Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Server Leak Uncovers TheGentlemen Ransomware Toolkit

Server Leak Uncovers TheGentlemen Ransomware Toolkit

Posted on March 30, 2026 By CWS

An improperly configured server on a Russian hosting platform has inadvertently disclosed the full operational toolkit of a TheGentlemen ransomware affiliate. This exposure includes victim credentials and authentication tokens used for establishing covert remote access tunnels.

Ransomware-as-a-Service Operations

TheGentlemen operates as a Ransomware-as-a-Service (RaaS), allowing affiliates to execute attacks with shared resources. This group has been identified in attacks targeting organizations in the Americas, Europe, and the Middle East. Their operations are known to affect systems running Windows, Linux, and ESXi environments.

The group’s attack strategy is notably rapid, with the interval between initial access and full encryption condensed into mere hours. The significance of this server exposure lies in its contents, which not only included operational tools but also evidence of their deployment against actual victims.

Details of the Exposed Server

The exposed server, located at IP address 176.120.22[.]127 and operating on port 80, was part of the Proton66 OOO infrastructure. This autonomous system has previously been associated with SuperBlack ransomware, WeaXor, and XWorm campaigns. The server’s directory contained 126 files across 18 subdirectories, amounting to approximately 140 MB of operational data.

Hunt.io analysts discovered this open directory on March 12, 2026, while examining indicators of compromise from a prior CyberXTron report on TheGentlemen ransomware. The server had been active for at least 24 days before being analyzed, revealing a range of malicious scripts aimed at exploiting and configuring systems.

Analysis of Malware Scripts

The scripts on the server were categorized as malicious, falling into two primary groups: Exploit scripts, which modify security settings and escalate privileges, and Config scripts, which contain sensitive authentication tokens. The AI-driven analysis flagged routine credential dumps, disabling of security defenses, and the establishment of persistence mechanisms.

Among these scripts, the z1.bat file stood out due to its comprehensive pre-encryption preparation steps, crucial for quick ransomware deployment. This script systematically disables services from numerous security vendors, ensuring that ransomware can encrypt files without hindrance.

Additionally, the script performs a registry purge targeting security entries and creates open SMB shares, facilitating network-wide access for ransomware. It also manipulates Windows accessibility tools to create persistent backdoors and deletes system restore points to clear the path for ransomware execution.

Security Recommendations

Security teams are advised to monitor for behaviors linked to this toolkit, such as changes in Windows Defender states, batch event log clearing, and unauthorized access to LSASS memory. Network monitoring should focus on blocking connections to the exposed IP and detecting ngrok tunnel activities.

To prevent similar attacks, organizations should enable Credential Guard, maintain offline backups, enforce endpoint tamper protection, and implement application whitelisting in user-accessible directories. Regular audits of Group Policy Objects for unauthorized changes are also recommended.

Stay updated with the latest cybersecurity news by following us on Google News, LinkedIn, and X. Set CSN as your preferred source on Google for more instant updates.

Cyber Security News Tags:cyber attack, Cybersecurity, data breach, Hacking, IT security, Malware, Ransomware, security tools, server leak, TheGentlemen

Post navigation

Previous Post: Iran’s Digital Warfare Tactics: A Comprehensive Analysis
Next Post: DeepLoad Malware Exploits ClickFix for Credential Theft

Related Posts

New ZipLine Campaign Attacks Critical Manufacturing Companies to Deploy In-memory Malware MixShell New ZipLine Campaign Attacks Critical Manufacturing Companies to Deploy In-memory Malware MixShell Cyber Security News
PyPI Released Advisory to Prevent ZIP Parser Confusion Attacks on Python Package Installers PyPI Released Advisory to Prevent ZIP Parser Confusion Attacks on Python Package Installers Cyber Security News
CISA Warns of Cisco IOS and IOS XE SNMP Vulnerabilities Exploited in Attacks CISA Warns of Cisco IOS and IOS XE SNMP Vulnerabilities Exploited in Attacks Cyber Security News
New MCPoison Attack Leverages Cursor IDE MCP Validation to Execute Arbitrary System Commands New MCPoison Attack Leverages Cursor IDE MCP Validation to Execute Arbitrary System Commands Cyber Security News
OpenAI Introduces AI Safety Bug Bounty Program OpenAI Introduces AI Safety Bug Bounty Program Cyber Security News
PoC Released for Linux Privilege Escalation Vulnerability via udisksd and libblockdev PoC Released for Linux Privilege Escalation Vulnerability via udisksd and libblockdev Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rundll32 and WebDAV: New ClickFix Variant Evades Detection
  • OpenAI Resolves ChatGPT Data Breach and Codex Vulnerability
  • Top AWS Monitoring Tools for Optimal Cloud Performance
  • North Korean IT Operative’s Elaborate Job Scam Exposed
  • DeepLoad Malware Exploits ClickFix for Credential Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rundll32 and WebDAV: New ClickFix Variant Evades Detection
  • OpenAI Resolves ChatGPT Data Breach and Codex Vulnerability
  • Top AWS Monitoring Tools for Optimal Cloud Performance
  • North Korean IT Operative’s Elaborate Job Scam Exposed
  • DeepLoad Malware Exploits ClickFix for Credential Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark