Threat Actor Profile
High Cybercriminal
Description

The Cuba Ransomware, also known as Colddraw Ransomware, was first identified in the threat landscape in 2019 and built a relatively small but selected list of victims. The group is also known as Fidel Ransomware, due to a characteristic marker placed at the beginning of all encrypted files. This file marker is used as an indicator for the ransomware and its decoder that the file has been encrypted. Despite its name and the Cuban nationalist style on its leak site, it is difficult to assert any connection or affiliation with the Republic of Cuba. The group has been linked to a Russian-language threat actor by Profero researchers due to some details of incorrect translation they discovered, as well as the discovery of a 404 page containing text in Russian on the threat actor's own leak site. According to BlackBerry, based on the analysis of the code strings used in the campaign analyzed in 2023, there were indications that the developer behind the Cuba ransomware speaks Russian. The ransomware operators use a double extortion approach, and following the USA, in August 2022, it was believed that the Cuba ransomware group had compromised 101 entities, demanding $145 million in ransom payments and receiving up to $60 million. The group used a similar set of TTPs, with only a slight change each year, as they generally consist of LOLBins (executables that are part of the operating system and can be exploited to support an attack), exploits, off-the-shelf and custom malware, as well as intrusion tools like Cobalt Strike and Metasploit. In 2022, the group allegedly developed a relationship with operators of the Industrial Spy market, using their platform as a means of data leakage. Source: https://github.com/crocodyli/ThreatActors-TTPs

Confidence Score
100%
Known Aliases
Colddraw
Tags
ransomware ransomware.live Colddraw
First Seen

Unknown

Last Updated

Unknown

Active Status
Active
Created

April 29, 2026

MITRE ATT&CK Techniques (22)
T1071.001 - Web Protocols
Command and Control
T1071.004 - DNS
Command and Control
T1090.003 - Multi-hop Proxy
Command and Control
T1219 - Remote Access Tools
Command and Control
T1212 - Exploitation for Credential Access
Credential Access
T1036.005 - Match Legitimate Resource Name or Locat…
Defense Evasion
T1078.003 - Local Accounts
Defense Evasion
T1016.001 - Internet Connection Discovery
Discovery
T1018 - Remote System Discovery
Discovery
T1057 - Process Discovery
Discovery
T1083 - File and Directory Discovery
Discovery
T1124 - System Time Discovery
Discovery
T1135 - Network Share Discovery
Discovery
T1059.001 - PowerShell
Execution
T1059.003 - Windows Command Shell
Execution
T1106 - Native API
Execution
T1204.002 - Malicious File
Execution
T1569.002 - Service Execution
Execution
T1021.002 - SMB/Windows Admin Shares
Lateral Movement
T1570 - Lateral Tool Transfer
Lateral Movement
T1133 - External Remote Services
Persistence
T1068 - Exploitation for Privilege Escalation
Privilege Escalation
Indicators of Compromise

Loading IOCs…

IOC KQL for Sentinel
STIX Data
{'added_date': None,
 'client': '2003264@sit.singaporetech.edu.sg',
 'description': 'The Cuba Ransomware, also known as Colddraw Ransomware, was '
                'first identified in the threat landscape in 2019 and built a '
                'relatively small but selected list of victims. The group is '
                'also known as Fidel Ransomware, due to a characteristic '
                'marker placed at the beginning of all encrypted files. This '
                'file marker is used as an indicator for the ransomware and '
                'its decoder that the file has been encrypted.<br> <br> '
                'Despite its name and the Cuban nationalist style on its leak '
                'site, it is difficult to assert any connection or affiliation '
                'with the Republic of Cuba. The group has been linked to a '
                'Russian-language threat actor by Profero researchers due to '
                'some details of incorrect translation they discovered, as '
                'well as the discovery of a 404 page containing text in '
                "Russian on the threat actor's own leak site.<br> <br> "
                'According to BlackBerry, based on the analysis of the code '
                'strings used in the campaign analyzed in 2023, there were '
                'indications that the developer behind the Cuba ransomware '
                'speaks Russian.<br> <br> The ransomware operators use a '
                'double extortion approach, and following the USA, in August '
                '2022, it was believed that the Cuba ransomware group had '
                'compromised 101 entities, demanding $145 million in ransom '
                'payments and receiving up to $60 million.<br> <br> The group '
                'used a similar set of TTPs, with only a slight change each '
                'year, as they generally consist of LOLBins (executables that '
                'are part of the operating system and can be exploited to '
                'support an attack), exploits, off-the-shelf and custom '
                'malware, as well as intrusion tools like Cobalt Strike and '
                'Metasploit.<br> <br> In 2022, the group allegedly developed a '
                'relationship with operators of the Industrial Spy market, '
                'using their platform as a means of data leakage.<BR>Source: '
                'https://github.com/crocodyli/ThreatActors-TTPs',
 'firstseen': '2021-02-03T00:00:00+00:00',
 'group': 'cuba',
 'has_negotiations': False,
 'has_ransomnote': True,
 'lastseen': '2024-02-01T16:34:09.685590+00:00',
 'locations': [{'available': False,
                'fqdn': 'cuba4ikm4jakjgmkezytyawtdgr2xymvy6nvzgw5cglswg3si76icnqd.onion',
                'slug': 'http://cuba4ikm4jakjgmkezytyawtdgr2xymvy6nvzgw5cglswg3si76icnqd.onion',
                'title': 'Cuba',
                'type': 'DLS'},
               {'available': False,
                'fqdn': 'cuba4mp6ximo2zlo.onion',
                'slug': 'http://cuba4mp6ximo2zlo.onion',
                'title': '',
                'type': 'DLS'}],
 'negotiation_count': 0,
 'ransomnotes_count': 1,
 'tiaras_metadata': {'has_negotiations': False,
                     'has_ransomnote': True,
                     'locations': [{'available': False,
                                    'fqdn': 'cuba4ikm4jakjgmkezytyawtdgr2xymvy6nvzgw5cglswg3si76icnqd.onion',
                                    'slug': 'http://cuba4ikm4jakjgmkezytyawtdgr2xymvy6nvzgw5cglswg3si76icnqd.onion',
                                    'title': 'Cuba',
                                    'type': 'DLS'},
                                   {'available': False,
                                    'fqdn': 'cuba4mp6ximo2zlo.onion',
                                    'slug': 'http://cuba4mp6ximo2zlo.onion',
                                    'title': '',
                                    'type': 'DLS'}],
                     'negotiation_count': 0,
                     'ransomnotes_count': 1,
                     'ransomware_live_group': 'cuba',
                     'tools': {'CredentialTheft': ['Mimikatz'],
                               'DefenseEvasion': ['Avast Anti-Rootkit driver'],
                               'DiscoveryEnum': [],
                               'Exfiltration': [],
                               'LOLBAS': ['PsExec'],
                               'Networking': ['Termite'],
                               'Offsec': ['Cobalt Strike', 'Meterpreter'],
                               'RMM-Tools': ['NetSupport']},
                     'url': 'https://www.ransomware.live/group/cuba',
                     'victims': 103,
                     'vulnerabilities': []},
 'tiaras_source': 'ransomware.live',
 'tools': {'CredentialTheft': ['Mimikatz'],
           'DefenseEvasion': ['Avast Anti-Rootkit driver'],
           'DiscoveryEnum': [],
           'Exfiltration': [],
           'LOLBAS': ['PsExec'],
           'Networking': ['Termite'],
           'Offsec': ['Cobalt Strike', 'Meterpreter'],
           'RMM-Tools': ['NetSupport']},
 'ttps': [{'tactic_id': 'TA0001',
           'tactic_name': 'Initial Access',
           'techniques': [{'technique_details': 'Cuba ransomware operators '
                                                'used external remote services '
                                                'for initial access.',
                           'technique_id': 'T1133',
                           'technique_name': 'External Remote Services'},
                          {'technique_details': 'Operators leveraged valid '
                                                'local accounts for initial '
                                                'access.',
                           'technique_id': 'T1078.003',
                           'technique_name': 'Valid Accounts: Local '
                                             'Accounts'}]},
          {'tactic_id': 'TA0002',
           'tactic_name': 'Execution',
           'techniques': [{'technique_details': 'Cuba ransomware used native '
                                                'API calls to execute '
                                                'malicious behaviors.',
                           'technique_id': 'T1106',
                           'technique_name': 'Native API'},
                          {'technique_details': 'Malicious files were used to '
                                                'trick users into executing '
                                                'ransomware.',
                           'technique_id': 'T1204.002',
                           'technique_name': 'User Execution: Malicious File'},
                          {'technique_details': 'Cuba ransomware operators '
                                                'executed PowerShell commands '
                                                'during the attack.',
                           'technique_id': 'T1059.001',
                           'technique_name': 'Command and Scripting '
                                             'Interpreter: PowerShell'},
                          {'technique_details': 'The Windows Command Shell was '
                                                'used to execute various '
                                                'commands during the attack.',
                           'technique_id': 'T1059.003',
                           'technique_name': 'Command and Scripting '
                                             'Interpreter: Windows Command '
                                             'Shell'},
                          {'technique_details': 'Cuba ransomware was executed '
                                                'using Windows system '
                                                'services.',
                           'technique_id': 'T1569.002',
                           'technique_name': 'System Services: Service '
                                             'Execution'}]},
          {'tactic_id': 'TA0005',
           'tactic_name': 'Defense Evasion',
           'techniques': [{'technique_details': 'The ransomware used '
                                                'legitimate names or locations '
                                                'to evade detection.',
                           'technique_id': 'T1036.005',
                           'technique_name': 'Masquerading: Match Legitimate '
                                             'Name or Location'},
                          {'technique_details': 'Cuba ransomware exploited '
                                                'vulnerabilities to escalate '
                                                'privileges.',
                           'technique_id': 'T1068',
                           'technique_name': 'Exploitation for Privilege '
                                             'Escalation'}]},
          {'tactic_id': 'TA0007',
           'tactic_name': 'Discovery',
           'techniques': [{'technique_details': 'Cuba ransomware operators '
                                                'performed time discovery on '
                                                'infected systems.',
                           'technique_id': 'T1124',
                           'technique_name': 'Time Discovery'},
                          {'technique_details': 'Network shares were '
                                                'enumerated by the ransomware.',
                           'technique_id': 'T1135',
                           'technique_name': 'Network Share Discovery'},
                          {'technique_details': 'Remote systems were '
                                                'discovered using built-in '
                                                'utilities.',
                           'technique_id': 'T1018',
                           'technique_name': 'Remote System Discovery'},
                          {'technique_details': 'Files and directories were '
                                                'enumerated during the attack.',
                           'technique_id': 'T1083',
                           'technique_name': 'File and Directory Discovery'},
                          {'technique_details': 'Running processes were '
                                                'identified during the attack.',
                           'technique_id': 'T1057',
                           'technique_name': 'Process Discovery'},
                          {'technique_details': 'Network connections were '
                                                'enumerated for discovery '
                                                'purposes.',
                           'technique_id': 'T1016.001',
                           'technique_name': 'Network Configuration Discovery: '
                                             'Network Connection '
                                             'Enumeration'}]},
          {'tactic_id': 'TA0008',
           'tactic_name': 'Lateral Movement',
           'techniques': [{'technique_details': 'Cuba ransomware operators '
                                                'used tool transfer for '
                                                'lateral movement.',
                           'technique_id': 'T1570',
                           'technique_name': 'Tool Transfer'},
                          {'technique_details': 'Operators utilized external '
                                                'remote services to move '
                                                'laterally within the network.',
                           'technique_id': 'T1333',
                           'technique_name': 'External Remote Services'}]},
          {'tactic_id': 'TA0006',
           'tactic_name': 'Credential Access',
           'techniques': [{'technique_details': 'Cuba ransomware operators '
                                                'exploited vulnerabilities to '
                                                'gain credential access.',
                           'technique_id': 'T1212',
                           'technique_name': 'Exploitation for Credential '
                                             'Access'},
                          {'technique_details': 'Remote services were used to '
                                                'gain access to systems during '
                                                'the attack.',
                           'technique_id': 'T1021.002',
                           'technique_name': 'Remote Services: External Remote '
                                             'Services'}]},
          {'tactic_id': 'TA0011',
           'tactic_name': 'Command and Control',
           'techniques': [{'technique_details': 'The operators used Remote '
                                                'Desktop Protocol (RDP) for '
                                                'command and control.',
                           'technique_id': 'T1219',
                           'technique_name': 'Remote Desktop Protocol'},
                          {'technique_details': 'Cuba ransomware operators '
                                                'used multi-hop proxies to '
                                                'obfuscate communication.',
                           'technique_id': 'T1090.003',
                           'technique_name': 'Multi-hop Proxy'},
                          {'technique_details': 'DNS was used as a protocol '
                                                'for command and control '
                                                'communication.',
                           'technique_id': 'T1071.004',
                           'technique_name': 'Application Layer Protocol: DNS'},
                          {'technique_details': 'Web protocols such as HTTP '
                                                'and HTTPS were used for '
                                                'communication.',
                           'technique_id': 'T1071.001',
                           'technique_name': 'Application Layer Protocol: Web '
                                             'Protocols'}]}],
 'url': 'https://www.ransomware.live/group/cuba',
 'victims': 103,
 'vulnerabilities': []}
Quick Actions
Related TTPs (22)
Web Protocols
Command and Control

DNS
Command and Control

Multi-hop Proxy
Command and Control

Remote Access Tools
Command and Control

Exploitation for Credential A…
Credential Access