CyberXtron
From Access to Encryption in Hours: TheGentlemen Ransomware Playbook Exposed
TheGentlemenRaaSThreatActorRansomwareThreatIntelCybersecurity

From Access to Encryption in Hours: TheGentlemen Ransomware Playbook Exposed

Executive Summary  

TheGentlemen is an active ransomware-as-a-service (RaaS) operation observed since February 2023, with at least 223 publicly listed victims across North America, Europe, Asia, and other regions. The group employs a double-extortion strategy, combining data theft with rapid network-wide encryption and publication of stolen data on its leak site, often proceeding without prolonged negotiation phases. Instead of relying heavily on sophisticated zero-day exploits, operators frequently gain initial access through exposed services and compromised credentials, then escalate privileges, disable security controls, and deploy ransomware across the domain. Their campaigns target a wide range of sectors — particularly manufacturing, technology, and financial services — indicating opportunistic yet consistent enterprise-focused operations.  

For defenders, the primary risk lies in the speed and reliability of execution. Once inside a network, TheGentlemen operators can progress from initial access to full operational disruption within a short timeframe using legitimate administrative tools and strong encryption mechanisms that limit recovery without reliable backups. Organizations should prioritize identity and access security, monitoring of Active Directory activity, network segmentation, and resilient offline backups to interrupt the attack chain before encryption is deployed. Early detection of pre-ransomware behaviors remains the most effective defensive measure, as recovery options after encryption are limited and the resulting operational disruption can be severe.  

Threat Profile  

Group Overview  

The Gentlemen ransomware group first appeared on February 28, 2023, and remains active as of March 3rd, 2026, with 223 victims listed on their leak site. The group employs a double-extortion model, encrypting victim data while simultaneously threatening to leak stolen information if ransom demands are not met. Despite the name, the group operates with aggressive tactics and limited negotiation, often prioritizing rapid victim publication on its leak site to increase pressure on affected organizations.  

TheGentlemen operates in a ransomware-as-a-service (RaaS)–style model, where core developers provide ransomware tooling and infrastructure to affiliates who conduct intrusion and deployment activities. The group maintains a dark-web leak site where it publishes victim details and exfiltrated data to enforce its dual-extortion strategy, regularly updating the platform with newly compromised organizations. The scale of activity, consistent leak-site updates, and diverse targeting patterns suggest a structured operational model supported by multiple operators or affiliates 

Operational Characteristics  

The group runs a Ransomware-as-a-Service (RaaS) model with cross-platform payloads (Windows, Linux, ESXi) written in Go for stealth and compilation ease. They emphasize speed, using automated persistence, EDR evasion, and domain-wide deployment via GPO or privileged accounts. Attacks follow a structured lifecycle: initial access via exposed services, reconnaissance, security disablement, exfiltration, and encryption with XChaCha20/Curve25519.  

Victimology  

Geographical Distribution  

TheGentlemen’s activity demonstrates a clear acceleration in operational tempo. In 2025 alone, the group recorded 81 victims, while in 2026 as of March 3rd, they have already listed 142 victims on their leak site. Surpassing the previous year’s total in less than two months highlights a significant increase in campaign velocity and affiliate activity. This rapid growth suggests expanding operational capacity, improved deployment efficiency, or increased affiliate onboarding, reinforcing the assessment that TheGentlemen is scaling aggressively rather than plateauing.  

The Gentlemen ransomware group has a total of 223 victims, with 46 incidents lacking country attribution. Among identified locations, the United States recorded the highest number of victims with 25 cases, followed by Thailand (11) and Brazil (9)India reported 8 victims, while France and Germany each recorded 7 incidentsThe United Kingdom and Turkey accounted for 6 victims each, and Malaysia, Indonesia, Spain, and Italy reported 5 cases each, reflecting consistent targeting across multiple regions. Additional activity was observed across Latin America, the Middle East, and the Asia-Pacific region, including countries such as Mexico, Colombia, Viet Nam, and the United Arab Emirates. Overall, the distribution indicates a globally dispersed victimology spanning North America, Europe, Asia, and other regions, rather than concentration within a single geographic area, highlighting the group’s broad opportunistic targeting strategy.  

  

fbded20fb673478b0d92b31f3e42cbc0.png 

  

Sector Targeting  

Among identified industries, the Manufacturing sector was the most affected with 27 victims, followed by Technology (21)Financial Services recorded 13 victims, while Healthcare accounted for 12 incidents and Transportation/Logistics reported 11 cases, indicating continued exposure of critical and operational infrastructure. The Education sector recorded 10 victims, while Consumer Services and Energy each accounted for 7 cases. The Public Sector experienced 6 incidents, demonstrating that government-related entities were also targeted. Additional activity was observed in sectors such as Agriculture and Food Production (6)Construction (4), and Hospitality and Tourism (3), reflecting broad sector coverage. A significant portion of incidents — 92 victims — lacked sector attribution, suggesting either limited disclosure by victims or incomplete intelligence visibility. Overall, the distribution indicates opportunistic targeting across multiple industries rather than concentration in a single dominant vertical 

4489ccd3bc1734436d425096552704e2.png 

  

Technical analysis  

Initial access and foothold  

Current reporting indicates two primary initial access vectors:  

  • Exploitation of public‑facing infrastructure, notably Fortinet FortiGate devices, consistent with MITRE ATT&CK T1190 (Exploit Public‑Facing Application).  

  • Use of compromised or stolen domain and privileged accounts (T1078.002 – Valid Accounts: Domain Accounts), often sourced from infostealer logs or prior compromise.  

Once access is obtained, operators typically run Nmap and other tools for network service discovery and asset mapping, including Advanced IP Scanner, before pivoting to domain reconnaissance. They rapidly enumerate domain users, groups (including “Domain Admins” and VMware‑related groups), and domain trusts using batch scripts and PowerShell to plan privilege escalation and lateral movement.  

Privilege escalation, defense evasion, and persistence  

TheGentlemen places heavy emphasis on defense evasion and privilege escalation:  

  • A vulnerable signed driver (often referenced as ThrottleBlood.sys) is deployed and executed by a loader such as All.exe or its variants, enabling the termination of protected security processes and bypassing kernel‑level protections.  

  • Custom “kill‑AV” tools and drivers are used to systematically stop EDR/AV services, combined with registry modifications weakening authentication and RDP security settings.  

  • Tools like PowerRun.exe are used to run processes with elevated privileges and to hijack execution flows, while Allpatch2.exe variants support tailored evasion of specific security controls.  

Persistence is achieved via:  

  • Registry Run keys and startup folder entries (T1547.001) to restart tooling and payloads.  

  • Deployment of AnyDesk and similar remote‑access software (T1219) configured for long‑term remote management, often with new local or domain accounts created for operational use.  

Lateral movement, exfiltration, and encryption  

Lateral movement is largely based on:  

  • Windows Management Instrumentation (WMI) and PowerShell remoting to push tools and ransomware across hosts, exploiting existing administrative shares and network‑shared drives.  

  • Remote Desktop Protocol (RDP), SMB/Admin shares (PSExec), and, in some cases, SSH via PuTTY to move between servers, including virtualization hosts and critical infrastructure nodes.  

Data theft and impact stages typically follow this chain:  

  1. Data staging in local directories such as C:\ProgramData\data and on network shares (T1074.001, T1039).  

  1. Exfiltration via encrypted channels, often using WinSCP or WebDAV over HTTPS, categorized as T1048.001 (Exfiltration over Symmetric Encrypted Non‑C2 Protocol) and T1071.001 (Web protocols).  

  1. Final deployment of ransomware via the Netlogon share using domain admin privileges, enabling rapid domain‑wide encryption (T1486) and stopping services that aid recovery and investigation (T1489).  

Cryptographically, TheGentlemen uses strong modern primitives: XChaCha20 for file encryption and Curve25519 for key exchange, reinforcing that recovery without keys is not feasible in practice. The malware incorporates self‑restart and run‑on‑boot capabilities to ensure that even after partial remediation attempts, encryption and extortion workflows can continue.  

Ransomnote:  

File Name: README-GENTLEMEN.txt  

012ec51a142b4f659e806b80bdc56075.png 

  

MITRE ATT&CK TTPs  

Tactic  

Technique ID  

Technique Name  

Initial Access  

T1190  

Exploit Public-Facing Application  

T1078  

Valid Accounts  

T1078.002  

Valid Accounts: Domain Accounts  

Execution  

  

T1059  

Command and Scripting Interpreter  

T1059.001  

Command and Scripting Interpreter: PowerShell  

T1059.003  

Command and Scripting Interpreter: Windows Command Shell  

Persistence  

T1547  

Boot or Logon Autostart Execution  

T1136  

Create Account  

Privilege Escalation  

T1068  

Exploitation for Privilege Escalation  

Defense Evasion  

  

T1562  

Impair Defenses  

T1112  

Modify Registry  

T1027  

Obfuscated Files or Information  

T1484.001  

Domain Policy Modification: Group Policy Modification  

Discovery  

T1046  

Network Service Discovery  

T1087  

Account Discovery  

T1087.002  

Account Discovery: Domain Account  

T1482  

Domain Trust Discovery  

Lateral Movement  

T1021  

Remote Services  

T1021.001  

Remote Services: Remote Desktop Protocol  

T1021.002  

Remote Services: SMB/Windows Admin Shares  

T1021.004  

Remote Services: SSH  

Collection & Exfiltration  

  

T1074  

Data Staged  

T1074.001  

Data Staged: Local Data Staging  

T1039  

Data from Network Shared Drive  

T1048  

Exfiltration Over Alternative Protocol  

T1048.001  

Exfiltration Over Alternative Protocol: Unencrypted/Obfuscated Non-C2 Protocol  

Command & Control  

  

T1071  

Application Layer Protocol  

T1071.001  

Application Layer Protocol: Web Protocols  

T1219  

Remote Access Software  

Impact  

T1486  

Data Encrypted for Impact  

T1489  

Service Stop  

T1552  

Unsecured Credentials  

  

Indicators of Compromise (IOCs)  

  • 4c82fbafef9bab484a2fbe23e4ec8aac06e8e296d6c9e496f4a589f97fd4ab71  

  • 7a311b584497e8133cd85950fec6132904dd5b02388a9feed3f5e057fb891d09  

  • 7a311b584497e8133cd85950fec6132904dd5b02388a9feed3f5e057fb891d09  

  • 3ab9575225e00a83a4ac2b534da5a710bdcf6eb72884944c437b5fbe5c5c9235  

  • 51b9f246d6da85631131fcd1fabf0a67937d4bdde33625a44f7ee6a3a7baebd2  

Mitigations & Recommendations  

1. Identity & Access Security  

  • Enforce multi-factor authentication (MFA) for all administrative and remote access accounts.  

  • Conduct regular Active Directory audits and monitor for privilege escalation or abnormal authentication activity.  

2. Network Hardening & Attack Surface Reduction  

  • Secure internet-facing services and remove unnecessary external access to reduce exposure.  

  • Implement network segmentation and restrict use of remote services such as RDP and SMB.  

3. Endpoint Protection & Monitoring  

  • Deploy EDR/XDR solutions capable of detecting defense evasion, driver abuse, and suspicious tool execution.  

  • Restrict execution from user-writable directories and monitor for pre-ransomware behavioral activity.  

4. Group Policy & Administrative Controls  

  • Limit Group Policy modification rights to trusted administrators only.  

  • Enable logging and alerting for GPO, registry, and domain configuration changes.  

5. Data Protection & Backup Strategy  

  • Maintain offline, immutable backups and regularly test restoration procedures.  

  • Implement encryption and data loss prevention (DLP) to detect unauthorized data staging or transfers.  

6. Patch & Vulnerability Management  

  • Keep operating systems, drivers, and third-party applications fully patched.  

  • Prioritize remediation of vulnerabilities in public-facing applications.  

7. Threat Detection & Intelligence  

  • Integrate threat intelligence indicators into SIEM and monitoring platforms.  

  • Hunt for affiliate pre-deployment ransomware activity and abnormal outbound traffic.  

8. Security Awareness & Organizational Preparedness  

  • Conduct regular phishing and credential-theft awareness training for users.  

  • Maintain and rehearse ransomware-specific incident response procedures.  

  

Conclusion  

The Gentlemen pose an evolving, high-velocity threat with 223 victims since 2023, targeting diverse sectors globally via sophisticated, adaptive tactics. Immediate adoption of layered defenses can mitigate risks, but vigilance against their evasion techniques remains essential for resilience  

Overall, TheGentlemen should be considered a persistent enterprise ransomware threat rather than a short-lived campaign. Organizations are most at risk when identity infrastructure, external services, and endpoint protections are weakly monitored or poorly segmented. Effective defense therefore depends less on any single control and more on layered security — particularly identity protection, continuous monitoring, and resilient backup strategies. Proactive detection of pre-ransomware behaviors remains the most reliable opportunity to disrupt the intrusion lifecycle before irreversible impact occurs.  

  

  

Elevate your security—get curated threat insights in your inbox.

From Access to Encryption in Hours: TheGentlemen Ransomware Playbook Exposed | CyberXTron Blog