Security News > 2022 > February > Microsoft Exchange Bugs Exploited by ‘Cuba’ Ransomware Gang

The ransomware gang known as "Cuba" is increasingly shifting to exploiting Microsoft Exchange vulnerabilities - including ProxyShell and ProxyLogon - as initial infection vectors, researchers have found.
At the time, the FBI noted that the Cuba ransomware is distributed using a first-stage implant that acts as a loader for follow-on payloads: the Hancitor malware, which has been around for at least five years.
This isn't the first time that Cuba has shown a taste for Exchange vulnerabilities, either.
The researchers noted that when COLDDRAW was deployed, Cuba used what they called "a multi-faceted extortion model" - i.e., besides encrypting data, the gang leaked it on the group's shaming site, which is depicted below in all its cigar-chomping glory.
The majority - 80 percent - of organizations victimized by Cuba are based in North America, but Cuba loves the United States more than anywhere.
With regards to the victims listed on its shaming site - which the gang has had up since only early 2021 - Cuba provides a victim list for free, but it also keeps a separate list that you have to pay to see.
News URL
https://threatpost.com/microsoft-exchange-exploited-cuba-ransomware/178665/
Related news
- Microsoft's End of Support for Exchange 2016 and 2019: What IT Teams Must Do Now (source)
- Microsoft Teams tactics, malware connect Black Basta, Cactus ransomware (source)
- US seizes domain of Garantex crypto exchange used by ransomware gangs (source)
- International cops seize ransomware crooks' favorite Russian crypto exchange (source)
- Microsoft: North Korean hackers join Qilin ransomware gang (source)
- Microsoft Exchange Online outage affects Outlook web users (source)
- Microsoft: Exchange Online bug mistakenly quarantines user emails (source)
- Microsoft: Windows CLFS zero-day exploited by ransomware gang (source)
- Microsoft investigates global Exchange Admin Center outage (source)
- Microsoft: Windows CLFS Vulnerability Could Lead to ‘Widespread Deployment and Detonation of Ransomware’ (source)