read our posting guidelinese to learn what content is prohibited.


You May Also Like

State-backed hackers increasingly use RTF injection for phishing

FBI seized $2.3M from affiliate of REvil, Gandcrab ransomware gangsEwDoor botnet targets…

Emotet now drops Cobalt Strike, fast forwards ransomware attacks

Emotet now drops Cobalt Strike, fast forwards ransomware attacksSonicWall ‘strongly urges’ customers…

Microsoft Exchange ProxyShell exploits used to deploy Babuk ransomware

Ukraine links members of Gamaredon hacker group to Russian FSBSamsung Galaxy S21…

Cloudflare is experiencing widespread latency and timeouts

Microsoft December 2021 Patch Tuesday fixes 6 zero-days, 67 flawsNew ransomware now…