Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Claude Code RCE Flaw: Execute Commands Lets Attackers
May 18, 2026
Grafana Labs Security Breach: Hackers Accessed GitHub Code
May 17, 2026
First Public macOS M5 Kernel Exploit Developed Apple Prepared
May 17, 2026
Home/Threats/Gentlemen RaaS Attacks Windows, Linux, ESXi with Attacking
Threats

Gentlemen RaaS Attacks Windows, Linux, ESXi with Attacking

A new ransomware-as-a-service (RaaS) operation, dubbed “The Gentlemen,” has emerged as a significant threat to corporate networks, demonstrating cross-platform capabilities. This...

David kimber
David kimber
April 21, 2026 4 Min Read
7 0

A new ransomware-as-a-service (RaaS) operation, dubbed “The Gentlemen,” has emerged as a significant threat to corporate networks, demonstrating cross-platform capabilities. This sophisticated RaaS targets Windows, Linux, and ESXi environments, utilizing distinct lockers for each. Notably, it employs an additional locker written in C specifically designed for ESXi systems, as detailed in <

Since appearing around mid-2025, this group has rapidly grown into a well-organized criminal platform, publicly claiming over 320 victims, with most attacks — more than 240 — recorded in the opening months of 2026.

The speed at which this group expanded points to strong affiliate recruitment and a technically capable leadership team.

What makes The Gentlemen stand out is its wide range of ransomware tools built to attack multiple operating systems at once.

The group offers lockers written in the Go programming language that work across Windows, Linux, NAS, and BSD environments, along with a separate locker written in C specifically designed to target VMware ESXi hypervisors.

This cross-platform capability allows affiliates to cause maximum damage in a single campaign, hitting both traditional endpoints and the virtualization infrastructure that many organizations depend on.

The operation runs like a structured business. Operators advertise on underground forums, recruiting technically skilled actors as affiliates.

The Gentlemen post on underground forums (Source - Check Point)
The Gentlemen post on underground forums (Source – Check Point)

Verified partners receive access to EDR-killing tools and a private pivot infrastructure. Victim data is published on a dark web leak site if the ransom goes unpaid, while negotiations happen privately through Tox, a peer-to-peer encrypted messaging protocol.

The group also runs an active Twitter/X account, referenced in the ransom note, where they name victims publicly to increase payment pressure.

The Gentlemen RaaS X - Twitter account (Source - Check Point)
The Gentlemen RaaS X – Twitter account (Source – Check Point)

Check Point Research analysts identified the malware during an active incident response engagement, where an affiliate deployed SystemBC, a proxy malware, on a compromised host.

Top 15 infected countries (Source - Check Point)
Top 15 infected countries (Source – Check Point)

Analysts observed telemetry from the SystemBC command-and-control server, uncovering a botnet of over 1,570 victims globally, with the United States accounting for the majority, followed by the United Kingdom and Germany.

The victim profile strongly suggests deliberate targeting of organizations rather than individuals.

Infection Mechanism and Lateral Movement

The intrusion flow observed by Check Point reveals a carefully staged attack. The earliest confirmed activity showed the attacker already on a Domain Controller with Domain Admin privileges.

A high-level timeline of the attack (Source - Check Point)
A high-level timeline of the attack (Source – Check Point)

From there, Cobalt Strike payloads were pushed to remote systems through administrative shares using random-named executables.

Initial commands including systeminfo, whoami, and directory listings confirmed that the attacker was methodically mapping the environment before expanding further.

To move laterally, the ransomware uses a built-in spread argument that accepts domain credentials harvested during the intrusion.

Once active, it enumerates all domain computers through Active Directory, pings each host to confirm reachability, then delivers the ransomware binary through six parallel channels: PsExec, WMI, remote scheduled tasks, remote services, and PowerShell-based execution methods.

Before running the locker on each target, the attacker disables Windows Defender, adds broad path exclusions for the entire C: drive, shuts down the firewall, and re-enables SMB1.

Shadow copies are deleted to prevent file recovery, and event logs are wiped to remove forensic evidence.

For final deployment, the group abuses Group Policy Objects to push the ransomware to every domain-joined machine at once. The ESXi locker shuts down all virtual machines first, releasing locks on virtual disk files before encryption begins.

It then copies itself to /bin/.vmware-authd to mimic a legitimate VMware daemon for persistence.

Organizations should enforce multi-factor authentication on all administrative accounts and remote access endpoints. Network segmentation should limit the reach of any attacker gaining domain-level access.

Windows Defender and firewall policies must be protected through tamper-resistant configurations. Backup systems should remain offline or isolated, since the ransomware actively terminates backup-related services.

Security teams should also monitor for unusual scheduled task creation, lateral movement through admin shares, and PowerShell commands that attempt to disable real-time monitoring or modify LSA registry settings.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackMalwareransomwareSecurityThreat

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

AI Exploitation Collapses Patch Window for Defenders

Next Post

Hackers Exploit FortiGate SSL VPN with Nightmare-Eclipse Tools

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Malicious JPEG Images Exploit PHP Memory Safety Could Trigger
May 16, 2026
Critical Linux Kernel Flaw: Read SSH Keys & Passwords
May 16, 2026
Google Project Zero Reveals Pixel 10 Zero- Discloses Zero-Click
May 16, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us