License to Encrypt: Make Their Move
'The Gentlemen' ransomware group, active since July 2025, operates a Ransomware-as-a-Service (RaaS) platform that employs advanced dual-extortion tactics by encrypting data and exfiltrating sensitive information to coerce ransom payments. Their ransomware targets Windows, Linux, and ESXi platforms, encrypting both local and network-shared drives using strong cryptographic algorithms XChaCha20 and Curve25519. Recent updates include automatic self-restart, run-on-boot persistence, configurable encryption speeds, and attack methods, enhancing their operational resilience and adaptability. The group has publicly disclosed 47 victims within two months, indicating rapid propagation and impact. The malware leverages multiple MITRE ATT&CK techniques such as persistence (T1547. 001), data encryption (T1486), and network share discovery (T1135). No known exploits or CVEs are associated yet, but the threat is significant due to its multi-platform support and dual-extortion approach. European organizations with mixed OS environments and ESXi virtualization are at particular risk. Mitigation requires tailored detection of persistence mechanisms, network segmentation, and robust incident response plans. Countries with high adoption of VMware ESXi and diverse enterprise IT infrastructures, such as Germany, France, and the UK, are likely most affected.
AI Analysis
Technical Summary
'The Gentlemen' ransomware group emerged in mid-2025 as a sophisticated threat actor leveraging a Ransomware-as-a-Service (RaaS) model. Their ransomware employs dual-extortion tactics: it encrypts victim data and simultaneously exfiltrates sensitive information, threatening public release to pressure victims into paying ransoms. The malware supports Windows, Linux, and VMware ESXi platforms, targeting both local disks and network-shared drives, which broadens its attack surface across enterprise environments. It uses strong cryptographic primitives—XChaCha20 for encryption and Curve25519 for key exchange—ensuring reliable and difficult-to-break encryption. The ransomware includes advanced features such as automatic self-restart and run-on-boot persistence, enabling it to maintain footholds even after system reboots. Configurable encryption speeds allow attackers to balance speed and stealth. The group has published 47 victims on their leak site within two months, demonstrating rapid operational tempo and impact. The malware employs multiple MITRE ATT&CK techniques including process injection (T1059.001), persistence via registry run keys (T1547.001), network share discovery (T1135), data encryption (T1486), and clearing logs (T1070.004), indicating a well-rounded and stealthy attack lifecycle. Although no CVEs or known exploits are currently associated, the threat is significant due to its multi-platform targeting and dual-extortion strategy. The RaaS model allows affiliates to deploy the ransomware widely, increasing infection vectors. The threat is particularly concerning for organizations using ESXi virtualization and mixed OS environments, common in European enterprises. Detection and mitigation require monitoring for persistence mechanisms, unusual network share access, and exfiltration behaviors. Incident response plans must be updated to address dual-extortion scenarios. The group’s rapid victim disclosures indicate a high operational tempo and willingness to publicize breaches, increasing reputational and regulatory risks for victims. Overall, this ransomware represents a high-severity threat due to its technical sophistication, operational scale, and impact on confidentiality, integrity, and availability.
Potential Impact
European organizations face significant risks from 'The Gentlemen' ransomware due to its multi-platform targeting (Windows, Linux, ESXi) and dual-extortion tactics. The encryption of local and network-shared drives can cause widespread operational disruption, data loss, and downtime, impacting business continuity. The exfiltration and threat to publicly release sensitive data pose severe confidentiality and reputational risks, potentially triggering regulatory penalties under GDPR. Enterprises relying heavily on VMware ESXi virtualization are particularly vulnerable, as the ransomware targets this platform, potentially affecting critical virtualized infrastructure. The RaaS model increases the likelihood of infection through diverse affiliates, expanding the attack surface. The persistence and self-restart features complicate remediation efforts, prolonging recovery times. The publication of victims on dark web leak sites amplifies pressure on organizations to pay ransoms, increasing financial losses. Overall, the threat can lead to significant financial, operational, and reputational damage, with cascading effects on supply chains and critical services.
Mitigation Recommendations
1. Implement robust network segmentation to isolate critical systems, especially ESXi hosts and sensitive file shares, limiting ransomware lateral movement. 2. Deploy advanced endpoint detection and response (EDR) solutions capable of detecting persistence mechanisms such as run-on-boot registry keys and process injection techniques. 3. Monitor network traffic for unusual access to network shares and signs of data exfiltration, leveraging anomaly detection and data loss prevention (DLP) tools. 4. Enforce strict access controls and multi-factor authentication (MFA) on administrative accounts and remote access points to reduce initial compromise risk. 5. Regularly back up data with offline or immutable backups, ensuring rapid recovery without paying ransom. 6. Conduct threat hunting focused on MITRE ATT&CK techniques associated with this ransomware, including T1547.001, T1486, and T1135. 7. Harden ESXi environments by applying security best practices, disabling unnecessary services, and monitoring for unauthorized changes. 8. Develop and rehearse incident response plans that address dual-extortion scenarios, including communication strategies and legal considerations. 9. Keep all systems and software up to date with security patches to reduce exploitation opportunities. 10. Educate users and administrators on phishing and social engineering tactics commonly used to deliver ransomware payloads.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
Indicators of Compromise
- hash: adf675ffc1acb357f2d9f1a94e016f52
- hash: 2cd15d5d4cc58d06cfb6be5eabc681925d0ce5ce
- hash: 3ab9575225e00a83a4ac2b534da5a710bdcf6eb72884944c437b5fbe5c5c9235
- hash: 51b9f246d6da85631131fcd1fabf0a67937d4bdde33625a44f7ee6a3a7baebd2
License to Encrypt: Make Their Move
Description
'The Gentlemen' ransomware group, active since July 2025, operates a Ransomware-as-a-Service (RaaS) platform that employs advanced dual-extortion tactics by encrypting data and exfiltrating sensitive information to coerce ransom payments. Their ransomware targets Windows, Linux, and ESXi platforms, encrypting both local and network-shared drives using strong cryptographic algorithms XChaCha20 and Curve25519. Recent updates include automatic self-restart, run-on-boot persistence, configurable encryption speeds, and attack methods, enhancing their operational resilience and adaptability. The group has publicly disclosed 47 victims within two months, indicating rapid propagation and impact. The malware leverages multiple MITRE ATT&CK techniques such as persistence (T1547. 001), data encryption (T1486), and network share discovery (T1135). No known exploits or CVEs are associated yet, but the threat is significant due to its multi-platform support and dual-extortion approach. European organizations with mixed OS environments and ESXi virtualization are at particular risk. Mitigation requires tailored detection of persistence mechanisms, network segmentation, and robust incident response plans. Countries with high adoption of VMware ESXi and diverse enterprise IT infrastructures, such as Germany, France, and the UK, are likely most affected.
AI-Powered Analysis
Technical Analysis
'The Gentlemen' ransomware group emerged in mid-2025 as a sophisticated threat actor leveraging a Ransomware-as-a-Service (RaaS) model. Their ransomware employs dual-extortion tactics: it encrypts victim data and simultaneously exfiltrates sensitive information, threatening public release to pressure victims into paying ransoms. The malware supports Windows, Linux, and VMware ESXi platforms, targeting both local disks and network-shared drives, which broadens its attack surface across enterprise environments. It uses strong cryptographic primitives—XChaCha20 for encryption and Curve25519 for key exchange—ensuring reliable and difficult-to-break encryption. The ransomware includes advanced features such as automatic self-restart and run-on-boot persistence, enabling it to maintain footholds even after system reboots. Configurable encryption speeds allow attackers to balance speed and stealth. The group has published 47 victims on their leak site within two months, demonstrating rapid operational tempo and impact. The malware employs multiple MITRE ATT&CK techniques including process injection (T1059.001), persistence via registry run keys (T1547.001), network share discovery (T1135), data encryption (T1486), and clearing logs (T1070.004), indicating a well-rounded and stealthy attack lifecycle. Although no CVEs or known exploits are currently associated, the threat is significant due to its multi-platform targeting and dual-extortion strategy. The RaaS model allows affiliates to deploy the ransomware widely, increasing infection vectors. The threat is particularly concerning for organizations using ESXi virtualization and mixed OS environments, common in European enterprises. Detection and mitigation require monitoring for persistence mechanisms, unusual network share access, and exfiltration behaviors. Incident response plans must be updated to address dual-extortion scenarios. The group’s rapid victim disclosures indicate a high operational tempo and willingness to publicize breaches, increasing reputational and regulatory risks for victims. Overall, this ransomware represents a high-severity threat due to its technical sophistication, operational scale, and impact on confidentiality, integrity, and availability.
Potential Impact
European organizations face significant risks from 'The Gentlemen' ransomware due to its multi-platform targeting (Windows, Linux, ESXi) and dual-extortion tactics. The encryption of local and network-shared drives can cause widespread operational disruption, data loss, and downtime, impacting business continuity. The exfiltration and threat to publicly release sensitive data pose severe confidentiality and reputational risks, potentially triggering regulatory penalties under GDPR. Enterprises relying heavily on VMware ESXi virtualization are particularly vulnerable, as the ransomware targets this platform, potentially affecting critical virtualized infrastructure. The RaaS model increases the likelihood of infection through diverse affiliates, expanding the attack surface. The persistence and self-restart features complicate remediation efforts, prolonging recovery times. The publication of victims on dark web leak sites amplifies pressure on organizations to pay ransoms, increasing financial losses. Overall, the threat can lead to significant financial, operational, and reputational damage, with cascading effects on supply chains and critical services.
Mitigation Recommendations
1. Implement robust network segmentation to isolate critical systems, especially ESXi hosts and sensitive file shares, limiting ransomware lateral movement. 2. Deploy advanced endpoint detection and response (EDR) solutions capable of detecting persistence mechanisms such as run-on-boot registry keys and process injection techniques. 3. Monitor network traffic for unusual access to network shares and signs of data exfiltration, leveraging anomaly detection and data loss prevention (DLP) tools. 4. Enforce strict access controls and multi-factor authentication (MFA) on administrative accounts and remote access points to reduce initial compromise risk. 5. Regularly back up data with offline or immutable backups, ensuring rapid recovery without paying ransom. 6. Conduct threat hunting focused on MITRE ATT&CK techniques associated with this ransomware, including T1547.001, T1486, and T1135. 7. Harden ESXi environments by applying security best practices, disabling unnecessary services, and monitoring for unauthorized changes. 8. Develop and rehearse incident response plans that address dual-extortion scenarios, including communication strategies and legal considerations. 9. Keep all systems and software up to date with security patches to reduce exploitation opportunities. 10. Educate users and administrators on phishing and social engineering tactics commonly used to deliver ransomware payloads.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.cybereason.com/blog/the-gentlemen-ransomware"]
- Adversary
- The Gentlemen
- Pulse Id
- 691d846bee2607ac565b349a
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hashadf675ffc1acb357f2d9f1a94e016f52 | — | |
hash2cd15d5d4cc58d06cfb6be5eabc681925d0ce5ce | — | |
hash3ab9575225e00a83a4ac2b534da5a710bdcf6eb72884944c437b5fbe5c5c9235 | — | |
hash51b9f246d6da85631131fcd1fabf0a67937d4bdde33625a44f7ee6a3a7baebd2 | — |
Threat ID: 691d90c112537358e424f598
Added to database: 11/19/2025, 9:41:21 AM
Last enriched: 11/19/2025, 9:56:53 AM
Last updated: 11/20/2025, 3:53:49 AM
Views: 15
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
HelixGuard uncovers malicious "spellchecker" packages on PyPI using multi-layer encryption to steal crypto wallets.
MediumThreatFox IOCs for 2025-11-19
MediumUK Exposes Bulletproof Hosting Operator Linked to BlackBasta, Evil Corp and LockBit Ransomware
MediumWEBJACK: Evolving IIS Hijacking Campaign Abuses SEO for Fraud and Monetization
MediumGPT Trade: Fake Google Play Store drops BTMob Spyware and UASecurity Miner on Android Devices
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.