Gentlemen Ransomware Hits Windows, Linux, NAS, Attacks ESXi
The Gentlemen, a ransomware group, has discreetly established one of the most aggressive cybercriminal operations seen in recent years. This sophisticated threat is notably versatile, capable of...
The Gentlemen, a ransomware group, has discreetly established one of the most aggressive cybercriminal operations seen in recent years. This sophisticated threat is notably versatile, capable of targeting a wide array of systems including Windows, Linux, NAS, BSD, and ESXi. A comprehensive analysis of their attack capabilities is detailed in a recent
The group has demonstrated capability against a wide range of enterprise environments, including Windows, Linux, NAS, BSD, and VMware ESXi systems.
Its attacks follow a well-organized workflow, from gaining initial access through stolen credentials or exposed remote services, to deploying ransomware across entire networks.
The group also steals data before locking systems, using that stolen information as additional lever to pressure victims into paying.
Analysts at LevelBlue said in a report shared with Cyber Security News (CSN) that The Gentlemen is not an entirely new operation.

It appears to be a continuation of prior ransomware affiliate activity tied to the Qilin ecosystem, reportedly managed by a Russian-speaking actor known as “hastalamuerte.”
This background gives the group a head start, with existing knowledge, affiliate networks, and operational experience already in place.
The Gentlemen Ransomware
By May 10, 2026, the group had publicly claimed 352 attacks in the incomplete first half of the year alone.
Leak site data shows victim disclosures spanning more than 70 countries, with APAC, Europe, Latin America, and North America all heavily represented.
Professional services, manufacturing, technology, and healthcare account for the largest share of known victims.
Dark web monitoring also uncovered an unverified intelligence lead involving someone offering data allegedly taken from The Gentlemen’s own internal systems for $10,000 in Bitcoin.
The offered material included what appeared to be actor handles, victim negotiation content, and file mapping data. While this cannot yet be confirmed as authentic, it adds an important layer to an already complex operation.
The Gentlemen ransomware is engineered to attack multiple operating systems in a single campaign.
The Windows version is built using the Go programming language and requires a password at execution, helping the group avoid early detection and sandbox analysis.
Encrypted files receive random six-character extensions, and affected systems are left with a ransom note named READMEGENTLEMEN.txt.

The encryption approach is designed to maximize damage as quickly as possible. Smaller files are fully encrypted, while larger files are only partially encrypted in chunks, allowing the ransomware to move through large environments faster while still making recovery extremely difficult without a decryptor.
Before locking files, the malware first stops services related to databases, backups, virtualization platforms, and remote access tools to prevent easy restoration.
Attacking ESXi and virtualization infrastructure is particularly damaging, as it can bring down entire server estates within minutes.
The group’s affiliate panel supports this model by allowing operators to generate custom payloads, manage victim negotiations, estimate ransom revenue, and handle stolen data uploads from a single structured backend.
Extortion Strategy and Defense Guidance
The Gentlemen’s attack model does not stop at file encryption. The group uses stolen data as a central part of its pressure strategy, threatening to publish sensitive files on its leak site if victims refuse to pay.
Even organizations that restore systems from backups can still face data exposure, regulatory consequences, and lasting reputational harm.
Security teams should start by reviewing all internet-facing infrastructure, particularly VPNs, firewalls, and remote access portals, and enforce multi-factor authentication on all privileged accounts.
Credentials exposed through prior breaches or stolen by information-stealing malware should be rotated immediately, and stale accounts should be disabled.
LevelBlue researchers recommend hunting for early-stage attack behaviors rather than waiting for ransomware to appear.
Key signals include unusual administrative logins, scanning tools like Nmap or Advanced IP Scanner, unexpected use of AnyDesk or WinSCP, and any signs of Group Policy modification or mass service shutdowns.
Backup systems and ESXi environments should be isolated from the main domain and tested regularly for restoration capability.
Indicators of Compromise (IoCs):-
| Type | Indicator | Description |
|---|---|---|
| IP Address | 91.107.247.163 | SystemBC C2 Server |
| IP Address | 45.86.230.112 | SystemBC C2 Server |
| SHA256 | 992c951f4af57ca7cd8396f5ed69c2199fd6fd4ae5e93726da3e198e78bec0a5 | The Gentlemen Windows ransomware |
| SHA256 | 025fc0976c548fb5a880c83ea3eb21a5f23c5d53c4e51e862bb893c11adf712a | The Gentlemen Windows ransomware |
| SHA256 | 22b38dad7da097ea03aa28d0614164cd25fafeb1383dbc15047e34c8050f6f67 | The Gentlemen Windows ransomware |
| SHA256 | 2ed9494e9b7b68415b4eb151c922c82c0191294d0aa443dd2cb5133e6bfe3d5d | The Gentlemen Windows ransomware |
| SHA256 | 3ab9575225e00a83a4ac2b534da5a710bdcf6eb72884944c437b5fbe5c5c9235 | The Gentlemen Windows ransomware |
| SHA256 | 48d9b2ce4fcd6854a3164ce395d7140014e0b58b77680623f3e4ca22d3a6e7fd | The Gentlemen Windows ransomware |
| SHA256 | 62c2c24937d67fdeb43f2c9690ab10e8bb90713af46945048db9a94a465ffcb8 | The Gentlemen Windows ransomware |
| SHA256 | 860a6177b055a2f5aa61470d17ec3c69da24f1cdf0a782237055cba431158923 | The Gentlemen Windows ransomware |
| SHA256 | 87d25d0e5880b3b5cd30106853cbfc6ef1ad38966b30d9bd5b99df46098e546c | The Gentlemen Windows ransomware |
| SHA256 | 8c87134c1b45e990e9568f0a3899b0076f94be16d3c40fa824ac1e6c6ee892db | The Gentlemen Windows ransomware |
| SHA256 | 91415e0b9fe4e7cbe43ec0558a7adf89423de30d22b00b985c2e4b97e75076b1 | The Gentlemen Windows ransomware |
| SHA256 | 994d6d1edb57f945f4284cc0163ec998861c7496d85f6d45c08657c9727186e3 | The Gentlemen Windows ransomware |
| SHA256 | 9f61ff4deb8afced8b1ecdc8787a134c63bde632b18293fbfc94a91749e3e454 | The Gentlemen Windows ransomware |
| SHA256 | a7a19cab7aab606f833fa8225bc94ec9570a6666660b02cc41a63fe39ea8b0ad | The Gentlemen Windows ransomware |
| SHA256 | b67958afc982cafbe1c3f114b444d7f4c91a88a3e7a86f89ab8795ac2110d1e6 | The Gentlemen Windows ransomware |
| SHA256 | c46b5a18ab3fb5fd1c5c8288a41c75bf0170c10b5e829af89370a12c86dd10f8 | The Gentlemen Windows ransomware |
| SHA256 | c7f7b5a6e7d93221344e6368c7ab4abf93e162f7567e1a7bcb8786cb8a183a73 | The Gentlemen Windows ransomware |
| SHA256 | ec368ae0b4369b6ef0da244774995c819c63cffb7fd2132379963b9c1640ccd2 | The Gentlemen Windows ransomware |
| SHA256 | efaf8e7422ffd09c7f03f1a5b4e5c2cc32b05334c18d1ccb9673667f8f43108f | The Gentlemen Windows ransomware |
| SHA256 | f736be55193c77af346dbe905e25f6a1dee3ec1aedca8989ad2088e4f6576b12 | The Gentlemen Windows ransomware |
| SHA256 | fc75ed2159e0c8274076e46a37671cfb8d677af9f586224da1713df89490a958 | The Gentlemen Windows ransomware |
| File Name | gentlemen.bmp | Ransomware wallpaper/artifact |
| SHA256 | fe1033335a045c696c900d435119d210361966e2fb5cd1ba3382608cfa2c8e68 | The Gentlemen Linux ransomware |
| SHA256 | 5dc607c8990841139768884b1b43e1403496d5a458788a1937be139594f01dca | Initial KillAV tool |
| SHA256 | 7a311b584497e8133cd85950fec6132904dd5b02388a9feed3f5e057fb891d09 | PowerRun utility |
| SHA256 | 4c82fbafef9bab484a2fbe23e4ec8aac06e8e296d6c9e496f4a589f97fd4ab71 | Additional tool |
Note: IP addresses and domains are intentionally defanged (e.g., [.]) to prevent accidental resolution or hyperlinking. Re-fang only within controlled threat intelligence platforms such as MISP, VirusTotal, or your SIEM.
Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.



No Comment! Be the first one.