Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

License to Encrypt: Make Their Move

0
Medium
Published: Wed Nov 19 2025 (11/19/2025, 08:48:43 UTC)
Source: AlienVault OTX General

Description

'The Gentlemen' ransomware group, active since July 2025, operates a Ransomware-as-a-Service (RaaS) platform that employs advanced dual-extortion tactics by encrypting data and exfiltrating sensitive information to coerce ransom payments. Their ransomware targets Windows, Linux, and ESXi platforms, encrypting both local and network-shared drives using strong cryptographic algorithms XChaCha20 and Curve25519. Recent updates include automatic self-restart, run-on-boot persistence, configurable encryption speeds, and attack methods, enhancing their operational resilience and adaptability. The group has publicly disclosed 47 victims within two months, indicating rapid propagation and impact. The malware leverages multiple MITRE ATT&CK techniques such as persistence (T1547. 001), data encryption (T1486), and network share discovery (T1135). No known exploits or CVEs are associated yet, but the threat is significant due to its multi-platform support and dual-extortion approach. European organizations with mixed OS environments and ESXi virtualization are at particular risk. Mitigation requires tailored detection of persistence mechanisms, network segmentation, and robust incident response plans. Countries with high adoption of VMware ESXi and diverse enterprise IT infrastructures, such as Germany, France, and the UK, are likely most affected.

AI-Powered Analysis

AILast updated: 11/19/2025, 09:56:53 UTC

Technical Analysis

'The Gentlemen' ransomware group emerged in mid-2025 as a sophisticated threat actor leveraging a Ransomware-as-a-Service (RaaS) model. Their ransomware employs dual-extortion tactics: it encrypts victim data and simultaneously exfiltrates sensitive information, threatening public release to pressure victims into paying ransoms. The malware supports Windows, Linux, and VMware ESXi platforms, targeting both local disks and network-shared drives, which broadens its attack surface across enterprise environments. It uses strong cryptographic primitives—XChaCha20 for encryption and Curve25519 for key exchange—ensuring reliable and difficult-to-break encryption. The ransomware includes advanced features such as automatic self-restart and run-on-boot persistence, enabling it to maintain footholds even after system reboots. Configurable encryption speeds allow attackers to balance speed and stealth. The group has published 47 victims on their leak site within two months, demonstrating rapid operational tempo and impact. The malware employs multiple MITRE ATT&CK techniques including process injection (T1059.001), persistence via registry run keys (T1547.001), network share discovery (T1135), data encryption (T1486), and clearing logs (T1070.004), indicating a well-rounded and stealthy attack lifecycle. Although no CVEs or known exploits are currently associated, the threat is significant due to its multi-platform targeting and dual-extortion strategy. The RaaS model allows affiliates to deploy the ransomware widely, increasing infection vectors. The threat is particularly concerning for organizations using ESXi virtualization and mixed OS environments, common in European enterprises. Detection and mitigation require monitoring for persistence mechanisms, unusual network share access, and exfiltration behaviors. Incident response plans must be updated to address dual-extortion scenarios. The group’s rapid victim disclosures indicate a high operational tempo and willingness to publicize breaches, increasing reputational and regulatory risks for victims. Overall, this ransomware represents a high-severity threat due to its technical sophistication, operational scale, and impact on confidentiality, integrity, and availability.

Potential Impact

European organizations face significant risks from 'The Gentlemen' ransomware due to its multi-platform targeting (Windows, Linux, ESXi) and dual-extortion tactics. The encryption of local and network-shared drives can cause widespread operational disruption, data loss, and downtime, impacting business continuity. The exfiltration and threat to publicly release sensitive data pose severe confidentiality and reputational risks, potentially triggering regulatory penalties under GDPR. Enterprises relying heavily on VMware ESXi virtualization are particularly vulnerable, as the ransomware targets this platform, potentially affecting critical virtualized infrastructure. The RaaS model increases the likelihood of infection through diverse affiliates, expanding the attack surface. The persistence and self-restart features complicate remediation efforts, prolonging recovery times. The publication of victims on dark web leak sites amplifies pressure on organizations to pay ransoms, increasing financial losses. Overall, the threat can lead to significant financial, operational, and reputational damage, with cascading effects on supply chains and critical services.

Mitigation Recommendations

1. Implement robust network segmentation to isolate critical systems, especially ESXi hosts and sensitive file shares, limiting ransomware lateral movement. 2. Deploy advanced endpoint detection and response (EDR) solutions capable of detecting persistence mechanisms such as run-on-boot registry keys and process injection techniques. 3. Monitor network traffic for unusual access to network shares and signs of data exfiltration, leveraging anomaly detection and data loss prevention (DLP) tools. 4. Enforce strict access controls and multi-factor authentication (MFA) on administrative accounts and remote access points to reduce initial compromise risk. 5. Regularly back up data with offline or immutable backups, ensuring rapid recovery without paying ransom. 6. Conduct threat hunting focused on MITRE ATT&CK techniques associated with this ransomware, including T1547.001, T1486, and T1135. 7. Harden ESXi environments by applying security best practices, disabling unnecessary services, and monitoring for unauthorized changes. 8. Develop and rehearse incident response plans that address dual-extortion scenarios, including communication strategies and legal considerations. 9. Keep all systems and software up to date with security patches to reduce exploitation opportunities. 10. Educate users and administrators on phishing and social engineering tactics commonly used to deliver ransomware payloads.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.cybereason.com/blog/the-gentlemen-ransomware"]
Adversary
The Gentlemen
Pulse Id
691d846bee2607ac565b349a
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hashadf675ffc1acb357f2d9f1a94e016f52
hash2cd15d5d4cc58d06cfb6be5eabc681925d0ce5ce
hash3ab9575225e00a83a4ac2b534da5a710bdcf6eb72884944c437b5fbe5c5c9235
hash51b9f246d6da85631131fcd1fabf0a67937d4bdde33625a44f7ee6a3a7baebd2

Threat ID: 691d90c112537358e424f598

Added to database: 11/19/2025, 9:41:21 AM

Last enriched: 11/19/2025, 9:56:53 AM

Last updated: 11/20/2025, 3:53:49 AM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats