Chinese state-linked threat actors compromised internal email communications at the Cuban Embassy in Washington D.C., gaining unauthorized access to the private accounts of 68 senior diplomatic figures, including the ambassador and deputy chief of mission. Cybersecurity firm Gambit Security publicly disclosed the intrusion on Wednesday following initial reporting by Bloomberg, confirming a major cyber espionage operation against one of Beijing's closest geopolitical allies.

What Happened

The intrusion began in January 2026, during a period of severe domestic instability inside Cuba. With the Trump administration halting all oil shipments to the island, Cuba was experiencing nationwide blackouts of 25 to 30 hours daily, creating critical operational blind spots across institutional networks. Threat actors leveraged this window to penetrate the embassy's mail infrastructure and remained inside long enough to exfiltrate entire archives belonging to top Cuban political strategists and intelligence officials. Gambit Security has attributed the activity to Chinese state-linked operators based on tradecraft, infrastructure, and targeting profile.

What Was Taken

Investigators confirmed that attackers obtained full email archives from 68 senior diplomatic mailboxes. The compromised accounts include the ambassador, the deputy chief of mission, and senior political and intelligence officers stationed in Washington. The stolen correspondence is believed to include sensitive material tied to ongoing US-Cuba diplomatic negotiations underway since February 2026, including communications surrounding Havana's recent agreement to release more than 2,000 political prisoners. The breadth of access suggests near-total visibility into the embassy's internal political reporting line back to Havana.

Why It Matters

This is a rare confirmed case of Chinese intelligence collecting against a nominal strategic partner, underscoring that ideological alignment offers no immunity from Beijing's intelligence priorities. Direct visibility into Cuban diplomatic cables gives China unfiltered insight into the trajectory of US-Cuba talks at a moment when Beijing is calibrating its own posture toward Washington. For defenders, the incident reinforces that diplomatic missions operating in resource-strained environments are high-value, low-friction targets, and that allied status does not predict threat actor behavior. Legacy infrastructure inside any embassy is now a confirmed collection vector.

The Attack Technique

Forensic analysts determined that the embassy was operating outdated Microsoft Exchange servers missing baseline security updates, with critical patches unapplied for at least five years. The attackers exploited known, long-public Exchange vulnerabilities to gain initial access to the mail environment, then pivoted to harvest mailbox contents at scale. No zero-day was required. Curtis Simpson, strategy director at Gambit Security, noted that "this breach illustrates how global events can fuel cyber activity," highlighting how the Cuban energy crisis degraded the embassy's ability to maintain even basic patch hygiene. The campaign reportedly extended beyond the embassy, touching Venezuelan government servers and additional downstream development systems.

What Organizations Should Do

  1. Inventory all on-premises Microsoft Exchange deployments and confirm patch levels against the full backlog of ProxyLogon, ProxyShell, and subsequent Exchange CVEs.
  2. Decommission or migrate end-of-life Exchange servers; treat any unpatched on-prem mail server as presumed compromised until proven otherwise.
  3. Enforce multi-factor authentication on all diplomatic and executive mailboxes and disable legacy authentication protocols (IMAP, POP, basic auth).
  4. Hunt for known Exchange post-exploitation indicators: webshells in inetpub\wwwroot\aspnet_client, anomalous w3wp.exe child processes, and unauthorized mailbox export requests.
  5. Implement mailbox auditing and egress monitoring to detect bulk message access and exfiltration consistent with archive-level theft.
  6. For missions and offices in regions with infrastructure instability, establish a contingency patching and monitoring protocol so power and connectivity disruptions do not translate into prolonged security drift.

Sources: Spying on Its Own Ally: Chinese Hackers Accessed Secret Emails at the Cuban Embassy in the US | IBTimes UK