WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Ransomware Awareness – Microsoft Exchange Vulnerabilities Exploited to Deliver Cuba Ransomware
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Ransomware Awareness – Microsoft Exchange Vulnerabilities Exploited to Deliver Cuba Ransomware

Author: Alec Davison

Created: Tuesday, March 1, 2022 - 19:19

Categories: Cybersecurity

The Cuba ransomware group is exploiting Microsoft Exchange vulnerabilities to gain initial access to enterprise networks and eventually deploy ransomware, according to security researchers at Mandiant. Cuba ransomware has been around since 2019, but their activity increased in 2021 prompting the FBI to issue a FLASH advisory. The FLASH, which was shared by WaterISAC, indicated that since November 2021, Cuba ransomware threat actors had targeted at least 49 critical infrastructure entities.

According to Mandiant’s latest report, the Cuba ransomware gang has been utilizing Microsoft Exchange vulnerabilities to deploy web shells, RATs, and backdoors on unpatched servers to secure a foothold on target networks since August 2021. The gang’s attack pattern also includes using stolen credentials to escalate privileges, followed by network reconnaissance, lateral movement, ultimately resulting in data exfiltration and file encryption. Members are encouraged to verify the status of Microsoft Exchange security updates to reduce the risk from exploitation of these vulnerabilities. Read more at BleepingComputer.

Related Resources

Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated May 1, 2026)

May 1, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness

Tip of the Week – April 30, 2026

Apr 30, 2026 in Cybersecurity, Security Preparedness

(TLP:CLEAR) Cyber Readiness Institute Joins WaterISAC as a Community Partner to Strengthen Cyber Readiness Across the Water Sector

Apr 30, 2026 in Cybersecurity, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar