Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Gentlemen RaaS Targets Multiple OS with Advanced Ransomware

Gentlemen RaaS Targets Multiple OS with Advanced Ransomware

Posted on April 21, 2026 By CWS

A sophisticated cyber threat known as ‘The Gentlemen’ has emerged, posing significant risks to corporate networks worldwide. This ransomware-as-a-service (RaaS) operation began around mid-2025 and has quickly developed into a formidable criminal entity, claiming over 320 victims, with 240 attacks occurring in early 2026 alone.

Unique Cross-Platform Capabilities

The Gentlemen distinguishes itself by employing a variety of ransomware tools designed to attack several operating systems simultaneously. These tools include lockers written in Go that target Windows, Linux, NAS, and BSD environments, alongside a C-based locker specifically crafted for VMware ESXi hypervisors. This multi-platform approach allows affiliates to inflict widespread damage, affecting both traditional and virtualized infrastructures.

Operational Structure and Tactics

Functioning like a well-organized business, The Gentlemen recruits skilled affiliates through advertisements on underground forums. These affiliates gain access to tools that bypass endpoint detection and response (EDR) systems and utilize a private infrastructure for launching attacks. If ransom demands are unmet, victim data is exposed on a dark web site, with negotiations conducted via Tox, an encrypted messaging platform. The group also uses social media to apply pressure on victims.

Infection Strategy and Global Impact

Check Point Research identified the malware during an incident response, where SystemBC, a proxy malware, was deployed on a compromised system. Analysis revealed a botnet impacting over 1,570 victims globally, with the United States, United Kingdom, and Germany being the most affected. The attack strategy involves gaining domain admin privileges to deploy Cobalt Strike payloads and map the target environment.

The ransomware then propagates using domain credentials to execute across multiple systems using methods like PsExec, WMI, and PowerShell. Before executing the payload, Windows Defender is disabled, and firewalls and shadow copies are tampered with to prevent recovery and detection.

Preventive Measures and Recommendations

Organizations are advised to implement multi-factor authentication for all admin accounts and remote access points. Network segmentation can help limit the spread of an attack. Protecting Windows Defender and firewall settings from tampering is crucial, as is maintaining offline or isolated backups to prevent data loss. Security teams should vigilantly monitor for unusual activities such as the creation of scheduled tasks, lateral movement, and attempts to disable security features.

Stay informed by following us on Google News, LinkedIn, and X. Set CSN as your preferred source on Google for more updates.

Cyber Security News Tags:Check Point, Cobalt Strike, cyber security, Cyberattack, data protection, EDR tools, ESXi, Gentlemen RaaS, Linux, Malware, network security, Ransomware, SystemBC, Virtualization, Windows

Post navigation

Previous Post: Security Flaws in Perforce Servers Risk Sensitive Data
Next Post: Boosting MTTR: Key Strategies of Advanced SOCs

Related Posts

Adobe Fixes Critical Acrobat Reader Security Flaw Adobe Fixes Critical Acrobat Reader Security Flaw Cyber Security News
Critical Emby Server Vulnerability Let Attackers Gain Admin Access Critical Emby Server Vulnerability Let Attackers Gain Admin Access Cyber Security News
Tor Adopts Galois Onion Encryption to Strengthen Defense Against Online Attacks Tor Adopts Galois Onion Encryption to Strengthen Defense Against Online Attacks Cyber Security News
1inch Named Exclusive Swap Provider at Launch for Ledger Multisig 1inch Named Exclusive Swap Provider at Launch for Ledger Multisig Cyber Security News
Hackers Trick Users to Download Weaponized Microsoft Teams to Gain Remote Access Hackers Trick Users to Download Weaponized Microsoft Teams to Gain Remote Access Cyber Security News
Ransomware Attack Disrupts Washington Hotel Operations in Japan Ransomware Attack Disrupts Washington Hotel Operations in Japan Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Healthcare Data Breaches Impact 600,000 Individuals
  • New Vulnerabilities in Lantronix and Silex Serial-to-IP Converters
  • Enhancing SOC Maturity with Integrated Threat Intelligence
  • Malicious Crypto Apps Target iOS Users on App Store
  • Negotiator Admits Role in 2023 BlackCat Ransomware Scandal

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Healthcare Data Breaches Impact 600,000 Individuals
  • New Vulnerabilities in Lantronix and Silex Serial-to-IP Converters
  • Enhancing SOC Maturity with Integrated Threat Intelligence
  • Malicious Crypto Apps Target iOS Users on App Store
  • Negotiator Admits Role in 2023 BlackCat Ransomware Scandal

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark