Cross-Platform Enterprise Encryption by The Gentlemen Ransomware Operation
Summary
Hide ▲
Show ▼
A rapidly expanding ransomware-as-a-service operation named The Gentlemen has compromised over 320 organizations primarily in early 2026, leveraging modular cross-platform payloads and affiliate-driven intrusion techniques. The group targets enterprise environments across Windows, Linux, NAS, BSD and ESXi systems using ransomware variants written in Go and C, with affiliates provided with lateral movement, credential harvesting and Group Policy-based deployment capabilities. Impact includes domain-wide encryption, process termination to prevent recovery, shadow copy deletion, and use of SystemBC proxy malware for covert command-and-control, with over 1,570 infected systems detected globally, concentrated in the US, UK and Germany.
Timeline
-
21.04.2026 17:00 1 articles · 1h ago
The Gentlemen Ransomware RaaS Expands with Cross-Platform Enterprise Tooling
The operation, first identified in mid-2025, has grown to claim over 320 victims primarily in early 2026. Affiliates are equipped with Go-based ransomware for multiple platforms and a C-based ESXi encryptor, enabling domain-wide encryption through lateral movement, credential reuse and Group Policy deployment. Defense evasion includes disabling AV, firewall protections, and deleting shadow copies while terminating critical processes. SystemBC proxy malware is used for covert C2 communication via SOCKS5 tunnels and in-memory payload delivery, with telemetry indicating 1,570+ infected systems concentrated in the US, UK and Germany.
Show sources
- The Gentlemen Ransomware Expands With Rapid Affiliate Growth — www.infosecurity-magazine.com — 21.04.2026 17:00
Information Snippets
-
The Gentlemen ransomware operation operates as a RaaS model, recruiting technically skilled affiliates via underground forums since mid-2025.
First reported: 21.04.2026 17:001 source, 1 articleShow sources
- The Gentlemen Ransomware Expands With Rapid Affiliate Growth — www.infosecurity-magazine.com — 21.04.2026 17:00
-
The ransomware supports Windows, Linux, NAS, BSD and ESXi systems using Go-based variants and a separate C-based ESXi encryptor.
First reported: 21.04.2026 17:001 source, 1 articleShow sources
- The Gentlemen Ransomware Expands With Rapid Affiliate Growth — www.infosecurity-magazine.com — 21.04.2026 17:00
-
Affiliates gain access to built-in lateral movement, credential reuse, Group Policy deployment, and automated domain-wide encryption capabilities.
First reported: 21.04.2026 17:001 source, 1 articleShow sources
- The Gentlemen Ransomware Expands With Rapid Affiliate Growth — www.infosecurity-magazine.com — 21.04.2026 17:00
-
Observed attacks include domain controller access, credential harvesting, remote execution via administrative shares, and widespread reconnaissance.
First reported: 21.04.2026 17:001 source, 1 articleShow sources
- The Gentlemen Ransomware Expands With Rapid Affiliate Growth — www.infosecurity-magazine.com — 21.04.2026 17:00
-
Attackers disable endpoint protections, use scheduled tasks, services and registry changes for persistence, and terminate database, backup and VM processes.
First reported: 21.04.2026 17:001 source, 1 articleShow sources
- The Gentlemen Ransomware Expands With Rapid Affiliate Growth — www.infosecurity-magazine.com — 21.04.2026 17:00
-
SystemBC proxy malware is used for covert C2 communication via SOCKS5 tunnels and in-memory payload delivery.
First reported: 21.04.2026 17:001 source, 1 articleShow sources
- The Gentlemen Ransomware Expands With Rapid Affiliate Growth — www.infosecurity-magazine.com — 21.04.2026 17:00
-
Telemetry indicates 1,570+ infected systems globally, with heavy concentration in the US, UK and Germany targeting organizational environments.
First reported: 21.04.2026 17:001 source, 1 articleShow sources
- The Gentlemen Ransomware Expands With Rapid Affiliate Growth — www.infosecurity-magazine.com — 21.04.2026 17:00