Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Critical NGINX Vulnerability Allows Remote Code Execution –
May 14, 2026
Critical MongoDB Flaw Allows Arbitrary Code Execution
May 14, 2026
Gentlemen RaaS Exploits Fortinet & Leverages Cisco
May 14, 2026
Home/Threats/Gentlemen RaaS Exploits Fortinet & Leverages Cisco
Threats

Gentlemen RaaS Exploits Fortinet & Leverages Cisco

The Gentlemen, a ransomware-as-a-service (RaaS) operation that emerged in mid-2025, has rapidly established itself as a highly active threat. In just the first five months of 2026, the group claimed...

David kimber
David kimber
May 14, 2026 4 Min Read
1 0

The Gentlemen, a ransomware-as-a-service (RaaS) operation that emerged in mid-2025, has rapidly established itself as a highly active threat. In just the first five months of 2026, the group claimed approximately 332 published victims, quickly becoming one of the world’s most prolific ransomware programs. Its methods, including leveraging Fortinet and Cisco edge devices for initial access, are detailed in

Analysts from Check Point Research have been closely tracking The Gentlemen and recently obtained a rare look inside the group’s inner workings after an internal database leak surfaced on underground forums.

On May 4, 2026, the group’s administrator publicly acknowledged that their backend system, known internally as “Rocket,” had been compromised and that sensitive operational data had been exposed.

Zeta88 advertising The Gentlemen’s RaaS (Source - Check Point)
Zeta88 advertising The Gentlemen’s RaaS (Source – Check Point)

The leaked material included internal chat logs from channels named INFO, general, TOOLS, and PODBOR. These conversations gave researchers an end-to-end view of how the group runs its campaigns, from initial access and reconnaissance all the way through ransom negotiations and payouts.

Targeting Fortinet and Cisco Edge Devices

In one documented case, the group negotiated a final ransom payment of 190,000 USD after starting with an initial demand of 250,000 USD.

What makes The Gentlemen particularly dangerous is how tightly organized they are despite being affiliate-based. The leak identified nine named accounts working together in a coordinated way, with the administrator, known as zeta88 or hastalamuerte, personally involved in carrying out attacks alongside managing the overall program.

RaaS admin in underground forum (Source - Check Point)
RaaS admin in underground forum (Source – Check Point)

The group’s preferred method for breaking into a target’s network starts at the perimeter. Their main focus is on exposed edge devices such as Fortinet FortiGate VPN appliances and Cisco systems, which are commonly found at the entry points of corporate networks. Once they find a vulnerable or misconfigured device, they use it as a gateway inside.

To gain that initial foothold, the group combines several approaches. They brute-force login panels, exploit known security flaws, and purchase ready-made access from underground brokers.

Three vulnerabilities they actively track include CVE-2024-55591, affecting the FortiOS management interface, CVE-2025-32433, an Erlang SSH flaw relevant in Cisco environments, and CVE-2025-33073, tied to NTLM relay attacks.

Full leaked data screenshot (Source - Check Point)
Full leaked data screenshot (Source – Check Point)

One key operator known as qbit was specifically observed scanning for Fortinet VPNs and running NTLM relay checks using a tool called RelayKing.

After getting a foothold, the group pivots deeper into the network. They perform Active Directory reconnaissance, escalate privileges, and disable security tools using purpose-built evasion kits.

They also use cloud-based tunneling through services like Cloudflare to maintain reliable, long-term access without being detected. Only once the network is firmly in their control do they deploy their custom ransomware locker and begin encrypting systems.

A Sophisticated Double-Extortion Playbook

The Gentlemen do not stop at encryption. They exfiltrate data before deploying their locker and use it as leverage in negotiations. In a notable case from April 2026, the group breached a software consultancy in the United Kingdom, stole sensitive client data, and then reused that same data weeks later to assist an attack against a company in Turkey, where they had also gained initial access through a vulnerable VPN appliance.

Negotiation playbook (Source - Check Point)
Negotiation playbook (Source – Check Point)

In the Turkish operation, the group published the UK consultancy as the supposed “access broker” on their data leak site, creating pressure on both victims simultaneously.

This tactic, where earlier victims are weaponized against future ones, signals a notable shift in how ransomware groups think about stolen data. Ransom demand letters drafted by zeta88 also emphasized regulatory exposure and reputational damage to push victims into paying faster.

For defenders, the patterns seen in this campaign highlight clear areas that need attention. Organizations should prioritize patching internet-facing systems, particularly VPN appliances and firewalls.

Monitoring for NTLM relay activity, hardening Active Directory configurations, and ensuring that EDR solutions are tamper-resistant are all meaningful steps that can reduce exposure to groups operating with this level of sophistication.

Indicators of Compromise (IoCs):-

Type Indicator Description
SHA-256 025fc0976c548fb5a880c83ea3eb21a5f23c5d53c4e51e862bb893c11adf712a The Gentlemen Windows Ransomware
SHA-256 1334f0189a8e6dbc48456fa4b482c5726ab7609f7fa652fcc4c1a96f2334436f The Gentlemen Windows Ransomware
SHA-256 1af419b36a5edefef387409e2b3248c9223f7dc49a4f7b15ea095d371c3a70b2 The Gentlemen Windows Ransomware
SHA-256 22b38dad7da097ea03aa28d0614164cd25fafeb1383dbc15047e34c8050f6f67 The Gentlemen Windows Ransomware
SHA-256 24ac3588fb8cfbff63b7fdfcbc7dec1f3c60e54e6f949dd69d68e89e0c89d966 The Gentlemen Windows Ransomware
SHA-256 2ed9494e9b7b68415b4eb151c922c82c0191294d0aa443dd2cb5133e6bfe3d5d The Gentlemen Windows Ransomware
SHA-256 3ab9575225e00a83a4ac2b534da5a710bdcf6eb72884944c437b5fbe5c5c9235 The Gentlemen Windows Ransomware
SHA-256 3c2182cb0bc7528829ef03f1b1745a92bcc47d917eb8870862488f21fdf1a6d6 The Gentlemen Windows Ransomware
SHA-256 48d9b2ce4fcd6854a3164ce395d7140014e0b58b77680623f3e4ca22d3a6e7fd The Gentlemen Windows Ransomware
SHA-256 4a175eed927c0a477eafb8aa35a93c191748acaa781 The Gentlemen Windows Ransomware
SHA-256 ac7aecd8ea3c4cd868887c51b9f246d6da856311 The Gentlemen Windows Ransomware
SHA-256 31fcd1fabf0a67937d4bdde33625a44f7ee6a3a7baebd262c2c24937d67fdeb4 The Gentlemen Windows Ransomware
SHA-256 3f2c9690ab10e8bb90713af46945048db9a94a465ffcb86a3ab9e984a759d55a The Gentlemen Windows Ransomware
SHA-256 f4e84487d1fc44683065cc9a1089d5aa4ad1c0e4e84a63860a6177b055a2f5aa The Gentlemen Windows Ransomware
SHA-256 61470d17ec3c69da24f1cdf0a782237055cba43115892387d25d0e5880b3b5cd The Gentlemen Windows Ransomware
SHA-256 30106853cbfc6ef1ad38966b30d9bd5b99df46098e546c8aa0cb69ca2777001e The Gentlemen Windows Ransomware
SHA-256 0f4ba0eaab0841592710e4cc5ccd6b0b526d78bbd8bfba8c87134c1b45e990e9 The Gentlemen Windows Ransomware
SHA-256 568f0a3899b0076f94be16d3c40fa824ac1e6c6ee892db91415e0b9fe4e7cbe4 The Gentlemen Windows Ransomware
SHA-256 3ec0558a7adf89423de30d22b00b985c2e4b97e75076b1994d6d1edb57f945f4 The Gentlemen Windows Ransomware
SHA-256 284cc0163ec998861c7496d85f6d45c08657c9727186e39f61ff4deb8afced8b The Gentlemen Windows Ransomware
SHA-256 1ecdc8787a134c63bde632b18293fbfc94a91749e3e454a7a19cab7aab606f83 The Gentlemen Windows Ransomware
SHA-256 3fa8225bc94ec9570a6666660b02cc41a63fe39ea8b0adb67958afc982cafbe1 The Gentlemen Windows Ransomware
SHA-256 c3f114b444d7f4c91a88a3e7a86f89ab8795ac2110d1e6c46b5a18ab3fb5fd1c The Gentlemen Windows Ransomware
SHA-256 5c8288a41c75bf0170c10b5e829af89370a12c86dd10f8c7f7b5a6e7d9322134 The Gentlemen Windows Ransomware
SHA-256 4e6368c7ab4abf93e162f7567e1a7bcb8786cb8a183a73dce2e5cc00eff2493f The Gentlemen Windows Ransomware
SHA-256 8ced546dc51f9d5ef78c5ee56805906ec642dfa77a1c70dfe696ff713318c53f The Gentlemen Windows Ransomware
SHA-256 b17731bd4a6585a02c085b590149b19847990b324a0be6ec368ae0b4369b6ef0 The Gentlemen Windows Ransomware
SHA-256 da244774995c819c63cffb7fd2132379963b9c1640ccd2efaf8e7422ffd09c7f The Gentlemen Windows Ransomware
SHA-256 03f1a5b4e5c2cc32b05334c18d1ccb9673667f8f43108ff736be55193c77af34 The Gentlemen Windows Ransomware
SHA-256 6dbe905e25f6a1dee3ec1aedca8989ad2088e4f6576b12 The Gentlemen Windows Ransomware
SHA-256 fc75ed2159e0c8274076e46a37671cfb8d677af9f586224da1713df89490a958 The Gentlemen Windows Ransomware
SHA-256 1eece1e1ba4b96e6c784729f0608ad2939cfb67bc4236dfababbe1d09268960c The Gentlemen Linux Ransomware
SHA-256 5dc607c8990841139768884b1b43e1403496d5a458788a1937be139594f01dca The Gentlemen Linux Ransomware
SHA-256 788ba200f776a188c248d6c2029f00b5d34be45d4444f7cb89ffe838c39b8b19 The Gentlemen Linux Ransomware
TOX ID F8E24C7F5B12CD69C44C73F438F65E9BF560ADF35EBBDF92CF9A9B84079F8F04060FF98D098E RaaS Administrator (zeta88 / hastalamuerte)
TOX ID 15CE8D5DB0BAC3BCBB1FA69F2E672CC54EFBEC7684DA792F3CBF8B007A9FEA1D1637456 Affiliate TOX ID
TOX ID 2F1A9C8B8AA163BBB84FF799A0954B232C279C5E9EE42505955288EAAD28685A2BC0713 Affiliate TOX ID
TOX ID 88984846080D639C9A4EC394E53BA616D550B2B3AD691942EA2CCD33AA5B9340FD1A8FF Affiliate TOX ID
TOX ID 98C132E2B20B531BE6604397D97040C1E9EB42FCE12EDF119BCE8B4031CA5C70DAF5E65 Affiliate TOX ID (most active)
TOX ID D2CBA43A1AF6D965432AE11487726DB84D2945CF2CD975D7774B76B54AF052418AC2E59 Affiliate TOX ID
TOX ID D527959A7BC728CB272A0DB683B547F079C98012201A48DD2792B84604E8BC29F6E6BDB Affiliate TOX ID
TOX ID F96C481CBB0D6E7BDA49C6D68CFDB1D284354961534EDEEDA854C672B48A8D6B7146F90 Affiliate TOX ID
TOX ID 7862AE03A73AAC2994A61DF1F635347F2D1731A77CACC155594C6B681D201F7AD6817AD3AB0A Account n7778 selling leaked RaaS data
File Name README-GENTLEMEN.txt Ransomware ransom note file
File Name gentlemen.bmp Ransomware wallpaper file
File Name gentlemen_system Ransomware internal system identifier
CVE CVE-2024-55591 FortiOS management interface vulnerability
CVE CVE-2025-32433 Erlang SSH vulnerability (Cisco context)
CVE CVE-2025-33073 NTLM reflection / relay vulnerability

Note: IP addresses and domains are intentionally defanged (e.g., [.]) to prevent accidental resolution or hyperlinking. Re-fang only within controlled threat intelligence platforms such as MISP, VirusTotal, or your SIEM.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackBreachCVEExploitPatchransomwareSecurityThreatVulnerability

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

Windows BitLocker 0-Day Allows Vulnerability Enables

Next Post

Critical MongoDB Flaw Allows Arbitrary Code Execution

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Fragnesia Linux Vulnerability Let Attackers Gain Root Privileges
May 13, 2026
Foxconn Confirms Cyberattack by Nitrogen Ransomware Gang
May 13, 2026
ClickFix Integrates Old Open-Source Python S Evolves SOCKS5
May 13, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us