R
Ransomwhere.org
Live MapLatest VictimsGroups
PaymentsTTPsIdentifyNewsDataAPI
LIVE
Ransomwhere.org

Real-time ransomware intelligence platform. Tracking threat actors, victims, and payments to raise awareness and help defend against ransomware attacks worldwide.

Platform

  • Live Map
  • Latest Victims
  • Groups
  • Payments
  • Identify
  • News

Resources

  • Data & Methodology
  • API Docs
  • NoMoreRansom
  • Ransomware.live
  • CISA Advisories

Data sourced from Ransomware.live API. For informational purposes only.

© 2026 Ransomwhere.org

Groups/cuba

cuba

Inactive

The Cuba Ransomware, also known as Colddraw Ransomware, was first identified in the threat landscape in 2019 and built a relatively small but selected list of victims. The group is also known as Fidel Ransomware, due to a characteristic marker placed at the beginning of all encrypted files. This file marker is used as an indicator for the ransomware and its decoder that the file has been encrypted.<br> <br> Despite its name and the Cuban nationalist style on its leak site, it is difficult to assert any connection or affiliation with the Republic of Cuba. The group has been linked to a Russian-language threat actor by Profero researchers due to some details of incorrect translation they discovered, as well as the discovery of a 404 page containing text in Russian on the threat actor's own leak site.<br> <br> According to BlackBerry, based on the analysis of the code strings used in the campaign analyzed in 2023, there were indications that the developer behind the Cuba ransomware speaks Russian.<br> <br> The ransomware operators use a double extortion approach, and following the USA, in August 2022, it was believed that the Cuba ransomware group had compromised 101 entities, demanding $145 million in ransom payments and receiving up to $60 million.<br> <br> The group used a similar set of TTPs, with only a slight change each year, as they generally consist of LOLBins (executables that are part of the operating system and can be exploited to support an attack), exploits, off-the-shelf and custom malware, as well as intrusion tools like Cobalt Strike and Metasploit.<br> <br> In 2022, the group allegedly developed a relationship with operators of the Industrial Spy market, using their platform as a means of data leakage.<BR>Source: https://github.com/crocodyli/ThreatActors-TTPs

105
Victims
2
Sites

Known Leak Sites

cuba4mp6ximo2zlo.onionDLS
cuba4ikm4jakjgmkezytyawtdgr2xymvy6nvzgw5cglswg3si76icnqd.onionDLS

Victims (105)

Live
dms-imaging
cubaFR
deknudtframes.be
cubaBE
diagnostechs
cuba
portadelaidefc
cuba
panaya
cuba
prime-art
cuba
Newconcepttech
cuba
mountstmarys
cuba
co.rock.wi.us
cubaUS
goldmedalbakery
cuba
hydrex.co.uk
cubaGB
txmplant.co.uk
cubaGB
gis4.addison-il
cuba
Inquirer
cuba
Vdi
cuba
Gihealthcare
cuba
pu.edu.lb
cuba
Sae-a
cuba
2networkit
cuba
Landaumedia
cuba
Generator-power
cuba
Boss-inc
cuba
Patton
cuba
Pmc-group
cuba
waltersandwolf
cuba

Top Targeted Countries

Unknown97
United Kingdom3
United States2
France1
Belgium1

Profile

:
:
:

Activity

Total victims105
Countries affected6
Last seen