Skip to content
.ca
7 mincritical

Thus Spoke…The Gentlemen

A recent leak of internal communications and backend data from 'The Gentlemen' RaaS operation has revealed the group's highly structured operational model and mature toolset. The threat actors actively exploit edge appliances and NTLM relay vulnerabilities for initial access, followed by extensive use of red-team tools and custom EDR evasion techniques to deploy their cross-platform ransomware.

Sens:ImmediateConf:highAnalyzed:2026-05-13Google

Authors: Check Point Research

ActorsThe Gentlemenzeta88hastalamuerteqbitquantProtagor

Source:Check Point

IOCs · 39

Detection / HunterGoogle

What Happened

In May 2026, internal chats and data from a major ransomware group known as 'The Gentlemen' were leaked online. This leak exposed how the group operates, showing that they target internet-facing devices like VPNs to break into corporate networks. Once inside, they use advanced tools to bypass security software, steal sensitive data, and deploy ransomware. This matters because it gives defenders a rare, detailed look at the exact methods and tools a top-tier ransomware group uses. Organizations should urgently update their internet-facing systems, monitor for unusual network activity, and review their security logs for the specific tools mentioned.

Key Takeaways

  • The Gentlemen RaaS internal database ('Rocket') and chats were leaked, exposing 9 core accounts and operational details.
  • The group actively exploits edge devices (Fortinet, Cisco) and tracks modern vulnerabilities like CVE-2024-55591, CVE-2025-32433, and CVE-2025-33073.
  • Affiliates utilize a mature toolset including NetExec, RelayKing, Cloudflare tunnels, and custom EDR evasion tools (gfreeze, glinker).
  • The group leverages stolen data from previous breaches to enrich and extort new victims, demonstrating a sophisticated dual-pressure tactic.
  • The RaaS administrator (zeta88/hastalamuerte) actively participates in intrusions and manages a 90/10 profit-sharing model.

Affected Systems

  • Fortinet FortiGate appliances
  • Cisco edge devices
  • Active Directory environments
  • ESXi virtualization infrastructure
  • Windows endpoints

Vulnerabilities (CVEs)

  • CVE-2024-55591
  • CVE-2025-32433
  • CVE-2025-33073

Attack Chain

The Gentlemen RaaS gains initial access by exploiting exposed edge devices (e.g., Fortinet, Cisco) or purchasing access from brokers. They perform internal reconnaissance and privilege escalation using tools like NetExec, RelayKing, and PrivHound, often abusing ADCS and NTLM relay vulnerabilities. The group establishes persistence via Cloudflare tunnels and custom VPNs while disabling EDR solutions using BYOVD and ETW patching techniques. Finally, they exfiltrate data to NAS devices and deploy their custom Go-based ransomware locker across Windows and ESXi environments.

Detection Availability

  • YARA Rules: Yes
  • Sigma Rules: No
  • Snort/Suricata Rules: No
  • KQL Queries: No
  • Splunk SPL Queries: No
  • EQL Queries: No
  • Other Detection Logic: No
  • Platforms: Check Point Research

The article provides a YARA rule designed to detect The Gentlemen Ransomware written in Go.

Detection Engineering Assessment

EDR Visibility: Medium — The group heavily utilizes custom EDR evasion tools (gfreeze, glinker), NTDLL unhooking, and ETW patching, which may blind EDR sensors during the later stages of the attack. Network Visibility: Medium — Initial access via edge device exploitation and NTLM relaying can be detected, but the use of Cloudflare tunnels and custom VPNs encrypts C2 traffic. Detection Difficulty: Hard — The actors use legitimate red-team tools (NetExec, Velociraptor) and actively patch ETW/unhook NTDLL, making behavioral detection challenging.

Required Log Sources

  • Windows Event Logs (Security, System)
  • Firewall/VPN Logs
  • Active Directory Logs
  • EDR Telemetry

Hunting Hypotheses

HypothesisTelemetryATT&CK StageFP Risk
Consider hunting for unusual outbound connections to Cloudflare infrastructure originating from internal servers, which may indicate unauthorized tunneling (T1090.006).Firewall/Proxy Logs, EDR Network EventsCommand and ControlMedium
If you have visibility into Active Directory, monitor for anomalous certificate requests or ADCS misconfiguration exploitation patterns (T1649).Active Directory Logs, Windows Event ID 4887Credential AccessLow
Consider hunting for the execution of known red-team tools like NetExec or RelayKing by analyzing command-line arguments and process ancestry.EDR Process Execution Logs, Windows Event ID 4688Execution / Lateral MovementLow

Control Gaps

  • Exposed management interfaces on edge devices
  • Unpatched NTLM relay vulnerabilities
  • Lack of ETW tampering detection

Key Behavioral Indicators

  • Presence of 'buildx641' custom log parser
  • Usage of 'gogo.exe' for port scanning
  • Execution of 'EDRStartupHinder' or similar EDR blocking tools
  • TOX IDs used in ransom notes or communication (e.g., F8E24C7F5B12CD69C44C73F438F65E9BF560ADF35EBBDF92CF9A9B84079F8F04060FF98D098E)

False Positive Assessment

  • Low

Recommendations

Immediate Mitigation

  • Verify against your organization's incident response runbook and team escalation paths before acting.
  • Ensure all Fortinet and Cisco edge appliances are patched against known vulnerabilities (e.g., CVE-2024-55591, CVE-2025-32433).
  • Restrict access to management interfaces of internet-facing devices to trusted IP addresses only.

Infrastructure Hardening

  • Implement mitigations against NTLM relay attacks, such as enforcing SMB signing and LDAP channel binding.
  • Audit Active Directory Certificate Services (ADCS) for misconfigurations that could allow privilege escalation.
  • Block unauthorized use of tunneling services like Cloudflare Zero Trust or ngrok at the network perimeter.

User Protection

  • Enforce multi-factor authentication (MFA) on all VPNs and external-facing portals.
  • Monitor for and block the execution of unauthorized red-team tools and credential dumpers.

Security Awareness

  • Train incident response teams on the dual-pressure extortion tactics used by modern RaaS groups.
  • Educate administrators on the risks of storing sensitive credentials in easily accessible network shares or collaboration tools.

MITRE ATT&CK Mapping

  • T1190 - Exploit Public-Facing Application
  • T1078 - Valid Accounts
  • T1557.001 - LLMNR/NBT-NS Poisoning and SMB Relay
  • T1562.001 - Disable or Modify Tools
  • T1090.006 - Use Alternate Communications Routing
  • T1649 - Steal or Forge Authentication Certificates
  • T1486 - Data Encrypted for Impact

Additional IOCs

  • File Hashes:
    • 1334f0189a8e6dbc48456fa4b482c5726ab7609f7fa652fcc4c1a96f2334436f (sha256) - The Gentlemen Windows ransomware payload
    • 1af419b36a5edefef387409e2b3248c9223f7dc49a4f7b15ea095d371c3a70b2 (sha256) - The Gentlemen Windows ransomware payload
    • 22b38dad7da097ea03aa28d0614164cd25fafeb1383dbc15047e34c8050f6f67 (sha256) - The Gentlemen Windows ransomware payload
    • 24ac3588fb8cfbff63b7fdfcbc7dec1f3c60e54e6f949dd69d68e89e0c89d966 (sha256) - The Gentlemen Windows ransomware payload
    • 2ed9494e9b7b68415b4eb151c922c82c0191294d0aa443dd2cb5133e6bfe3d5d (sha256) - The Gentlemen Windows ransomware payload
    • 3ab9575225e00a83a4ac2b534da5a710bdcf6eb72884944c437b5fbe5c5c9235 (sha256) - The Gentlemen Windows ransomware payload
    • 3c2182cb0bc7528829ef03f1b1745a92bcc47d917eb8870862488f21fdf1a6d6 (sha256) - The Gentlemen Windows ransomware payload
    • 48d9b2ce4fcd6854a3164ce395d7140014e0b58b77680623f3e4ca22d3a6e7fd (sha256) - The Gentlemen Windows ransomware payload
    • 4a175eed927c0a477eafb8aa35a93c191748acaa78ac7aecd8ea3c4cd868887c (sha256) - The Gentlemen Windows ransomware payload
    • 51b9f246d6da85631131fcd1fabf0a67937d4bdde33625a44f7ee6a3a7baebd2 (sha256) - The Gentlemen Windows ransomware payload
    • 62c2c24937d67fdeb43f2c9690ab10e8bb90713af46945048db9a94a465ffcb8 (sha256) - The Gentlemen Windows ransomware payload
    • 6a3ab9e984a759d55af4e84487d1fc44683065cc9a1089d5aa4ad1c0e4e84a63 (sha256) - The Gentlemen Windows ransomware payload
    • 860a6177b055a2f5aa61470d17ec3c69da24f1cdf0a782237055cba431158923 (sha256) - The Gentlemen Windows ransomware payload
    • 87d25d0e5880b3b5cd30106853cbfc6ef1ad38966b30d9bd5b99df46098e546c (sha256) - The Gentlemen Windows ransomware payload
    • 8aa0cb69ca2777001e0f4ba0eaab0841592710e4cc5ccd6b0b526d78bbd8bfba (sha256) - The Gentlemen Windows ransomware payload
    • 8c87134c1b45e990e9568f0a3899b0076f94be16d3c40fa824ac1e6c6ee892db (sha256) - The Gentlemen Windows ransomware payload
    • 91415e0b9fe4e7cbe43ec0558a7adf89423de30d22b00b985c2e4b97e75076b1 (sha256) - The Gentlemen Windows ransomware payload
    • 994d6d1edb57f945f4284cc0163ec998861c7496d85f6d45c08657c9727186e3 (sha256) - The Gentlemen Windows ransomware payload
    • 9f61ff4deb8afced8b1ecdc8787a134c63bde632b18293fbfc94a91749e3e454 (sha256) - The Gentlemen Windows ransomware payload
    • a7a19cab7aab606f833fa8225bc94ec9570a6666660b02cc41a63fe39ea8b0ad (sha256) - The Gentlemen Windows ransomware payload
    • b67958afc982cafbe1c3f114b444d7f4c91a88a3e7a86f89ab8795ac2110d1e6 (sha256) - The Gentlemen Windows ransomware payload
    • c46b5a18ab3fb5fd1c5c8288a41c75bf0170c10b5e829af89370a12c86dd10f8 (sha256) - The Gentlemen Windows ransomware payload
    • c7f7b5a6e7d93221344e6368c7ab4abf93e162f7567e1a7bcb8786cb8a183a73 (sha256) - The Gentlemen Windows ransomware payload
    • dce2e5cc00eff2493f8ced546dc51f9d5ef78c5ee56805906ec642dfa77a1c70 (sha256) - The Gentlemen Windows ransomware payload
    • dfe696ff713318c53fb17731bd4a6585a02c085b590149b19847990b324a0be6 (sha256) - The Gentlemen Windows ransomware payload
    • ec368ae0b4369b6ef0da244774995c819c63cffb7fd2132379963b9c1640ccd2 (sha256) - The Gentlemen Windows ransomware payload
    • efaf8e7422ffd09c7f03f1a5b4e5c2cc32b05334c18d1ccb9673667f8f43108f (sha256) - The Gentlemen Windows ransomware payload
    • f736be55193c77af346dbe905e25f6a1dee3ec1aedca8989ad2088e4f6576b12 (sha256) - The Gentlemen Windows ransomware payload
    • fc75ed2159e0c8274076e46a37671cfb8d677af9f586224da1713df89490a958 (sha256) - The Gentlemen Windows ransomware payload
    • 5dc607c8990841139768884b1b43e1403496d5a458788a1937be139594f01dca (sha256) - The Gentlemen Linux ransomware payload
    • 788ba200f776a188c248d6c2029f00b5d34be45d4444f7cb89ffe838c39b8b19 (sha256) - The Gentlemen Linux ransomware payload
  • Other:
    • CVE-2025-32433 - Erlang SSH vulnerability evaluated by the group for Cisco exploitation