DETECTO/ThreatDossier
DashboardPricingThreatsRun Free ScanSign In
DETECTO/ThreatDossier

Security intelligence for MSPs, consultants, and businesses. Find breached credentials, compliance gaps, and exposed infrastructure before attackers do.

Product

  • Scan a Domain
  • Pricing
  • Dashboard
  • Sign In

Resources

  • Threat Intelligence
  • Ransomware Groups

Legal

  • Privacy Policy
  • Terms of Service

© 2026 DETECTO. All rights reserved.

Threats/Groups/Cuba

Cuba

Inactive

cuba

First seen: 2021-02-03 00:00:00.000000Total victims: 105

The Cuba Ransomware, also known as Colddraw Ransomware, was first identified in the threat landscape in 2019 and built a relatively small but selected list of victims. The group is also known as Fidel Ransomware, due to a characteristic marker placed at the beginning of all encrypted files. This file marker is used as an indicator for the ransomware and its decoder that the file has been encrypted.<br> <br> Despite its name and the Cuban nationalist style on its leak site, it is difficult to assert any connection or affiliation with the Republic of Cuba. The group has been linked to a Russian-language threat actor by Profero researchers due to some details of incorrect translation they discovered, as well as the discovery of a 404 page containing text in Russian on the threat actor's own leak site.<br> <br> According to BlackBerry, based on the analysis of the code strings used in the campaign analyzed in 2023, there were indications that the developer behind the Cuba ransomware speaks Russian.<br> <br> The ransomware operators use a double extortion approach, and following the USA, in August 2022, it was believed that the Cuba ransomware group had compromised 101 entities, demanding $145 million in ransom payments and receiving up to $60 million.<br> <br> The group used a similar set of TTPs, with only a slight change each year, as they generally consist of LOLBins (executables that are part of the operating system and can be exploited to support an attack), exploits, off-the-shelf and custom malware, as well as intrusion tools like Cobalt Strike and Metasploit.<br> <br> In 2022, the group allegedly developed a relationship with operators of the Industrial Spy market, using their platform as a means of data leakage.<BR>Source: https://github.com/crocodyli/ThreatActors-TTPs

0Total Victims
0Countries Targeted
0Sectors Targeted
0Avg Attacks/Month

Activity Timelinelast 24 months

Top Targeted Sectors

Top Targeted Countries

Recent Victimsshowing 50 of 105

NameCountrySectorDate
dms-imagingFRHealthcare2024-02-01 16:34:09.685614
deknudtframes.beBEManufacturing2024-01-22 10:22:02.558716
diagnostechs——2023-11-14 11:26:24.697967
portadelaidefcAU—2023-11-13 18:57:52.689888
panaya——2023-11-07 08:33:57.421489
prime-art——2023-11-07 08:33:55.080102
Newconcepttech——2023-10-23 19:06:57.417685
mountstmarys——2023-10-10 11:37:00.658787
co.rock.wi.usUS—2023-10-03 10:03:43.641617
goldmedalbakery——2023-08-19 16:02:04.683094
hydrex.co.ukGB—2023-07-31 12:54:59.960212
txmplant.co.ukGB—2023-07-31 12:54:58.986908
gis4.addison-il——2023-07-11 08:51:26.292364
Inquirer——2023-05-23 08:52:52.026939
VdiLT—2023-05-10 13:47:07.489995
Gihealthcare——2023-05-04 08:49:39.374580
pu.edu.lb——2022-12-27 12:31:58.882302
Sae-a——2022-12-20 13:10:18.443266
2networkit——2022-12-12 09:25:57.839312
Landaumedia——2022-12-01 14:25:57.958348
Generator-power——2022-12-01 14:25:57.913437
Boss-inc——2022-12-01 14:25:57.868496
Patton——2022-11-30 14:30:10.471701
Pmc-group——2022-11-24 15:03:53.913205
waltersandwolf——2022-11-09 09:26:24.665505
bfw——2022-11-04 17:45:47.144402
Ville-chaville——2022-11-04 17:45:47.111239
Murphyfamilyventures——2022-11-04 17:45:47.078945
Ginspectionservices——2022-11-04 17:45:47.045385
Dialogsas——2022-11-04 17:45:47.010837
usairports——2022-11-04 10:19:55.601777
trant.co.ukGB—2022-11-04 10:19:55.540929
the_rose_executive_team——2022-11-04 10:19:55.489179
technicote——2022-11-04 10:19:55.437283
stm.com.twTW—2022-11-04 10:19:55.367427
site-technology_——2022-11-04 10:19:55.297793
schultheis-ins——2022-11-04 10:19:55.238232
quercus——2022-11-04 10:19:55.168864
otrcapital——2022-11-04 10:19:55.101792
ohagin——2022-11-04 10:19:55.052276
nwdusa——2022-11-04 10:19:55.000661
ncmutuallife2——2022-11-04 10:19:54.948792
meriplex——2022-11-04 10:19:54.851058
megaforce——2022-11-04 10:19:54.798104
lycra——2022-11-04 10:19:54.746186
linkmfg——2022-11-04 10:19:54.695836
learning_resources——2022-11-04 10:19:54.645388
landofrost——2022-11-04 10:19:54.593383
innovairre——2022-11-04 10:19:54.532878
get-integrated——2022-11-04 10:19:54.480939

Data from ransomware.live