Logo
/
Blog/Cyber ​​Attack Campaign Targeting the Cuban Embassy and Global Government Entities
April 30, 202611 min readintelligence
Share:

Cyber ​​Attack Campaign Targeting the Cuban Embassy and Global Government Entities

By Threat Intelligence Unit

Overview

Oasis Security identified a large-scale intrusion campaign targeting diplomatic infrastructure, government-affiliated entities, and strategic sector organizations across multiple regions.

The analysis is based on files and logs obtained from an attacker-controlled server, revealing coordinated activity involving email server exploitation, credential harvesting, vulnerability scanning, and large-scale reconnaissance operations.

The findings indicate that the activity extended beyond simple scanning and included confirmed compromise and data exfiltration.



Executive Summary

  • Targeting of diplomatic and government-affiliated infrastructure
  • Confirmed targeting of the Exchange email infrastructure associated with the Cuban Embassy
  • Exploitation of Exchange SSRF vulnerability using publicly available code
  • Automated credential harvesting using juicy365.py
  • Large-scale scanning exploiting React vulnerability (CVE-2025-55182)
  • Extensive IP and domain reconnaissance using kscan
  • Confirmed data exfiltration including emails, credentials, documents, and identity-related information


Adversary Infrastructure Overview

Analyzed Server Information

  • Server IP: 198.98.56.220
  • Country: United States

Server-side files and logs were collected from an attacker-controlled system, providing insight into attacker tooling, operational workflow, and target scope.



Targeting of the Embassy of Cuba Email Infrastructure

Exchange SSRF Exploitation

The Exchange_SSRF directory contains the exchange_ssrf_attacks.py script.

  • The script is designed to exploit vulnerabilities in Microsoft Exchange email servers

Identified Target Email Server Domains

  • [REDACTED]cuba.cu - associated with a Cuban embassy and its consular operations

Email Domain Configuration

  • [REDACTED]cuba.cu — identified as the Exchange server supporting a Cuban embassy email infrastructure
  • [REDACTED]cuba.us — observed as the email domain used by targeted user accounts
  • The [REDACTED]cuba.us domain does not resolve in public DNS, suggesting use for internal routing within the Exchange environment
Log evidence showing targeted activity against a Cuba-related email server domain

Figure 1. Log evidence showing targeted activity against a Cuba-related email server domain

Target List

  • Approximately 88 subdirectories, each named in the format of an email address
  • These are assessed to represent targeted user accounts
Directory structure mapping targeted email accounts

Figure 2. Directory structure mapping targeted email accounts

Data Exfiltration Evidence

Within the subdirectories:

  • .eml files containing full email contents
  • Documents and attachments
  • Sensitive data including passport-related information
Sample of exfiltrated files including email data and documents

Figure 3. Sample of exfiltrated files including email data and documents

Extract from exfiltrated email data showing message metadata and headers

Figure 4. Extract from exfiltrated email data showing message metadata and headers

Sample of exfiltrated email communication from compromised accounts

Figure 5. Sample of exfiltrated email communication from compromised accounts

Sample of sensitive personal data identified within exfiltrated files

Figure 6. Sample of sensitive personal data identified within exfiltrated files

Analysis confirms that email addresses in the .eml files correspond to subdirectory names.

  • Indicates account-level targeting and successful data extraction


Targeting of Government and Defense-Related Infrastructure

Data Exfiltration

The .bash_history file contains logs indicating targeting of government-affiliated and enterprise infrastructure.

Identified Target

  • A subdomain associated with a government environmental regulatory organization in the United States
`.bash_history` file showing command execution targeting government-associated infrastructure

Figure 7. .bash_history file showing command execution targeting government-associated infrastructure

Exfiltrated Directory and File Structure

  • Approximately 4,309 files and directories identified in /tmp
File structure identified in the `/tmp` directory containing large volumes of collected data

Figure 8. File structure identified in the /tmp directory containing large volumes of collected data

Sample of document file identified within the collected dataset (1)

Figure 9. Sample of document file identified within the collected dataset (1)

Sample of document file identified within the collected dataset (2)

Figure 10. Sample of document file identified within the collected dataset (2)

Credential Harvesting Activity

The logs confirm usage of juicy365.py which is a password validation tool.

  • Carried out a credential harvesting attack targeting the U.S based defense-related company
`.bash_history` file showing execution of the `juicy365.py` credential validation tool

Figure 11. .bash_history file showing execution of the juicy365.py credential validation tool

Supporting Files

  • user.txt → approximately 287 email addresses of the U.S based defense-related company
  • results.csv → email addresses, password attempts, and validation results
Sample of email addresses identified in the credential targeting list

Figure 12. Sample of email addresses identified in the credential targeting list

Results of credential validation attempts showing email-password combinations

Figure 13. Results of credential validation attempts showing email-password combinations

This indicates targeting of defense-aligned service providers supporting government operations.



Targeting of Global Government and Strategic Entities

Identified Target Scope

Analysis revealed targeting across:

  • Government financial authorities
  • Foreign affairs-related institutions
  • Maritime regulatory bodies
  • State-linked energy organizations
  • Financial institutions
Scanning activity targeting government-associated domain

Figure 14. Scanning activity targeting government-associated domain

Observed Activity

  • Data collection activity conducted using the suopro.sh script
  • Multi-sector targeting observed across government, defense, energy, and financial sectors
Data collection using `suopro.sh`

Figure 15. Data collection using suopro.sh

Evidence of scanning targeting government-associated infrastructure

Figure 16. Evidence of scanning targeting government-associated infrastructure



Exploitation of React Vulnerability (CVE-2025-55182)

Scanning Activity

The .bash_history file confirms:

  • Automated scanning exploiting CVE-2025-55182
Evidence of automated scanning exploiting CVE-2025-55182

Figure 17. Evidence of automated scanning exploiting CVE-2025-55182

Identified Files

  • 130 text files containing vulnerability scan results
  • All indicate the presence of vulnerable systems
List of text files containing vulnerability scan results from automated scanning activity

Figure 18. List of text files containing vulnerability scan results from automated scanning activity

Extracted service and configuration details from vulnerable target systems

Figure 19. Extracted service and configuration details from vulnerable target systems

Additional Findings

  • 5,252 text files identified in the envc directory
  • Files contain server configuration data and extracted information from vulnerable systems
SQL injection logs

Figure 20. Directory listing of collected files containing extracted data from vulnerable systems

Sample of configuration data identified within collected files

Figure 21. Sample of configuration data identified within collected files

Sample of URLs and endpoints identified from large-scale data collection

Figure 22. Sample of URLs and endpoints identified from large-scale data collection

Confirmed Compromise Case

Upon reviewing a text file associated with a successfully compromised regional IP:

  • Server configuration details were exposed
  • Indicates successful exploitation and data retrieval
Extracted configuration data from a successfully compromised system

Figure 23. Extracted configuration data from a successfully compromised system



Large-Scale IP and Domain Scanning Activity

kscan Usage

The attacker conducted large-scale scanning using the kscan tool.

Evidence of large-scale IP and domain scanning using kscan

Figure 24. Evidence of large-scale IP and domain scanning using kscan

Observed Indicators

  • Region-based scanning patterns identified
  • Targeting of government-related domains within specific geographic clusters
Sample of reconnaissance data targeting government-related domains

Figure 25. Sample of reconnaissance data targeting government-related domains

Target Domains

  • durl2.txt contains approximately 11,235,470 domains
Large-scale domain dataset identified in `durl2.txt`

Figure 26. Large-scale domain dataset identified in durl2.txt



Conclusion

The analysis indicates that the attacker-controlled server was used for broad, multi-target intrusion operations, rather than a single isolated campaign.

The observed activity includes exploitation of Exchange SSRF vulnerabilities, automated credential harvesting, and large-scale vulnerability scanning targeting React-based systems, supported by extensive reconnaissance across a global domain space.

The presence of .eml files, credentials, and sensitive data suggests that multiple intrusions progressed beyond initial access and resulted in confirmed data exfiltration.

In addition, the collection of thousands of vulnerable server configuration files across a wide geographic range highlights the use of a highly automated and scalable attack infrastructure, reinforcing the assessment that this activity represents a coordinated campaign.

Overall, the activity is assessed as an intelligence-gathering intrusion campaign targeting diplomatic infrastructure and strategic sectors, with potential implications extending beyond financially motivated cybercrime.