{"id":94986,"date":"2022-02-28T11:31:22","date_gmt":"2022-02-28T11:31:22","guid":{"rendered":"https:\/\/www.stellarinfo.com\/blog\/?p=94986"},"modified":"2023-07-20T07:00:06","modified_gmt":"2023-07-20T07:00:06","slug":"cuba-ransomware-targeting-vulnerable-exchange-servers","status":"publish","type":"post","link":"https:\/\/www.stellarinfo.com\/blog\/cuba-ransomware-targeting-vulnerable-exchange-servers\/","title":{"rendered":"Cuba Ransomware Targeting Vulnerable Exchange Servers- Patch Now"},"content":{"rendered":"<?xml encoding=\"utf-8\" ?><?xml encoding=\"utf-8\" ?><p>Microsoft Exchange Servers with flaws across the globe are hit by yet another ransomware termed <strong>Cuba ransomware<\/strong>. &nbsp;<\/p><p>The ransomware gang is exploiting the Exchange Server vulnerabilities, including <a href=\"https:\/\/www.stellarinfo.com\/blog\/recover-microsoft-exchange-server-after-hafnium-attack\/\">ProxyLogon<\/a> and <a href=\"https:\/\/www.stellarinfo.com\/blog\/patch-proxyshell-vulnerabilities-on-microsoft-exchange-servers\/\">ProxyShell<\/a>, to gain initial access to the organizations&rsquo; network and encrypt the connected devices for a ransom.<\/p><h2 class=\"wp-block-heading\" id=\"cuba-ransomware-history\">Cuba Ransomware History<\/h2><p>Cuba ransomware operation started in late 2019. Initially slow, ransomware picked up the pace in 2020 and 2021. <a href=\"https:\/\/www.ic3.gov\/Media\/News\/2021\/211203-2.pdf\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">FBI had issued an advisory<\/a> on Cuba ransomware back in December 2021 after 49 U.S. based organizations in at least five critical infrastructure sectors, such as IT, manufacturing, financial, government, and healthcare were compromised.<\/p><p>According to the FBI, the threat actors behind the attacks have demanded $74 million and received at least $43+ million in ransom payments from their victims.<\/p><p><a href=\"https:\/\/www.mandiant.com\/resources\/unc2596-cuba-ransomware\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Mandiant tracks<\/a> (a cyber-security firm) has codenamed the gang as <strong>UNC2596<\/strong>&mdash;known for leaking stolen data on the groups&rsquo; shaming websites (sites where threat actors publish or sell stolen data), and the Cuba ransomware as <strong>COLDDRAW<\/strong>.<\/p><p>The report by Mandiant tracks shows that the gang is primarily targeting critical organizations based in the United States and Canada, followed by Australia, Austria, Belgium, Columbia, Germany, India, Jordon, Poland, and the United Kingdom.<\/p><figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"669\" src=\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/02\/mandiant-report-cuba-ransomware-1024x669.jpg\" alt=\"mandiant tracks report cuba ransomware affected countries\" class=\"wp-image-94998 apply-gradient-on-post-images\" srcset=\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/02\/mandiant-report-cuba-ransomware-1024x669.jpg 1024w, https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/02\/mandiant-report-cuba-ransomware-300x196.jpg 300w, https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/02\/mandiant-report-cuba-ransomware-768x502.jpg 768w, https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/02\/mandiant-report-cuba-ransomware-230x150.jpg 230w, https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/02\/mandiant-report-cuba-ransomware-260x170.jpg 260w, https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/02\/mandiant-report-cuba-ransomware-380x248.jpg 380w, https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/02\/mandiant-report-cuba-ransomware-550x359.jpg 550w, https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/02\/mandiant-report-cuba-ransomware-800x523.jpg 800w, https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/02\/mandiant-report-cuba-ransomware-1160x758.jpg 1160w, https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/02\/mandiant-report-cuba-ransomware.jpg 1246w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Image Source &ndash; Mandiant <\/figcaption><\/figure><h2 class=\"wp-block-heading\" id=\"how-is-cuba-ransomware-gang-compromising-the-exchange-server?\">How is Cuba Ransomware Gang Compromising the Exchange Server?<\/h2><p>The Cuba ransomware is distributed via a loader called <a href=\"https:\/\/www.mandiant.com\/resources\/hancitor-aka-chanit\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Hancitor malware<\/a>&mdash;used for dropping and executing stealers, such as publically available NetSupport Remote Access Trojans or RATs, BUGHATCH, and create backdoors for persistent access and lateral movements in the targeted organizations&rsquo; network.<\/p><p>The gang uses phishing emails to target Exchange Servers flaws, compromised user credentials, or Remote Desktop Protocol (RDP) tools to gain initial access. After gaining the initial access, the ransomware installs the CobaltStrike beacon via PowerShell on the victim&rsquo;s network. Upon installation, the ransomware downloads <strong>pones.exe<\/strong> for password acquisition and <strong>krots.exe<\/strong> to enable Cuba ransomware to write to compromised systems&rsquo; temporary files (TMP).<\/p><p>Once the TMP file is uploaded, the <strong>korts.exe<\/strong> is deleted, and the TMP file, including the API calls related to memory injection executed on the compromised network. After TMP file execution, the file is deleted, and the compromised system starts communicating with the malware repository.<\/p><p><strong>Sample Cuba Note,<\/strong><\/p><pre class=\"wp-block-preformatted\">Good day. All your files are encrypted. For decryption, contact us.\nWrite here iracomp3@protonmail.com\nWe also inform you that we downloaded your databases, FTP server, and file server to our servers.\n* Do not rename encrypted files\n* Do not try to decrypt your data using third party software,\nit may cause permanent data loss.<\/pre><h2 class=\"wp-block-heading\" id=\"how-to-protect-exchange-servers-from-cuba-ransomware?\">How to Protect Exchange Servers from Cuba Ransomware?<\/h2><p>To protect Exchange Servers against Cuba and other ransomware or malicious attacks, follow these <a href=\"https:\/\/www.ic3.gov\/Media\/News\/2021\/211203-2.pdf\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">FBI recommendations<\/a>.<\/p><p>Besides, patch the server immediately with the latest Security and Cumulative Updates available for your Exchange Server version. &nbsp;<\/p><p>Follow these steps to check the server&rsquo;s health and identify vulnerabilities you need to patch.<\/p><h3 class=\"wp-block-heading\" id=\"h-step-1-run-healthchecker-script\">Step 1: Run HealthChecker Script<\/h3><p>Use HealthChecker.ps1 PowerShell script released by Microsoft to check the Exchange Server health. The script currently supports Microsoft Exchange Server 2013, 2016, and 2019.<\/p><p>The steps are as follows,<\/p><ul class=\"wp-block-list\">\n<li>Download the <a href=\"https:\/\/microsoft.github.io\/CSS-Exchange\/Diagnostics\/HealthChecker\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">HealthChecker.ps1<\/a> PowerShell script on your server or system connected to the domain.<\/li>\n\n\n\n<li>Launch Exchange Management Shell (EMS), PowerShell, or Command Prompt as administrator and use the cd command to navigate to the folder location where HealthChecker.ps1 script is downloaded. For instance,<\/li>\n<\/ul><pre class=\"wp-block-preformatted\"><strong>cd C:\\Users\\ProfileName\\Downloads\\<\/strong><\/pre><ul class=\"wp-block-list\">\n<li>Then execute the HealtHChecker script on your Exchange Server by running the following command in the EMS, PowerShell, or Command Prompt window.<\/li>\n<\/ul><pre class=\"wp-block-preformatted\"><strong>.\\HealthChecker.ps1<\/strong><\/pre><ul class=\"wp-block-list\">\n<li>To generate a detailed HTML report on the Exchange Server health status, run the following command.<\/li>\n<\/ul><pre class=\"wp-block-preformatted\"><strong>.\\HealthChecker.ps1 -BuildHtmlServersReport<\/strong><\/pre><p>If you receive a warning or error message while running the script, run the following command to bypass the execution policy and execute the HealthChecker.ps1 script.<\/p><pre class=\"wp-block-preformatted\"><strong>Set-ExecutionPolicy -Scope Process -ExecutionPolicy Bypass<\/strong><\/pre><p>The HTML report is generated and stored at the same location where the &lsquo;<strong>HealthChecker&rsquo;<\/strong> script is present. Open the HTML file in any browser to check the server health and patch the vulnerabilities, if any, by following the next step.<\/p><h3 class=\"wp-block-heading\" id=\"h-step-2-download-and-install-exchange-server-updates\">Step 2: Download and Install Exchange Server Updates<\/h3><p>If the HTML report detects health issues or vulnerabilities, use the links to download the updates and install them. Please note that the latest security updates are available only for the following Exchange Server CUs.<\/p><ul class=\"wp-block-list\">\n<li>Exchange Server 2013 CU23<\/li>\n\n\n\n<li>Exchange Server 2016 CU21 and <a href=\"https:\/\/www.stellarinfo.com\/blog\/install-security-update-on-exchange-server-2016-cu22\/\">CU22<\/a><\/li>\n\n\n\n<li>Exchange Server 2019 CU10 and CU11<\/li>\n<\/ul><p>Refer to our detailed guide to&nbsp;<a href=\"https:\/\/www.stellarinfo.com\/article\/install-exchange-cumulative-updates.php\" target=\"_blank\" rel=\"noreferrer noopener\">download and install Cumulative and Security updates on Exchange Server.<\/a><\/p><p>You can also follow our blog <a href=\"https:\/\/www.stellarinfo.com\/blog\/microsoft-exchange-remote-code-execution-vulnerability-flaws-and-fixes\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Exchange Remote Code Execution Vulnerability Flaws and Their Fixes<\/a> to stay updated about the newer Exchange Server threats, vulnerabilities, and updates.<\/p><h2 class=\"wp-block-heading\" id=\"conclusion\">Conclusion<\/h2><p>To stay protected from ransomware attacks, organizations need to strengthen their security parameters and, most importantly, update the server as soon as possible. Ransomware gangs, such <strong>as UNC2596,<\/strong> often target vulnerable Exchange Servers as they are easy to compromise and gain access to.<\/p><p>However, if the server has been compromised or the database has been damaged due to the malicious attack, it is recommended that you set up a new identical server and restore mailboxes to the new server from your backup. If a backup isn&rsquo;t available or obsolete, you can use <a href=\"https:\/\/www.stellarinfo.com\/edb-exchange-server-recovery.htm\">Exchange recovery software<\/a>, such as&nbsp;Stellar Repair for Exchange, to repair the damaged databases in your compromised server, recover mailboxes and export them directly to your new Live Exchange Server or Office 365.<\/p><hr class=\"wp-block-separator has-css-opacity\">\n","protected":false},"excerpt":{"rendered":"<p>Microsoft Exchange Servers with flaws across the globe are hit by yet&hellip; <a class=\"more-link\" href=\"https:\/\/www.stellarinfo.com\/blog\/cuba-ransomware-targeting-vulnerable-exchange-servers\/\">Continue reading <span class=\"screen-reader-text\">Cuba Ransomware Targeting Vulnerable Exchange Servers- Patch Now<\/span><\/a><\/p>\n","protected":false},"author":32,"featured_media":95218,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5298],"tags":[],"class_list":["post-94986","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ransomware","entry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cuba Ransomware Targeting Vulnerable Exchange Servers- Patch Now<\/title>\n<meta name=\"description\" content=\"Learn how to protect your Exchange Servers from Cuba ransomware targeting vulnerable unpatched Exchange Servers.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stellarinfo.com\/blog\/cuba-ransomware-targeting-vulnerable-exchange-servers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cuba Ransomware Targeting Vulnerable Exchange Servers- Patch Now\" \/>\n<meta property=\"og:description\" content=\"Learn how to protect your Exchange Servers from Cuba ransomware targeting vulnerable unpatched Exchange Servers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stellarinfo.com\/blog\/cuba-ransomware-targeting-vulnerable-exchange-servers\/\" \/>\n<meta property=\"og:site_name\" content=\"Stellar Data Recovery Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/facebook.com\/raavisingh\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-28T11:31:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-20T07:00:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/02\/Microsoft-Exchange-servers-hacked-to-deploy-Cuba-ransomware.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ravi Singh\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/ravi51ngh\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ravi Singh\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/cuba-ransomware-targeting-vulnerable-exchange-servers\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/cuba-ransomware-targeting-vulnerable-exchange-servers\/\"},\"author\":{\"name\":\"Ravi Singh\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/7dea10d15c0307370e21d7da07d0cd11\"},\"headline\":\"Cuba Ransomware Targeting Vulnerable Exchange Servers- Patch Now\",\"datePublished\":\"2022-02-28T11:31:22+00:00\",\"dateModified\":\"2023-07-20T07:00:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/cuba-ransomware-targeting-vulnerable-exchange-servers\/\"},\"wordCount\":838,\"image\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/cuba-ransomware-targeting-vulnerable-exchange-servers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/02\/Microsoft-Exchange-servers-hacked-to-deploy-Cuba-ransomware.jpg\",\"articleSection\":[\"Ransomware\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/cuba-ransomware-targeting-vulnerable-exchange-servers\/\",\"url\":\"https:\/\/www.stellarinfo.com\/blog\/cuba-ransomware-targeting-vulnerable-exchange-servers\/\",\"name\":\"Cuba Ransomware Targeting Vulnerable Exchange Servers- Patch Now\",\"isPartOf\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/cuba-ransomware-targeting-vulnerable-exchange-servers\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/cuba-ransomware-targeting-vulnerable-exchange-servers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/02\/Microsoft-Exchange-servers-hacked-to-deploy-Cuba-ransomware.jpg\",\"datePublished\":\"2022-02-28T11:31:22+00:00\",\"dateModified\":\"2023-07-20T07:00:06+00:00\",\"author\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/7dea10d15c0307370e21d7da07d0cd11\"},\"description\":\"Learn how to protect your Exchange Servers from Cuba ransomware targeting vulnerable unpatched Exchange Servers.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/cuba-ransomware-targeting-vulnerable-exchange-servers\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stellarinfo.com\/blog\/cuba-ransomware-targeting-vulnerable-exchange-servers\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/cuba-ransomware-targeting-vulnerable-exchange-servers\/#primaryimage\",\"url\":\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/02\/Microsoft-Exchange-servers-hacked-to-deploy-Cuba-ransomware.jpg\",\"contentUrl\":\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/02\/Microsoft-Exchange-servers-hacked-to-deploy-Cuba-ransomware.jpg\",\"width\":1000,\"height\":600,\"caption\":\"Cuba Ransomware Targeting Vulnerable Exchange Servers- Patch Now\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/cuba-ransomware-targeting-vulnerable-exchange-servers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stellarinfo.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cuba Ransomware Targeting Vulnerable Exchange Servers- Patch Now\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#website\",\"url\":\"https:\/\/www.stellarinfo.com\/blog\/\",\"name\":\"Stellar Data Recovery Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stellarinfo.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/7dea10d15c0307370e21d7da07d0cd11\",\"name\":\"Ravi Singh\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e95cad83fe279b559794f62193f34300d01db8f9f2ec45ce529b7ecde3796ba?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e95cad83fe279b559794f62193f34300d01db8f9f2ec45ce529b7ecde3796ba?s=96&d=mm&r=g\",\"caption\":\"Ravi Singh\"},\"description\":\"Ravi Singh is a Senior Writer at Stellar\u00ae. He is an expert Tech Explainer, IoT enthusiast, and a passionate nerd with over 7 years of experience in technical writing. He writes about Microsoft Exchange, Microsoft 365, Email Migration, Linux, Windows, Mac, DIY Tech, and Smart Home. Ravi spends most of his weekends working with IoT (DIY Smart Home) devices and playing Overwatch. He is also a solo traveler who loves hiking and exploring new trails.\",\"sameAs\":[\"https:\/\/stellarinfo.com\/blog\",\"https:\/\/facebook.com\/raavisingh\",\"https:\/\/instagram.com\/ravi.s1ngh\",\"https:\/\/linkedin.com\/in\/ravi-singh-5a65356a\/\",\"https:\/\/x.com\/https:\/\/twitter.com\/ravi51ngh\",\"https:\/\/youtube.com\/ravisingh9\"],\"url\":\"https:\/\/www.stellarinfo.com\/blog\/author\/ravi\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cuba Ransomware Targeting Vulnerable Exchange Servers- Patch Now","description":"Learn how to protect your Exchange Servers from Cuba ransomware targeting vulnerable unpatched Exchange Servers.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stellarinfo.com\/blog\/cuba-ransomware-targeting-vulnerable-exchange-servers\/","og_locale":"en_US","og_type":"article","og_title":"Cuba Ransomware Targeting Vulnerable Exchange Servers- Patch Now","og_description":"Learn how to protect your Exchange Servers from Cuba ransomware targeting vulnerable unpatched Exchange Servers.","og_url":"https:\/\/www.stellarinfo.com\/blog\/cuba-ransomware-targeting-vulnerable-exchange-servers\/","og_site_name":"Stellar Data Recovery Blog","article_author":"https:\/\/facebook.com\/raavisingh","article_published_time":"2022-02-28T11:31:22+00:00","article_modified_time":"2023-07-20T07:00:06+00:00","og_image":[{"width":1000,"height":600,"url":"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/02\/Microsoft-Exchange-servers-hacked-to-deploy-Cuba-ransomware.jpg","type":"image\/jpeg"}],"author":"Ravi Singh","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/ravi51ngh","twitter_misc":{"Written by":"Ravi Singh","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stellarinfo.com\/blog\/cuba-ransomware-targeting-vulnerable-exchange-servers\/#article","isPartOf":{"@id":"https:\/\/www.stellarinfo.com\/blog\/cuba-ransomware-targeting-vulnerable-exchange-servers\/"},"author":{"name":"Ravi Singh","@id":"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/7dea10d15c0307370e21d7da07d0cd11"},"headline":"Cuba Ransomware Targeting Vulnerable Exchange Servers- Patch Now","datePublished":"2022-02-28T11:31:22+00:00","dateModified":"2023-07-20T07:00:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stellarinfo.com\/blog\/cuba-ransomware-targeting-vulnerable-exchange-servers\/"},"wordCount":838,"image":{"@id":"https:\/\/www.stellarinfo.com\/blog\/cuba-ransomware-targeting-vulnerable-exchange-servers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/02\/Microsoft-Exchange-servers-hacked-to-deploy-Cuba-ransomware.jpg","articleSection":["Ransomware"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.stellarinfo.com\/blog\/cuba-ransomware-targeting-vulnerable-exchange-servers\/","url":"https:\/\/www.stellarinfo.com\/blog\/cuba-ransomware-targeting-vulnerable-exchange-servers\/","name":"Cuba Ransomware Targeting Vulnerable Exchange Servers- Patch Now","isPartOf":{"@id":"https:\/\/www.stellarinfo.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stellarinfo.com\/blog\/cuba-ransomware-targeting-vulnerable-exchange-servers\/#primaryimage"},"image":{"@id":"https:\/\/www.stellarinfo.com\/blog\/cuba-ransomware-targeting-vulnerable-exchange-servers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/02\/Microsoft-Exchange-servers-hacked-to-deploy-Cuba-ransomware.jpg","datePublished":"2022-02-28T11:31:22+00:00","dateModified":"2023-07-20T07:00:06+00:00","author":{"@id":"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/7dea10d15c0307370e21d7da07d0cd11"},"description":"Learn how to protect your Exchange Servers from Cuba ransomware targeting vulnerable unpatched Exchange Servers.","breadcrumb":{"@id":"https:\/\/www.stellarinfo.com\/blog\/cuba-ransomware-targeting-vulnerable-exchange-servers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stellarinfo.com\/blog\/cuba-ransomware-targeting-vulnerable-exchange-servers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stellarinfo.com\/blog\/cuba-ransomware-targeting-vulnerable-exchange-servers\/#primaryimage","url":"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/02\/Microsoft-Exchange-servers-hacked-to-deploy-Cuba-ransomware.jpg","contentUrl":"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/02\/Microsoft-Exchange-servers-hacked-to-deploy-Cuba-ransomware.jpg","width":1000,"height":600,"caption":"Cuba Ransomware Targeting Vulnerable Exchange Servers- Patch Now"},{"@type":"BreadcrumbList","@id":"https:\/\/www.stellarinfo.com\/blog\/cuba-ransomware-targeting-vulnerable-exchange-servers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stellarinfo.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cuba Ransomware Targeting Vulnerable Exchange Servers- Patch Now"}]},{"@type":"WebSite","@id":"https:\/\/www.stellarinfo.com\/blog\/#website","url":"https:\/\/www.stellarinfo.com\/blog\/","name":"Stellar Data Recovery Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stellarinfo.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/7dea10d15c0307370e21d7da07d0cd11","name":"Ravi Singh","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e95cad83fe279b559794f62193f34300d01db8f9f2ec45ce529b7ecde3796ba?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e95cad83fe279b559794f62193f34300d01db8f9f2ec45ce529b7ecde3796ba?s=96&d=mm&r=g","caption":"Ravi Singh"},"description":"Ravi Singh is a Senior Writer at Stellar\u00ae. He is an expert Tech Explainer, IoT enthusiast, and a passionate nerd with over 7 years of experience in technical writing. He writes about Microsoft Exchange, Microsoft 365, Email Migration, Linux, Windows, Mac, DIY Tech, and Smart Home. Ravi spends most of his weekends working with IoT (DIY Smart Home) devices and playing Overwatch. He is also a solo traveler who loves hiking and exploring new trails.","sameAs":["https:\/\/stellarinfo.com\/blog","https:\/\/facebook.com\/raavisingh","https:\/\/instagram.com\/ravi.s1ngh","https:\/\/linkedin.com\/in\/ravi-singh-5a65356a\/","https:\/\/x.com\/https:\/\/twitter.com\/ravi51ngh","https:\/\/youtube.com\/ravisingh9"],"url":"https:\/\/www.stellarinfo.com\/blog\/author\/ravi\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/posts\/94986","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/comments?post=94986"}],"version-history":[{"count":8,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/posts\/94986\/revisions"}],"predecessor-version":[{"id":127704,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/posts\/94986\/revisions\/127704"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/media\/95218"}],"wp:attachment":[{"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/media?parent=94986"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/categories?post=94986"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/tags?post=94986"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}