Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Cerberus Stalkerware Abuses Google Play for Leverages Accessibility
May 5, 2026
Education Sector Under Attack: Espionage & Phishing
May 5, 2026
DAEMON Tools Hacked: Supply Chain Attack Software Deliver
May 5, 2026
Home/CyberSecurity News/Exposed Server Exposes TheGentlemen Ransomware Reveals Toolkit
CyberSecurity News

Exposed Server Exposes TheGentlemen Ransomware Reveals Toolkit

A misconfigured server, operating from a Russian bulletproof hosting provider, has exposed the full operational toolkit of a TheGentlemen ransomware affiliate. This exposure includes harvested victim...

Marcus Rodriguez
Marcus Rodriguez
March 30, 2026 4 Min Read
0 0

A misconfigured server, operating from a Russian bulletproof hosting provider, has exposed the full operational toolkit of a TheGentlemen ransomware affiliate. This exposure includes harvested victim credentials and plaintext authentication tokens used to establish hidden remote access tunnels.

TheGentlemen ransomware group operates as a Ransomware-as-a-Service, or RaaS, operation where affiliates carry out attacks using shared tools and infrastructure.

The group has been documented targeting organizations across the Americas, Europe, and the Middle East, with capabilities spanning Windows, Linux, and ESXi environments.

Their attack playbook moves quickly, compressing the time between initial access and full encryption into hours. What makes this particular exposure significant is that the server did not just hold tools waiting to be used. It held evidence that those tools had already been deployed against real victims.

The server in question was found at IP address 176.120.22[.]127, operating over port 80 on Proton66 OOO infrastructure, an autonomous system with a history tied to SuperBlack ransomware, WeaXor, and XWorm campaigns.

The directory contained 126 files across 18 subdirectories, totaling approximately 140 megabytes of operational material.

Hunt.io analysts identified the exposed open directory on March 12, 2026, while pivoting on indicators of compromise published in CyberXTron’s earlier report on TheGentlemen ransomware group.

Using the AttackCapture IOC search capability, the query returned a single result pointing directly to the unauthenticated server, which had been active for at least 24 days before the analysis.

Every analyzed script on the server was automatically classified as malicious, falling into two categories: Exploit, covering scripts that alter security settings and escalate privileges, and Config, covering scripts containing sensitive authentication tokens.

The AI-driven text file analysis flagged credential dumping routines, Defender disabling sequences, event log clearing, ngrok tunnel setup, and persistence mechanisms across multiple files.

Inside the Pre-Ransomware Deployment Script: z1.bat

The single most operationally revealing file in the entire directory is z1.bat, a 35-kilobyte batch script carrying the highest malware indicator count of any file on the server.

It consolidates nearly every pre-encryption preparation step into one execution, designed to run immediately before ransomware deployment when speed matters more than staying quiet.

The script opens by systematically deleting and disabling services tied to over a dozen security vendors, including Sophos, Kaspersky, Trend Micro, McAfee, ESET, Webroot, AVG, Malwarebytes, Panda, and Quick Heal.

It then extends that same stop-and-disable logic to enterprise applications including 30 or more Microsoft Exchange services, Oracle databases, MySQL, multiple Tomcat versions, Veeam backup infrastructure, and Hyper-V, all of which lock files that ransomware needs to reach.

Stopping these services ensures maximum encryption coverage across Exchange databases, SQL Server files, and backup vaults.

Beyond service termination, z1.bat performs a registry-wide purge targeting security product entries from nearly 20 vendors, spanning Kaspersky versions across nearly a decade of releases, the full McAfee product suite, and additional products including Bitdefender, COMODO, ESET, Avira, Norton, and Qihoo 360.

It also creates open SMB shares on every drive letter from C through K, granting full access to all users, allowing ransomware running on any compromised host to reach every shared drive across the network.

64_bit_new directory showing exploit and malware tag counts (Source - Hunt.io)
64_bit_new directory showing exploit and malware tag counts (Source – Hunt.io)

The script installs Image File Execution Options debugger redirects on Windows accessibility tools including sethc.exe, utilman.exe, Magnify.exe, and HelpPane.exe, replacing them with cmd[.]exe.

This is the classic Sticky Keys backdoor, allowing a SYSTEM-level command prompt to be opened directly from the Windows login screen.

Combined with enabling RDP, disabling Network Level Authentication, and setting UAC to off, this creates persistent access that survives the removal of every other remote access tool.

The script concludes by deleting all Volume Shadow Copies, wiping all Windows event log channels, clearing the Recycle Bin, and terminating all processes with a PID above 1000, effectively clearing the execution environment for ransomware launch.

MIMIMI directory with Mimikatz logs tagged as Victim artifacts (Source - Hunt.io)
MIMIMI directory with Mimikatz logs tagged as Victim artifacts (Source – Hunt.io)

Security teams should monitor for several behaviors tied directly to this toolkit. On the endpoint side, watch for PowerRun execution, mass Windows Defender service state changes, batch-based event log clearing using wevtutil, LSASS memory access consistent with Mimikatz, IFEO debugger modifications on accessibility binaries, WDigest registry changes, and bulk network share creation.

On the network side, block connections to 176.120.22[.]127 and monitor for ngrok tunnel activity toward ngrok infrastructure.

Alert on vssadmin.exe Delete Shadows execution, mass service disabling patterns, and EnableLUA registry modifications.

For configuration hardening, enable Credential Guard, maintain offline immutable backups, enable endpoint tamper protection, audit Group Policy Objects for unauthorized Defender changes, and implement application whitelisting in user-writable directories.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitMalwareransomwareSecurity

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

North Korean IT Worker Used Stolen ID & Allegedly Identity

Next Post

Claude AI Finds Zero-Day RCE Flaws in Vim Discovers Vulnerabilities

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
New Framework Connects APT Campaigns Across All Layers
May 5, 2026
WhatsApp Flaw Uses Instagram Reels for Malicious URL Execution
May 5, 2026
Instagram Ending Encrypted Direct Messages Encryption
May 5, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us