Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
UAC-0184 Malware Chain Uses bitsadmin and HTA Files for Gated
May 19, 2026
macOS Malware Uses Fake Google Update for Persistence
May 19, 2026
Gentlemen Ransomware Hits Windows, Linux, NAS, Attacks ESXi
May 19, 2026
Home/Threats/Gentlemen Ransomware Hits Windows, Linux, NAS, Attacks ESXi
Threats

Gentlemen Ransomware Hits Windows, Linux, NAS, Attacks ESXi

The Gentlemen, a ransomware group, has discreetly established one of the most aggressive cybercriminal operations seen in recent years. This sophisticated threat is notably versatile, capable of...

Sarah simpson
Sarah simpson
May 19, 2026 4 Min Read
3 0

The Gentlemen, a ransomware group, has discreetly established one of the most aggressive cybercriminal operations seen in recent years. This sophisticated threat is notably versatile, capable of targeting a wide array of systems including Windows, Linux, NAS, BSD, and ESXi. A comprehensive analysis of their attack capabilities is detailed in a recent

The group has demonstrated capability against a wide range of enterprise environments, including Windows, Linux, NAS, BSD, and VMware ESXi systems.

Its attacks follow a well-organized workflow, from gaining initial access through stolen credentials or exposed remote services, to deploying ransomware across entire networks.

The group also steals data before locking systems, using that stolen information as additional lever to pressure victims into paying.

Analysts at LevelBlue said in a report shared with Cyber Security News (CSN) that The Gentlemen is not an entirely new operation.

The Gentlemen’s blog (Sourced - LevelBlue)
The Gentlemen’s blog (Sourced – LevelBlue)

It appears to be a continuation of prior ransomware affiliate activity tied to the Qilin ecosystem, reportedly managed by a Russian-speaking actor known as “hastalamuerte.”

This background gives the group a head start, with existing knowledge, affiliate networks, and operational experience already in place.

The Gentlemen Ransomware

By May 10, 2026, the group had publicly claimed 352 attacks in the incomplete first half of the year alone.

Leak site data shows victim disclosures spanning more than 70 countries, with APAC, Europe, Latin America, and North America all heavily represented.

Professional services, manufacturing, technology, and healthcare account for the largest share of known victims.

Dark web monitoring also uncovered an unverified intelligence lead involving someone offering data allegedly taken from The Gentlemen’s own internal systems for $10,000 in Bitcoin.

The offered material included what appeared to be actor handles, victim negotiation content, and file mapping data. While this cannot yet be confirmed as authentic, it adds an important layer to an already complex operation.

The Gentlemen ransomware is engineered to attack multiple operating systems in a single campaign.

The Windows version is built using the Go programming language and requires a password at execution, helping the group avoid early detection and sandbox analysis.

Encrypted files receive random six-character extensions, and affected systems are left with a ransom note named READMEGENTLEMEN.txt.

The Gentlemen's advertising banner, showing encryption launching
The Gentlemen’s advertising banner, showing encryption launching

The encryption approach is designed to maximize damage as quickly as possible. Smaller files are fully encrypted, while larger files are only partially encrypted in chunks, allowing the ransomware to move through large environments faster while still making recovery extremely difficult without a decryptor.

Before locking files, the malware first stops services related to databases, backups, virtualization platforms, and remote access tools to prevent easy restoration.

Attacking ESXi and virtualization infrastructure is particularly damaging, as it can bring down entire server estates within minutes.

The group’s affiliate panel supports this model by allowing operators to generate custom payloads, manage victim negotiations, estimate ransom revenue, and handle stolen data uploads from a single structured backend.

Extortion Strategy and Defense Guidance

The Gentlemen’s attack model does not stop at file encryption. The group uses stolen data as a central part of its pressure strategy, threatening to publish sensitive files on its leak site if victims refuse to pay.

Even organizations that restore systems from backups can still face data exposure, regulatory consequences, and lasting reputational harm.

Security teams should start by reviewing all internet-facing infrastructure, particularly VPNs, firewalls, and remote access portals, and enforce multi-factor authentication on all privileged accounts.

Credentials exposed through prior breaches or stolen by information-stealing malware should be rotated immediately, and stale accounts should be disabled.

LevelBlue researchers recommend hunting for early-stage attack behaviors rather than waiting for ransomware to appear.

Key signals include unusual administrative logins, scanning tools like Nmap or Advanced IP Scanner, unexpected use of AnyDesk or WinSCP, and any signs of Group Policy modification or mass service shutdowns.

Backup systems and ESXi environments should be isolated from the main domain and tested regularly for restoration capability.

Indicators of Compromise (IoCs):-

Type Indicator Description
IP Address 91.107.247.163 SystemBC C2 Server
IP Address 45.86.230.112 SystemBC C2 Server
SHA256 992c951f4af57ca7cd8396f5ed69c2199fd6fd4ae5e93726da3e198e78bec0a5 The Gentlemen Windows ransomware
SHA256 025fc0976c548fb5a880c83ea3eb21a5f23c5d53c4e51e862bb893c11adf712a The Gentlemen Windows ransomware
SHA256 22b38dad7da097ea03aa28d0614164cd25fafeb1383dbc15047e34c8050f6f67 The Gentlemen Windows ransomware
SHA256 2ed9494e9b7b68415b4eb151c922c82c0191294d0aa443dd2cb5133e6bfe3d5d The Gentlemen Windows ransomware
SHA256 3ab9575225e00a83a4ac2b534da5a710bdcf6eb72884944c437b5fbe5c5c9235 The Gentlemen Windows ransomware
SHA256 48d9b2ce4fcd6854a3164ce395d7140014e0b58b77680623f3e4ca22d3a6e7fd The Gentlemen Windows ransomware
SHA256 62c2c24937d67fdeb43f2c9690ab10e8bb90713af46945048db9a94a465ffcb8 The Gentlemen Windows ransomware
SHA256 860a6177b055a2f5aa61470d17ec3c69da24f1cdf0a782237055cba431158923 The Gentlemen Windows ransomware
SHA256 87d25d0e5880b3b5cd30106853cbfc6ef1ad38966b30d9bd5b99df46098e546c The Gentlemen Windows ransomware
SHA256 8c87134c1b45e990e9568f0a3899b0076f94be16d3c40fa824ac1e6c6ee892db The Gentlemen Windows ransomware
SHA256 91415e0b9fe4e7cbe43ec0558a7adf89423de30d22b00b985c2e4b97e75076b1 The Gentlemen Windows ransomware
SHA256 994d6d1edb57f945f4284cc0163ec998861c7496d85f6d45c08657c9727186e3 The Gentlemen Windows ransomware
SHA256 9f61ff4deb8afced8b1ecdc8787a134c63bde632b18293fbfc94a91749e3e454 The Gentlemen Windows ransomware
SHA256 a7a19cab7aab606f833fa8225bc94ec9570a6666660b02cc41a63fe39ea8b0ad The Gentlemen Windows ransomware
SHA256 b67958afc982cafbe1c3f114b444d7f4c91a88a3e7a86f89ab8795ac2110d1e6 The Gentlemen Windows ransomware
SHA256 c46b5a18ab3fb5fd1c5c8288a41c75bf0170c10b5e829af89370a12c86dd10f8 The Gentlemen Windows ransomware
SHA256 c7f7b5a6e7d93221344e6368c7ab4abf93e162f7567e1a7bcb8786cb8a183a73 The Gentlemen Windows ransomware
SHA256 ec368ae0b4369b6ef0da244774995c819c63cffb7fd2132379963b9c1640ccd2 The Gentlemen Windows ransomware
SHA256 efaf8e7422ffd09c7f03f1a5b4e5c2cc32b05334c18d1ccb9673667f8f43108f The Gentlemen Windows ransomware
SHA256 f736be55193c77af346dbe905e25f6a1dee3ec1aedca8989ad2088e4f6576b12 The Gentlemen Windows ransomware
SHA256 fc75ed2159e0c8274076e46a37671cfb8d677af9f586224da1713df89490a958 The Gentlemen Windows ransomware
File Name gentlemen.bmp Ransomware wallpaper/artifact
SHA256 fe1033335a045c696c900d435119d210361966e2fb5cd1ba3382608cfa2c8e68 The Gentlemen Linux ransomware
SHA256 5dc607c8990841139768884b1b43e1403496d5a458788a1937be139594f01dca Initial KillAV tool
SHA256 7a311b584497e8133cd85950fec6132904dd5b02388a9feed3f5e057fb891d09 PowerRun utility
SHA256 4c82fbafef9bab484a2fbe23e4ec8aac06e8e296d6c9e496f4a589f97fd4ab71 Additional tool

Note: IP addresses and domains are intentionally defanged (e.g., [.]) to prevent accidental resolution or hyperlinking. Re-fang only within controlled threat intelligence platforms such as MISP, VirusTotal, or your SIEM.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackBreachMalwareransomwareSecurityThreat

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

Kimsuky Hackers Use LNK and JSE Lures to Target Recruiters, Crypto

Next Post

macOS Malware Uses Fake Google Update for Persistence

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
DirtyDecrypt Linux Kernel PoC Exploit Code Vulnerability Released
May 19, 2026
Malware Campaign Delivers Crypto Clipper via JS, PS
May 19, 2026
Operation Ramz Seizes 53 Servers: Cyber Linked Scams
May 19, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us