Gentlemen Ransomware Exploits Vulnerable Driver to Disable Security Tools
Summary
Hide β²
Show βΌ
The Gentlemen ransomware gang uses a vulnerable driver to evade detection and disable security products in enterprise environments. The group employs a bring-your-own-vulnerable-driver (BYOVD) attack, leveraging the ThrottleStop.sys driver to terminate antivirus and EDR processes. The ransomware has been observed since this summer and demonstrates advanced capabilities, including tailored bypasses for specific security vendors. The vulnerability (CVE-2025-7771) was discovered by Kaspersky researchers during a ransomware incident in Brazil. The Gentlemen ransomware uses ThrottleBlood.sys, a renamed version of the legitimate ThrottleStop.sys driver, to exploit the vulnerability and gain kernel-level access. The ransomware also employs All.exe and Allpatch2.exe, which are AV killers designed to terminate security software and disable protective services. The group has shifted from generic attacks to more customized and targeted approaches, adapting their tactics based on the security defenses of their targets. They use PowerRun.exe for privilege escalation and to bypass security products.
Timeline
-
11.09.2025 23:42 π° 1 articles Β· β± 5d ago
Gentlemen Ransomware Exploits Vulnerable Driver to Disable Security Tools
The Gentlemen ransomware gang uses a BYOVD attack to disable security products in enterprise environments. The group employs the ThrottleStop.sys driver, renamed as ThrottleBlood.sys, to exploit the vulnerability (CVE-2025-7771) and gain kernel-level access. The ransomware uses All.exe and Allpatch2.exe to terminate security software and disable protective services. The group has shifted from generic attacks to more customized and targeted approaches, adapting their tactics based on the security defenses of their targets.
Show sources
- 'Gentlemen' Ransomware Abuses Vulnerable Driver to Kill Security Gear β www.darkreading.com β 11.09.2025 23:42
Information Snippets
-
The Gentlemen ransomware gang uses a BYOVD attack to disable security products.
First reported: 11.09.2025 23:42π° 1 source, 1 articleShow sources
- 'Gentlemen' Ransomware Abuses Vulnerable Driver to Kill Security Gear β www.darkreading.com β 11.09.2025 23:42
-
The ransomware exploits the ThrottleStop.sys driver, renamed as ThrottleBlood.sys, to gain kernel-level access.
First reported: 11.09.2025 23:42π° 1 source, 1 articleShow sources
- 'Gentlemen' Ransomware Abuses Vulnerable Driver to Kill Security Gear β www.darkreading.com β 11.09.2025 23:42
-
The vulnerability (CVE-2025-7771) in ThrottleStop.sys allows for code execution and privilege escalation.
First reported: 11.09.2025 23:42π° 1 source, 1 articleShow sources
- 'Gentlemen' Ransomware Abuses Vulnerable Driver to Kill Security Gear β www.darkreading.com β 11.09.2025 23:42
-
The ransomware uses All.exe and Allpatch2.exe to terminate security software and disable protective services.
First reported: 11.09.2025 23:42π° 1 source, 1 articleShow sources
- 'Gentlemen' Ransomware Abuses Vulnerable Driver to Kill Security Gear β www.darkreading.com β 11.09.2025 23:42
-
The Gentlemen ransomware has been observed since this summer and demonstrates advanced capabilities.
First reported: 11.09.2025 23:42π° 1 source, 1 articleShow sources
- 'Gentlemen' Ransomware Abuses Vulnerable Driver to Kill Security Gear β www.darkreading.com β 11.09.2025 23:42
-
The group adapts its tactics based on the security defenses of its targets, using PowerRun.exe for privilege escalation.
First reported: 11.09.2025 23:42π° 1 source, 1 articleShow sources
- 'Gentlemen' Ransomware Abuses Vulnerable Driver to Kill Security Gear β www.darkreading.com β 11.09.2025 23:42
Similar Happenings
FileFix Attack Using Steganography to Deploy StealC Infostealer
A new FileFix social engineering campaign impersonates Meta account suspension warnings to trick users into installing the StealC infostealer malware. The attack uses steganography to hide malicious scripts and executables within a JPG image. The campaign targets various credentials, cryptocurrency wallets, and cloud services. The FileFix technique abuses the File Explorer address bar to execute PowerShell commands, bypassing traditional detection methods. The attack was discovered by Acronis and observed over a two-week period, with multiple variants using different payloads and domains. The StealC malware aims to steal sensitive information from infected devices, including browser credentials, messaging app data, and cryptocurrency wallets. The FileFix technique was created by red team researcher mr.d0x and has been previously used by the Interlock ransomware gang. The attack uses a multilingual phishing site to trick users into copying and pasting a malicious command into the File Explorer address bar. The campaign abuses Bitbucket repositories to host malicious components, leveraging trust in the platform to bypass detection. The FileFix campaign is the most widespread, customized, and sophisticated to date, targeting users in over 16 countries. The phishing site has been translated into at least 16 different languages. The attack chain involves a phishing email impersonating Facebook security, warning users of account suspension. The attack uses AI-generated images in the steganography process. The FileFix technique is more elegant and less suspicious than ClickFix, using File Explorer instead of the Run dialog. The FileFix attack offers a broader range of high-value targets due to its use of File Explorer. Security researcher Eliad Kimhy predicts an increase in FileFix attacks in the near future. The FileFix attack involves a fake Cloudflare Turnstile verification page that redirects users to a Windows File Explorer search query. The attack uses a Windows shortcut LNK file disguised as a PDF to initiate the infection chain. The LNK file downloads a legitimate AnyDesk installer and a malicious MSI package that installs MetaStealer. The MSI package contains a DLL and a CAB archive with malicious files, including a MetaStealer dropper. The MetaStealer dropper is protected with Private EXE Protector and is designed to steal cryptocurrency wallets. The attack leverages the Windows search protocol to redirect users to an attacker-controlled SMB share. The FileFix attack has evolved to include a more sophisticated infection chain that bypasses traditional detection methods. The attack uses a multi-stage process involving Windows File Explorer, a fake PDF lure, and an MSI package to deploy MetaStealer. The FileFix attack has been observed to use a combination of social engineering and advanced technical techniques to evade detection.
New HybridPetya Ransomware Exploits UEFI Secure Boot Bypass Vulnerability
A new ransomware variant, HybridPetya, has been discovered. It resembles the Petya/NotPetya malware but includes the ability to bypass UEFI Secure Boot using the CVE-2024-7344 vulnerability. HybridPetya encrypts the Master File Table (MFT) on NTFS-formatted partitions and can compromise modern UEFI-based systems. The ransomware operates through a bootkit and an installer, with the bootkit managing encryption and decryption processes. The ransomware has been observed in samples uploaded to VirusTotal in February 2025, with no evidence of active use in the wild. The vulnerability exploited by HybridPetya was patched in January 2025. The ransomware encrypts the MFT and displays a fake CHKDSK message to deceive victims. It demands a $1,000 ransom in Bitcoin, with a total of $183.32 received between February and May 2025. The ransom note provides an option for victims to enter a decryption key after payment, which triggers the decryption process. The bootkit also recovers legitimate bootloaders from backups created during installation. The ransomware triggers a system crash during bootloader changes, ensuring the bootkit binary is executed upon reboot. HybridPetya may be a research project, proof-of-concept, or early version of a cybercrime tool under limited testing. HybridPetya combines the destructive capabilities of NotPetya, the recoverable encryption functionality of Petya ransomware, and the ability to bypass Secure Boot protections. It can deploy malicious UEFI payloads directly to the EFI System Partition and encrypt the Master File Table (MFT). HybridPetya's ability to install harmful code directly into a computer's UEFI firmware makes it hard for security teams to detect. The emergence of HybridPetya highlights the growing threat from UEFI bootkits that reside at a computer's startup sequence level.