Cuba ransomware group claims attack on Montenegro government
The double extortion specialists claim to have stolen the data days before Montenegro announced a sustained and co-ordinated series of cyber attacks targeting it from Russia


The Cuba ransomware group has claimed an attack on Montenegro’s government which reported last week that it was facing Russia-linked cyber attacks.
It claimed to have received the files belonging to the Montenegrin government’s Department for Public Relations on 19 August 2022.
The files allegedly contained information such as financial documents, correspondence with bank employees, balance sheets, tax documents, compensation, and source code.
IT Pro has not been able to verify the legitimacy of the files since Cuba’s download link appears to be broken at the time of writing.
Montenegro’s Agency for National Security (ANB) said on Saturday that it was “under a hybrid war at the moment” days after its public administration minister tweeted that “certain services” had been taken offline amid ‘multiple’ cyber attacks.
The minister, Maras Dukaj, on Thursday also likened the “series of cyber attacks” to those sustained in 2015 and 2016 in the country.
Dukaj did not explicitly define which attacks he was referring to, but he may have been referring to the Russia-linked cyber attacks targeting the nation before it joined NATO in 2017.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
The Montenegrin ANB website is also currently unreachable at the time of writing, as is the website for the Department for Public Relations which Cuba has claimed to have successfully breached.
Montenegro was once considered a pro-Russia ally but since it joined NATO in 2017, it has been considered an enemy of the country that’s now invading Ukraine.
Russia also added Montenegro to its list of ‘enemy states’ alongside other Western allies such as the UK and other nations that publicly oppose the Kremlin’s goals.
Coordinated Russian services are behind the cyber attack,” the ANB said in a statement to Associated Press. “This kind of attack was carried out for the first time in Montenegro and it has been prepared for a long period of time.”
Government official Dusan Polovic said, “I can say with certainty that this attack that Montenegro is experiencing these days comes directly from Russia.”
The cyber attacks appear to be targeting a broad selection of public entities in the country, including government services, and transportation and telecommunications sectors, its government said.
A number of the government’s servers have been targeted but the attacks so far have not resulted in any damage or data loss.
Who is behind the Cuba ransomware gang?
Very few cyber security companies have been confident enough to attribute the ransomware organisation to a specific country, however, Profero is one to have linked it to Russia.
The company said it has observed the Russian language on its website and during its negotiations with victims.
Cuba’s current ransomware leak site is written entirely in English, although some minor spelling and grammar issues can be observed.
RELATED RESOURCE
Escape the ransomware maze
Conventional endpoint protection tools just aren’t the best defence anymore
The US Federal Bureau of Investigation (FBI) said in a 2021 report that the group had compromised at least 49 organisations, including target operating critical infrastructure, netting nearly $50 million (£43 million) in revenue.
The double extortion ransomware group is thought to have targeted organisations in Europe, North and South America, and Asia in the past and experienced a resurgence between March and April 2022, according to Trend Micro.
Cuba ransomware is often delivered as a final-stage payload in cyber attacks involving the Hancitor malware downloader in email-based attack campaigns.
Additional tools often associated with these attacks are the use of the Mimikatz credential-stealing malware and the oft-abused Cobalt Strike penetration testing toolkit.

Connor Jones has been at the forefront of global cyber security news coverage for the past few years, breaking developments on major stories such as LockBit’s ransomware attack on Royal Mail International, and many others. He has also made sporadic appearances on the ITPro Podcast discussing topics from home desk setups all the way to hacking systems using prosthetic limbs. He has a master’s degree in Magazine Journalism from the University of Sheffield, and has previously written for the likes of Red Bull Esports and UNILAD tech during his career that started in 2015.
-
Should AI PCs be part of your next hardware refresh?
AI PCs are fast becoming a business staple and a surefire way to future-proof your business
By Bobby Hellard
-
Westcon-Comstor and Vectra AI launch brace of new channel initiatives
News Westcon-Comstor and Vectra AI have announced the launch of two new channel growth initiatives focused on the managed security service provider (MSSP) space and AWS Marketplace.
By Daniel Todd
-
‘Phishing kits are a force multiplier': Cheap cyber crime kits can be bought on the dark web for less than $25 – and experts warn it’s lowering the barrier of entry for amateur hackers
News Research from NordVPN shows phishing kits are now widely available on the dark web and via messaging apps like Telegram, and are often selling for less than $25.
By Emma Woollacott
-
Healthcare systems are rife with exploits — and ransomware gangs have noticed
News Nearly nine-in-ten healthcare organizations have medical devices that are vulnerable to exploits, and ransomware groups are taking notice.
By Nicole Kobie
-
Alleged LockBit developer extradited to the US
News A Russian-Israeli man has been extradited to the US amid accusations of being a key LockBit ransomware developer.
By Emma Woollacott
-
February was the worst month on record for ransomware attacks – and one threat group had a field day
News February 2025 was the worst month on record for the number of ransomware attacks, according to new research from Bitdefender.
By Emma Woollacott
-
CISA issues warning over Medusa ransomware after 300 victims from critical sectors impacted
News The Medusa ransomware as a Service operation compromised twice as many organizations at the start of 2025 compared to 2024
By Solomon Klappholz
-
Warning issued over prolific 'Ghost' ransomware group
News The Ghost ransomware group is known to act fast and exploit vulnerabilities in public-facing appliances
By Solomon Klappholz
-
The Zservers takedown is another big win for law enforcement
News LockBit has been dealt another blow by law enforcement after Dutch police took 127 of its servers offline
By Solomon Klappholz
-
There’s a new ransomware player on the scene: the ‘BlackLock’ group has become one of the most prolific operators in the cyber crime industry – and researchers warn it’s only going to get worse for potential victims
News Security experts have warned the BlackLock group could become the most active ransomware operator in 2025
By Solomon Klappholz