In this campaign, Cuba targeted critical infrastructure organizations in the United States and IT firms in Latin America. The group exploited CVE-2023-27532, a high-severity flaw found in Veeam Backup & Replication (VBR) tools. Using previously obtained administrator credentials, the attackers infiltrated target networks via RDP and deployed their custom downloader BugHatch. Additional steps were needed to fully compromise the network, including deploying a vulnerable driver to disable endpoint protection tools.
The Veeam flaw has been known for several months, and a proof-of-concept is available online, making it crucial for organizations to deploy a patch. Cuba also exploits CVE-2020-1472 (“Zerologon”), a vulnerability in Microsoft’s NetLogon protocol, for privilege escalation against AD domain controllers. The group was previously observed in mid-April last year abusing flaws in Microsoft Exchange to compromise corporate endpoints, harvest data, and deploy the COLDDRAW malware.
Source: TechRadar
To mitigate potential threats, it is important to implement additional cybersecurity measures with the help of a trusted partner like INFRA www.infrascan.net or you can try your self using check.website.