{"id":117889,"date":"2021-04-06T10:00:47","date_gmt":"2021-04-06T17:00:47","guid":{"rendered":"\/blogs\/?p=117889"},"modified":"2025-03-31T19:52:37","modified_gmt":"2025-04-01T02:52:37","slug":"mcafee-atr-threat-report-a-quick-primer-on-cuba-ransomware","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-atr-threat-report-a-quick-primer-on-cuba-ransomware\/","title":{"rendered":"McAfee ATR Threat Report: A Quick Primer on Cuba Ransomware"},"content":{"rendered":"<h2 aria-level=\"2\"><span data-contrast=\"none\">Executive Summary<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Cuba ransomware is an older ransomware<\/span><span data-contrast=\"auto\">, that has recently undergone some development.\u00a0<\/span><span data-contrast=\"auto\">The actors<\/span><span data-contrast=\"auto\">\u00a0have incorporated the\u00a0<\/span><span data-contrast=\"auto\">leak<\/span><span data-contrast=\"auto\">ing<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">of victim\u00a0<\/span><span data-contrast=\"auto\">data to increase\u00a0<\/span><span data-contrast=\"auto\">its<\/span><span data-contrast=\"auto\">\u00a0impact and revenue<\/span><span data-contrast=\"auto\">, much like we have seen recently with<\/span><span data-contrast=\"auto\">\u00a0other major ransomware campaigns.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">In our analysis, we observed that the attackers had access to the network before the infection and were able to collect specific information in order to orchestrate the attack and have the greatest impact. The attackers operate using a set of PowerShell scripts\u00a0<\/span><span data-contrast=\"auto\">that enables them<\/span><span data-contrast=\"auto\">\u00a0to move laterally. The ransom note mentions that the data was exfiltrated before\u00a0<\/span><span data-contrast=\"auto\">it was<\/span><span data-contrast=\"auto\">\u00a0encrypt<\/span><span data-contrast=\"auto\">ed<\/span><span data-contrast=\"auto\">. In similar attack<\/span><span data-contrast=\"auto\">s<\/span><span data-contrast=\"auto\">\u00a0we\u00a0<\/span><span data-contrast=\"auto\">have\u00a0<\/span><span data-contrast=\"auto\">observed the use of\u00a0<\/span><span data-contrast=\"auto\">a\u00a0<\/span><span data-contrast=\"auto\">Cobalt Strike payload<\/span><span data-contrast=\"auto\">,<\/span><span data-contrast=\"auto\">\u00a0although we\u00a0<\/span><span data-contrast=\"auto\">have<\/span><span data-contrast=\"auto\">\u00a0not\u00a0<\/span><span data-contrast=\"auto\">found<\/span><span data-contrast=\"auto\">\u00a0clear evidence<\/span><span data-contrast=\"auto\">\u00a0of\u00a0<\/span><span data-contrast=\"auto\">a<\/span><span data-contrast=\"auto\">\u00a0relation<\/span><span data-contrast=\"auto\">ship<\/span><span data-contrast=\"auto\">\u00a0with Cuba\u00a0<\/span><span data-contrast=\"auto\">r<\/span><span data-contrast=\"auto\">ansomware.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">We observed Cuba ransomware targeting financial institutions, industry, technology\u00a0<\/span><span data-contrast=\"auto\">and<\/span><span data-contrast=\"auto\">\u00a0logistics organizations.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The following picture shows an overview of the\u00a0<\/span><span data-contrast=\"auto\">countr<\/span><span data-contrast=\"auto\">ies<\/span><span data-contrast=\"auto\">\u00a0that have been impacted according to our telemetry.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><span data-contrast=\"none\">Coverage and Protection Advice<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"none\">Defenders should be on the lookout for traces and behaviours that correlate to\u00a0<\/span><span data-contrast=\"none\">open source<\/span><span data-contrast=\"none\">\u00a0pen test tools such as\u00a0<\/span><span data-contrast=\"none\">winPEAS<\/span><span data-contrast=\"none\">,\u00a0<\/span><span data-contrast=\"none\">Lazagne<\/span><span data-contrast=\"none\">, Bloodhound and Sharp Hound, or hacking frameworks like Cobalt Strike, Metasploit, Empire or Covenant, as well as abnormal\u00a0<\/span><span data-contrast=\"none\">behavior<\/span><span data-contrast=\"none\">\u00a0of non-malicious tools that have a dual use. These seemingly legitimate tools (e.g.,\u00a0<\/span><span data-contrast=\"none\">ADfind<\/span><span data-contrast=\"none\">,\u00a0<\/span><span data-contrast=\"none\">PSExec<\/span><span data-contrast=\"none\">, PowerShell, etc.) can be used for things like enumeration and execution. Subsequently, be on the lookout for abnormal usage of Windows Management Instrumentation WMIC (T1047). We advise everyone to check out the following blogs on evidence indicators for a targeted ransomware attack (<\/span><a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/csi-evidence-indicators-for-targeted-ransomware-attacks\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">Part1<\/span><\/a><span data-contrast=\"none\">,\u00a0<\/span><a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/csi-evidence-indicators-for-targeted-ransomware-attacks-part-ii\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">Part2<\/span><\/a><span data-contrast=\"none\">).\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Looking at other similar Ransomware-as-a-Service families we have seen that certain entry vectors are quite common among ransomware criminals:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\u00b7\" data-font=\"Symbol\" data-listid=\"2\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">E-mail\u00a0<\/span><span data-contrast=\"none\">Spear<\/span><span data-contrast=\"none\">\u00a0<\/span><span data-contrast=\"none\">phishing<\/span><span data-contrast=\"none\">\u00a0(T1566.001) often used to directly engage and\/or gain an initial foothold. The initial phishing email can also be linked to a different malware strain, which acts as a loader and entry point for the attackers to continue completely compromising a victim\u2019s network. We have observed this in the past with the likes of\u00a0<\/span><span data-contrast=\"none\">Trickbot<\/span><span data-contrast=\"none\">\u00a0&amp; Ryuk or\u00a0<\/span><span data-contrast=\"none\">Qakbot<\/span><span data-contrast=\"none\">\u00a0&amp;\u00a0<\/span><span data-contrast=\"none\">Prolock<\/span><span data-contrast=\"none\">, etc.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\u00b7\" data-font=\"Symbol\" data-listid=\"2\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"none\">Exploit Public-Facing Application (T1190) is another common entry vector, given cyber criminals are often avid consumers of security news and are always on the lookout for a good exploit. We therefore encourage organizations to be fast and diligent when it comes to applying patches. There are numerous examples in the past where vulnerabilities concerning remote access software, webservers, network edge equipment and firewalls have been used as an entry point.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\u00b7\" data-font=\"Symbol\" data-listid=\"2\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"none\">Using valid accounts (T1078) is and has been a proven method for cybercriminals to gain a foothold. After all, why break the door down if you already have the keys? Weakly protected RDP access is a prime example of this entry method. For the best tips on RDP security, please see\u00a0<\/span><span data-contrast=\"none\">our<\/span><span data-contrast=\"none\">\u00a0<\/span><a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rdp-security-explained\/\"><span data-contrast=\"none\">blog<\/span><\/a><span data-contrast=\"none\">\u00a0explaining RDP security.\u00a0<\/span><\/li>\n<li data-leveltext=\"\u00b7\" data-font=\"Symbol\" data-listid=\"2\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"none\">Valid accounts can also be obtained via commodity malware such as\u00a0<\/span><span data-contrast=\"none\">infostealers<\/span><span data-contrast=\"none\">\u00a0that are designed to steal credentials from a victim\u2019s computer.\u00a0<\/span><span data-contrast=\"none\">Infostealer<\/span><span data-contrast=\"none\">\u00a0logs containing thousands of credentials can be purchased by ransomware criminals to search for VPN and corporate logins. For organizations, having a robust credential management and MFA on user accounts is an absolute must have.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"none\">When it comes to the actual\u00a0<\/span><span data-contrast=\"none\">r<\/span><span data-contrast=\"none\">ansomware<\/span><span data-contrast=\"none\">\u00a0binary, we strongly advise updating and upgrading\u00a0<\/span><span data-contrast=\"none\">endpoint protection, as well as enabling options like tamper protection and Rollback. Please read\u00a0<\/span><span data-contrast=\"none\">our<\/span><span data-contrast=\"none\">\u00a0<\/span><a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ens-10-7-rolls-back-the-curtain-on-ransomware\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">blog<\/span><\/a><span data-contrast=\"none\">\u00a0on how to best configure ENS 10.7 to protect against ransomware for more details.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span class=\"TextRun SCXW55789458 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW55789458 BCX0\">For active protection, more details can be found on our website<\/span><\/span><span class=\"TextRun SCXW55789458 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW55789458 BCX0\">\u00a0&#8211;\u00a0<\/span><\/span><span class=\"TextRun SCXW55789458 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW55789458 BCX0\">\u00a0<\/span><\/span><a class=\"Hyperlink SCXW55789458 BCX0\" href=\"https:\/\/www.mcafee.com\/enterprise\/en-us\/threat-center\/threat-landscape-dashboard\/ransomware-details.cuba-ransomware.html\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"TextRun Underlined SCXW55789458 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW55789458 BCX0\" data-ccp-charstyle=\"Hyperlink\">https:\/\/www.mcafee.com\/enterprise\/en-us\/threat-center\/threat-landscape-dashboard\/ransomware-details.cuba-ransomware.html<\/span><\/span><\/a><span class=\"TextRun SCXW55789458 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW55789458 BCX0\">\u00a0<\/span><\/span><span class=\"TextRun SCXW55789458 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW55789458 BCX0\">&#8211; and in our\u00a0<\/span><\/span><span class=\"TextRun SCXW55789458 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW55789458 BCX0\">detailed\u00a0<\/span><\/span><a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-defenders-blog-cuba-ransomware-campaign\"><span class=\"TextRun Highlight SCXW55789458 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW55789458 BCX0\">Defender\u00a0<\/span><\/span><span class=\"TextRun Highlight SCXW55789458 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW55789458 BCX0\">blog<\/span><\/span><\/a><span class=\"TextRun SCXW55789458 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW55789458 BCX0\">.<\/span><\/span><span class=\"EOP SCXW55789458 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"2\"><span data-contrast=\"none\">Summary of the Threat<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">Cuba ransomware\u00a0<\/span><span data-contrast=\"none\">is<\/span><span data-contrast=\"none\">\u00a0currently hitting several companies in<\/span><span data-contrast=\"none\">\u00a0north and south\u00a0<\/span><span data-contrast=\"none\">A<\/span><span data-contrast=\"none\">merica<\/span><span data-contrast=\"none\">,<\/span><span data-contrast=\"none\">\u00a0as well as in Europe.\u00a0<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"none\">The attackers use<\/span><span data-contrast=\"none\">\u00a0a set of obfuscated PowerShell scripts to move laterally and deploy their attack.\u00a0<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"none\">The website to leak the stolen data has been put online recently.\u00a0<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"none\">The malware is obfuscated and comes with several evasion techniques.\u00a0<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"none\">The actors\u00a0<\/span><span data-contrast=\"none\">have\u00a0<\/span><span data-contrast=\"none\">sold some of the stolen\u00a0<\/span><span data-contrast=\"none\">data<\/span><span data-contrast=\"none\">.\u00a0<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"none\">The ransomware uses multiple argument options and has the possibility to discover shared resources using the\u00a0<\/span><span data-contrast=\"none\">NetShareEnum<\/span><span data-contrast=\"none\">\u00a0API.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">Learn more about\u00a0<\/span><span data-contrast=\"auto\">Cuba ransomware<\/span><span data-contrast=\"auto\">, Yara Rules, Indicators of Compromise &amp; Mitre ATT&amp;CK techniques used by reading our\u00a0<\/span><span data-contrast=\"auto\">detailed\u00a0<\/span><span data-contrast=\"auto\"><a href=\"https:\/\/www.mcafee.com\/enterprise\/en-us\/assets\/reports\/rp-cuba-ransomware.pdf\">technical analysis<\/a>.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Executive Summary\u00a0 Cuba ransomware is an older ransomware, that has recently undergone some development.\u00a0The actors\u00a0have incorporated the\u00a0leaking\u00a0of victim\u00a0data to increase\u00a0its\u00a0impact&#8230;<\/p>\n","protected":false},"author":839,"featured_media":117895,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[],"coauthors":[4688,6297,5540],"class_list":["post-117889","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>McAfee ATR Threat Report: A Quick Primer on Cuba Ransomware | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Executive Summary\u00a0 Cuba ransomware is an older ransomware, that has recently undergone some development.\u00a0The actors\u00a0have incorporated the\u00a0leaking\u00a0of\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"McAfee ATR Threat Report: A Quick Primer on Cuba Ransomware | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Executive Summary\u00a0 Cuba ransomware is an older ransomware, that has recently undergone some development.\u00a0The actors\u00a0have incorporated the\u00a0leaking\u00a0of\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-atr-threat-report-a-quick-primer-on-cuba-ransomware\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-06T17:00:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-01T02:52:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/03\/GoziBanker_TW-e1615823848762.png\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"281\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Thomas Roccia, Thibault Seret, Alexandre Mundo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@fr0gger_\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Thomas Roccia, Thibault Seret, Alexandre Mundo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-atr-threat-report-a-quick-primer-on-cuba-ransomware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-atr-threat-report-a-quick-primer-on-cuba-ransomware\/\"},\"author\":{\"name\":\"Thomas Roccia\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/84a85fe82c49f836915869700f5168e7\"},\"headline\":\"McAfee ATR Threat Report: A Quick Primer on Cuba Ransomware\",\"datePublished\":\"2021-04-06T17:00:47+00:00\",\"dateModified\":\"2025-04-01T02:52:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-atr-threat-report-a-quick-primer-on-cuba-ransomware\/\"},\"wordCount\":732,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-atr-threat-report-a-quick-primer-on-cuba-ransomware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/03\/GoziBanker_TW-e1615823848762.png\",\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-atr-threat-report-a-quick-primer-on-cuba-ransomware\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-atr-threat-report-a-quick-primer-on-cuba-ransomware\/\",\"name\":\"McAfee ATR Threat Report: A Quick Primer on Cuba Ransomware | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-atr-threat-report-a-quick-primer-on-cuba-ransomware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-atr-threat-report-a-quick-primer-on-cuba-ransomware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/03\/GoziBanker_TW-e1615823848762.png\",\"datePublished\":\"2021-04-06T17:00:47+00:00\",\"dateModified\":\"2025-04-01T02:52:37+00:00\",\"description\":\"Executive Summary\u00a0 Cuba ransomware is an older ransomware, that has recently undergone some development.\u00a0The actors\u00a0have incorporated the\u00a0leaking\u00a0of\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-atr-threat-report-a-quick-primer-on-cuba-ransomware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-atr-threat-report-a-quick-primer-on-cuba-ransomware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-atr-threat-report-a-quick-primer-on-cuba-ransomware\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/03\/GoziBanker_TW-e1615823848762.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/03\/GoziBanker_TW-e1615823848762.png\",\"width\":500,\"height\":281},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-atr-threat-report-a-quick-primer-on-cuba-ransomware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"McAfee ATR Threat Report: A Quick Primer on Cuba Ransomware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/84a85fe82c49f836915869700f5168e7\",\"name\":\"Thomas Roccia\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/219099eb1ee40018f72bf1e381c6bd75\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/08\/2-1-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/08\/2-1-96x96.png\",\"caption\":\"Thomas Roccia\"},\"description\":\"Thomas Roccia is senior security researcher on the Advanced Threat Research team. He works on threat intelligence, tracking cybercrime campaigns and collaborating with law enforcement agencies. In a previous role, Thomas worked on the McAfee Foundstone team, performing worldwide incident response, malware hunting, and penetration testing. He has helped customers during major outbreaks and managed highly critical situations. Thomas has developed workshops, training courses, presentations, he leads the Unprotect Project, an open-source database dedicated to malware evasion techniques. His work in security research includes threat intelligence, malware, reverse engineering, vulnerabilities as well as innovation and patenting. He speaks regularly at security conferences.\",\"sameAs\":[\"http:\/\/troccia.tdgt.org\",\"https:\/\/www.linkedin.com\/in\/thomas-roccia\/\",\"https:\/\/x.com\/fr0gger_\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/thomas-roccia\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"McAfee ATR Threat Report: A Quick Primer on Cuba Ransomware | McAfee Blog","description":"Executive Summary\u00a0 Cuba ransomware is an older ransomware, that has recently undergone some development.\u00a0The actors\u00a0have incorporated the\u00a0leaking\u00a0of","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"McAfee ATR Threat Report: A Quick Primer on Cuba Ransomware | McAfee Blog","og_description":"Executive Summary\u00a0 Cuba ransomware is an older ransomware, that has recently undergone some development.\u00a0The actors\u00a0have incorporated the\u00a0leaking\u00a0of","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-atr-threat-report-a-quick-primer-on-cuba-ransomware\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2021-04-06T17:00:47+00:00","article_modified_time":"2025-04-01T02:52:37+00:00","og_image":[{"width":500,"height":281,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/03\/GoziBanker_TW-e1615823848762.png","type":"image\/png"}],"author":"Thomas Roccia, Thibault Seret, Alexandre Mundo","twitter_card":"summary_large_image","twitter_creator":"@fr0gger_","twitter_site":"@McAfee","twitter_misc":{"Written by":"Thomas Roccia, Thibault Seret, Alexandre Mundo","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-atr-threat-report-a-quick-primer-on-cuba-ransomware\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-atr-threat-report-a-quick-primer-on-cuba-ransomware\/"},"author":{"name":"Thomas Roccia","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/84a85fe82c49f836915869700f5168e7"},"headline":"McAfee ATR Threat Report: A Quick Primer on Cuba Ransomware","datePublished":"2021-04-06T17:00:47+00:00","dateModified":"2025-04-01T02:52:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-atr-threat-report-a-quick-primer-on-cuba-ransomware\/"},"wordCount":732,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-atr-threat-report-a-quick-primer-on-cuba-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/03\/GoziBanker_TW-e1615823848762.png","articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-atr-threat-report-a-quick-primer-on-cuba-ransomware\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-atr-threat-report-a-quick-primer-on-cuba-ransomware\/","name":"McAfee ATR Threat Report: A Quick Primer on Cuba Ransomware | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-atr-threat-report-a-quick-primer-on-cuba-ransomware\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-atr-threat-report-a-quick-primer-on-cuba-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/03\/GoziBanker_TW-e1615823848762.png","datePublished":"2021-04-06T17:00:47+00:00","dateModified":"2025-04-01T02:52:37+00:00","description":"Executive Summary\u00a0 Cuba ransomware is an older ransomware, that has recently undergone some development.\u00a0The actors\u00a0have incorporated the\u00a0leaking\u00a0of","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-atr-threat-report-a-quick-primer-on-cuba-ransomware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-atr-threat-report-a-quick-primer-on-cuba-ransomware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-atr-threat-report-a-quick-primer-on-cuba-ransomware\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/03\/GoziBanker_TW-e1615823848762.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/03\/GoziBanker_TW-e1615823848762.png","width":500,"height":281},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-atr-threat-report-a-quick-primer-on-cuba-ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"McAfee ATR Threat Report: A Quick Primer on Cuba Ransomware"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/84a85fe82c49f836915869700f5168e7","name":"Thomas Roccia","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/219099eb1ee40018f72bf1e381c6bd75","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/08\/2-1-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/08\/2-1-96x96.png","caption":"Thomas Roccia"},"description":"Thomas Roccia is senior security researcher on the Advanced Threat Research team. He works on threat intelligence, tracking cybercrime campaigns and collaborating with law enforcement agencies. In a previous role, Thomas worked on the McAfee Foundstone team, performing worldwide incident response, malware hunting, and penetration testing. He has helped customers during major outbreaks and managed highly critical situations. Thomas has developed workshops, training courses, presentations, he leads the Unprotect Project, an open-source database dedicated to malware evasion techniques. His work in security research includes threat intelligence, malware, reverse engineering, vulnerabilities as well as innovation and patenting. He speaks regularly at security conferences.","sameAs":["http:\/\/troccia.tdgt.org","https:\/\/www.linkedin.com\/in\/thomas-roccia\/","https:\/\/x.com\/fr0gger_"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/thomas-roccia\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/117889","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/839"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=117889"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/117889\/revisions"}],"predecessor-version":[{"id":211764,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/117889\/revisions\/211764"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/117895"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=117889"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=117889"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=117889"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=117889"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}