Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Gentlemen RaaS Targets Multiple OS with Advanced Ransomware

Gentlemen RaaS Targets Multiple OS with Advanced Ransomware

Posted on April 21, 2026 By CWS

A sophisticated cyber threat known as ‘The Gentlemen’ has emerged, posing significant risks to corporate networks worldwide. This ransomware-as-a-service (RaaS) operation began around mid-2025 and has quickly developed into a formidable criminal entity, claiming over 320 victims, with 240 attacks occurring in early 2026 alone.

Unique Cross-Platform Capabilities

The Gentlemen distinguishes itself by employing a variety of ransomware tools designed to attack several operating systems simultaneously. These tools include lockers written in Go that target Windows, Linux, NAS, and BSD environments, alongside a C-based locker specifically crafted for VMware ESXi hypervisors. This multi-platform approach allows affiliates to inflict widespread damage, affecting both traditional and virtualized infrastructures.

Operational Structure and Tactics

Functioning like a well-organized business, The Gentlemen recruits skilled affiliates through advertisements on underground forums. These affiliates gain access to tools that bypass endpoint detection and response (EDR) systems and utilize a private infrastructure for launching attacks. If ransom demands are unmet, victim data is exposed on a dark web site, with negotiations conducted via Tox, an encrypted messaging platform. The group also uses social media to apply pressure on victims.

Infection Strategy and Global Impact

Check Point Research identified the malware during an incident response, where SystemBC, a proxy malware, was deployed on a compromised system. Analysis revealed a botnet impacting over 1,570 victims globally, with the United States, United Kingdom, and Germany being the most affected. The attack strategy involves gaining domain admin privileges to deploy Cobalt Strike payloads and map the target environment.

The ransomware then propagates using domain credentials to execute across multiple systems using methods like PsExec, WMI, and PowerShell. Before executing the payload, Windows Defender is disabled, and firewalls and shadow copies are tampered with to prevent recovery and detection.

Preventive Measures and Recommendations

Organizations are advised to implement multi-factor authentication for all admin accounts and remote access points. Network segmentation can help limit the spread of an attack. Protecting Windows Defender and firewall settings from tampering is crucial, as is maintaining offline or isolated backups to prevent data loss. Security teams should vigilantly monitor for unusual activities such as the creation of scheduled tasks, lateral movement, and attempts to disable security features.

Stay informed by following us on Google News, LinkedIn, and X. Set CSN as your preferred source on Google for more updates.

Cyber Security News Tags:Check Point, Cobalt Strike, cyber security, Cyberattack, data protection, EDR tools, ESXi, Gentlemen RaaS, Linux, Malware, network security, Ransomware, SystemBC, Virtualization, Windows

Post navigation

Previous Post: Security Flaws in Perforce Servers Risk Sensitive Data
Next Post: Boosting MTTR: Key Strategies of Advanced SOCs

Related Posts

Apache Syncope Vulnerability Allows Attacker to Access Internal Database Content Apache Syncope Vulnerability Allows Attacker to Access Internal Database Content Cyber Security News
TARmageddon Vulnerability In Rust Library Let Attackers Replace Config Files And Execute Remote Codes TARmageddon Vulnerability In Rust Library Let Attackers Replace Config Files And Execute Remote Codes Cyber Security News
IRGC Hacker Groups Attacking Targeted Financial, Government, and Media Organizations IRGC Hacker Groups Attacking Targeted Financial, Government, and Media Organizations Cyber Security News
Hackers Can Bypass OpenAI Guardrails Framework Using a Simple Prompt Injection Technique Hackers Can Bypass OpenAI Guardrails Framework Using a Simple Prompt Injection Technique Cyber Security News
Red Hat Openshift AI Service Vulnerability Allow Attackers to Take Control of the Infrastructure Red Hat Openshift AI Service Vulnerability Allow Attackers to Take Control of the Infrastructure Cyber Security News
World’s Largest Hacking Forum BreachForums Creator Sentenced to Three Years in Prison World’s Largest Hacking Forum BreachForums Creator Sentenced to Three Years in Prison Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • US Cybersecurity Worker Admits Role in Ransomware Scams
  • Google Fixes Antigravity IDE Vulnerability Allowing Code Execution
  • Phishing Alert: GitHub Notifications Misused by Hackers
  • Progress Releases Vital Patches for MOVEit and LoadMaster
  • Boosting MTTR: Key Strategies of Advanced SOCs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • US Cybersecurity Worker Admits Role in Ransomware Scams
  • Google Fixes Antigravity IDE Vulnerability Allowing Code Execution
  • Phishing Alert: GitHub Notifications Misused by Hackers
  • Progress Releases Vital Patches for MOVEit and LoadMaster
  • Boosting MTTR: Key Strategies of Advanced SOCs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark