A Closer Look at The Gentlemen’s Alleged Leak
Executive Summary
The Gentlemen is an active ransomware and extortion operation that emerged publicly in the second half of 2025 and rapidly scaled into a high-volume threat actor. Rather than a fully new group, it seems to be a continuation or reorganization of prior ransomware affiliate activity, with links to the Qilin ecosystem and the Russian-speaking actor “hastalamuerte". Its growth likely reflects existing ransomware experience, affiliate relationships, and access to resources.

Figure 1. The Gentlemen’s related Illustration spotted on the dark web.
The group has demonstrated capability against enterprise environments, including Windows, Linux, NAS, BSD, and VMware ESXi systems. Observed activity includes the abuse of exposed remote access infrastructure, compromised credentials, network reconnaissance, legitimate administrative tools, security tool disabling, data exfiltration, and domain-wide ransomware deployment.
A new relevant finding is that underground sources show attempts to sell data claimed to be connected to The Gentlemen ransomware activity. At this stage, the available information is limited and does not provide enough victim-specific or technical details to confirm the data’s origin, freshness, or authenticity. This finding should be treated as a separate intelligence lead requiring further validation.
The Gentlemen should be assessed as a financially motivated ransomware threat with growing operational maturity, aggressive affiliate recruitment, and strong potential to cause both operational disruption and data-exposure impact.
Analytical Assessment
The Gentlemen represents a mature and fast-growing ransomware threat. Its significance is not only in its malware, but in its operating model, affiliate recruitment, multi-platform capability, and use of the wider cybercriminal access economy. The group benefits from the same conditions that support many modern ransomware operations: exposed remote infrastructure, weak identity controls, credential theft, access brokerage, and poor segmentation.
The Gentlemen may not be a fully new ransomware ecosystem, but rather a structured continuation of prior affiliate activity. The operation has evolved from an earlier affiliate group associated with the Qilin ransomware ecosystem and is reportedly managed by a Russian-speaking actor known as hastalamuerte. This context is important because it suggests that The Gentlemen benefits from existing ransomware experience, operational knowledge, affiliate relationships, and access to resources rather than building capability from scratch.

Figure 2. The Gentlemen’s account on X.
For affected or potentially exposed organizations, the main risk is not limited to encryption. The broader risk includes data exposure, regulatory impact, business interruption, credential compromise, third-party exposure, and reputational damage. Defensive response should therefore combine incident response readiness, external exposure management, identity security, backup resilience, and dark web monitoring.
The Gentlemen uses data theft as a core part of its pressure strategy. Stolen data may be uploaded to the group’s infrastructure or listed on its leak site if the victim does not negotiate. The group’s extortion model therefore extends beyond encryption alone. Even if an organization restores systems from backups, the risk of data exposure, regulatory impact, customer notification obligations, and reputational damage may remain.
Operational Model
The Gentlemen’s operating model follows a mature ransomware workflow. Initial access is likely obtained through a combination of exposed remote services, compromised credentials, VPN or firewall abuse, purchased access, and credential material sourced from stealer logs or access brokers. After gaining access, affiliates typically conduct internal reconnaissance, identify privileged users, map Active Directory, enumerate reachable hosts, disable security tools, stage data, and deploy ransomware across the environment.

Figure 3. The Gentlemen’s advertising banner, showing encryption launching.
The group’s affiliate panel is reported to support victim management, payload generation, ransom note customization, victim revenue estimation, stolen data uploads, negotiation channel configuration, and decryptor management. This indicates a structured backend environment rather than an isolated malware campaign.

Figure 4. The Gentlemen’s advertising banner.
Negotiations are not always handled directly through the public leak portal. In some cases, communication appears to be delegated to affiliate-controlled Tox or Session identifiers. This makes tracking incidents more difficult because communication channels may vary between intrusions.
The Gentlemen’s Statistics
From a purely statistical standpoint, 2026 marks the inflection year for The Gentlemen ransomware operation. Leak site monitoring shows that the group publicly claimed 352 attacks during the incomplete first part of 2026 (May 10, 2026). This places The Gentlemen among the top two most active ransomware groups globally in 2026, despite being less than a year old at the start of the reporting period.

Figure 5. The Gentlemen’s blog.
The most revealing trend is the velocity of disclosures rather than the cumulative number alone. Activity increased sharply in Q1 to Q2 2026, with February and April standing out as the most active months in the dataset. In the normalized view, Q1 2026 accounts for around 219 unique disclosure records, while Q2 2026 up to May 10, 2026, already accounts for around 133 records. Several days show unusually high publication volume, including January 20, 2026, February 6, 2026, April 8, 2026, and April 14, 2026, when the group listed large batches of victims. This pattern suggests either coordinated batch publication, multiple active affiliates, or both, and supports the assessment that The Gentlemen operates with broad affiliate concurrency rather than isolated single-operator activity.

Figure 6. The Gentlemen’s victim distribution by sector.
|
Sector |
Count |
Percent |
|
Professional Services |
66 |
18.80% |
|
Manufacturing |
63 |
17.90% |
|
Technology |
41 |
11.60% |
|
Healthcare |
31 |
8.80% |
|
Transportation & Logistics |
23 |
6.50% |
|
Agriculture & Food |
21 |
6.00% |
|
Financial Services |
16 |
4.50% |
|
Construction |
14 |
4.00% |
|
Education |
13 |
3.70% |
|
Government & Public Sector |
12 |
3.40% |
|
Hospitality & Tourism |
10 |
2.80% |
|
Energy & Utilities |
10 |
2.80% |
Table 1. The Gentlemen's distribution of victims by sector.
The victims’ sector distribution shows a strong concentration in business and industrial environments. Professional services and manufacturing represent the two largest categories, together accounting for nearly 37% of all records. They are followed by technology, healthcare, transportation and logistics, financial services, agriculture and food, education, construction, and government/public sector. This distribution indicates that The Gentlemen is not limited to one vertical; however, the repeated appearance of manufacturing, professional services, technology, and healthcare suggests a preference for organizations with complex operational networks, valuable business data, and higher disruption potential.

Figure 7. Distribution of victims by geographical region.
|
Region |
Count |
Percent |
|
APAC |
101 |
28.70% |
|
Europe |
100 |
28.40% |
|
Latin America |
59 |
16.80% |
|
United States & Canada |
55 |
15.60% |
|
Middle East |
19 |
5.40% |
|
Africa |
14 |
4.00% |
|
Unknown |
4 |
1.10% |
Table 2. Distribution of victims by geographical region.
Geographically, the dataset shows broad international activity across approximately 70 countries, with no single region fully dominating the victim list. In the normalized data, APAC represents the largest regional share, followed by Europe, Latin America, and the United States and Canada.

Figure 8. Distribution of victims by country.
|
Country |
Count |
Percent |
|
United States |
46 |
13.10% |
|
Thailand |
30 |
8.50% |
|
France |
19 |
5.40% |
|
El Salvador |
14 |
4.00% |
|
Japan |
13 |
3.70% |
|
Brazil |
13 |
3.70% |
|
Italy |
13 |
3.70% |
|
Taiwan |
12 |
3.40% |
|
Germany |
12 |
3.40% |
|
India |
12 |
3.40% |
|
United Kingdom |
11 |
3.10% |
|
Canada |
9 |
2.60% |
|
Poland |
8 |
2.30% |
|
Colombia |
8 |
2.30% |
|
Turkey |
8 |
2.30% |
|
Czechia |
7 |
2.00% |
|
Malaysia |
7 |
2.00% |
|
Mexico |
7 |
2.00% |
|
China |
7 |
2.00% |
Table 3. Distribution of victims by country.
At the country level, the United States is the most frequently listed country, followed by Thailand, France, El Salvador, Italy, Brazil, Japan, India, Germany, and Taiwan. The concentration across APAC, Europe, Latin America, and North America suggests a globally distributed target set, while the absence of Russia and CIS countries in the dataset remains consistent with the group’s reported affiliate rules and broader Russian-speaking ransomware targeting patterns.
Dedicated to hunting and eradicating the world's most challenging threats.
The group’s activity is concentrated on organizations with commercially valuable data and exposed attack surfaces, rather than on a single strategic sector. While healthcare, financial services, government, energy, logistics, and telecommunications remain high-risk categories, the broader pattern indicates opportunistic targeting across industries. This supports the assessment that The Gentlemen’s growth is driven by affiliate scale, exposed perimeter infrastructure, valid credential abuse, and monetizable business data.
Crucially, experienced analysts caution that leak site victim counts materially underrepresent real compromise activity. During a 2026 incident response investigation, researchers correlated The Gentlemen’s use of the SystemBC proxy infrastructure. They identified telemetry from over 1,570 enterprise environments, many of which never appeared on the group’s public shame site. This indicates that the 692 publicly disclosed victims in 2026 likely represents only organizations that refused to pay, not the full scale of its intrusion activity.
Taken together, the 2026 statistics paint a clear picture: The Gentlemen’s growth is not episodic but structural. The aggressive affiliate economics, rapid exploitation of internet-facing systems, and short time-to-encryption cycles have translated directly into rising victim counts. From a defensive standpoint, these numbers should be interpreted not as retrospective reporting but as a leading indicator of continued high volume ransomware risk, particularly for industrial and infrastructure-adjacent organizations.
The Gentlemen’s Malware Capabilities
The Gentlemen ransomware includes multi-platform capabilities. Public technical analysis indicates support for Windows, Linux, NAS, BSD, and ESXi environments. This is important because attacks against ESXi and virtualization infrastructure can rapidly disrupt entire server estates and critical business applications.
The Windows locker has been reported as Go-based and requires a password parameter during execution. This type of execution control may reduce accidental detonation, limit sandbox analysis, and allow affiliates to control when and where the payload runs.
The ransomware has been associated with the ransom note name:
- README-GENTLEMEN.txt
Observed encrypted file extensions include:
- .7mtzhh
- .ojuopo
- variable six-character extensions
The encryption logic reportedly uses a hybrid encryption approach and may support configurable encryption modes. Smaller files may be fully encrypted, while larger files may be partially encrypted in chunks to accelerate impact. This allows the actor to damage large file repositories faster while still making recovery difficult without backups or decryptors.
Before encryption, the malware attempts to stop services and processes associated with databases, backup software, virtualization platforms, remote access tools, and enterprise applications. This behavior is designed to maximize business disruption and prevent easy restoration.
Alleged Sale of The Gentlemen-Related Data
During our dark web monitoring, a forum activity was identified in which an unknown actor claimed to have access to data allegedly related to The Gentlemen ransomware group.

Figure 9. The Gentlemen’s data advertised on a dark web forum.
The actor offered the full dataset for sale for US$10,000, requesting payment in Bitcoin, and invited interested buyers to contact them for samples.

Figure 10. Sample files published by the dark web poster to prove the authenticity of his claims.
As proof, the forum actor published material allegedly taken from the group’s internal environment. One post included content that appears to be an /etc/shadow file, which also contained actor names or nicknames, as observed across other platforms, discussions, and underground offers. This may indicate an attempt to demonstrate access to infrastructure or systems associated with the ransomware operation.
Another dark web forum post made a similar claim of access to The Gentlemen related data and provided additional alleged proof. The posted material reportedly included one of the threat actor’s nicknames previously visible in the mentioned file content, a related credential reference, chat conversations that may represent the victim negotiation preparation process, and mapping data that appears to describe collected files or directories from victim machines. If authentic, this type of material could indicate exposure not only of victim data, but also of internal operational artifacts linked to the ransomware group or its affiliates.

Figure 11. Company name spotted on the shared screenshot.
Among the listed items, the name JN Aceros was mentioned. JN Aceros appears to refer to J.N. Aceros S.A., a Peru-based company focused on the import and commercialization of stainless-steel products, including tubes, sheets, bars, plates, and related materials. Public ransomware tracking also lists JN Aceros as a victim claimed by The Gentlemen, with the claim discovered on September 9, 2025. This overlap makes the reference relevant, but it does not independently confirm the authenticity of the newly offered forum data.

Figure 12. A screenshot of a part of a file included in the leaked data claims.
One of the screenshots attached to the data allegedly leaked from The Gentlemen’s servers appears to show a plaintext log, export, or working note connected to the preparation of a ransomware leak-site post. The content includes Russian-language discussion, actor handles such as “xanax,” “donpakto,” and “Protagor,” as well as onion links and a structured list of allegedly stolen data. The visible material does not look like a standard victim file directory. It appears closer to actor-side operational content, possibly a chat export, backend note, draft publication text, or affiliate workspace artifact.
The main topic of the screenshot appears to be the preparation of an extortion message for a victim in the mining, energy, or natural resources sector. The listed stolen data categories include production and technological information, geological data about deposits, mining and processing plans, financial and commercial information, contracts, bank details, management strategy, employee personal data, occupational health and safety documents, and environmental or regulatory records. The same content appears in both Russian and English, which may indicate that the actors were preparing or translating a public-facing leak description. The text also includes pressure language claiming that, if the victim does not contact the actors, the data may be shared with competitors, members of the media, and the authorities.
The numeric values visible in the log may represent spreadsheet-style date or time values. If interpreted as Excel-style serial dates, they could correspond to early February 2026, but this should not be treated as confirmed without access to the original source file, time zone context, and metadata. The screenshot also contains Onion links that appear to reference a group.
From a threat intelligence perspective, the screenshot is relevant because it may show more than stolen victim data. It may expose elements of the ransomware group’s internal or affiliate-side workflow, including actor handles, publication preparation, victim pressure messaging, and possible leak site references. However, the current evidence remains limited to a screenshot. It is not enough to confirm that the data came directly from The Gentlemen’s own infrastructure. The material could be genuine actor-side data, an affiliate leak, copied negotiation or publication content, recycled victim material, or a proof package assembled by a third party.
For responsible delivery, this finding should be presented as an unverified intelligence lead under investigation, not as a confirmed compromise of The Gentlemen's infrastructure. At this stage, the source and authenticity of the offered data cannot be verified. The data remains under investigation.
Conclusions
The Gentlemen should be assessed as a mature, data-driven extortion ecosystem rather than only a ransomware group publishing victim names. Its leak site activity, communication channels, victim countdowns, and negotiation pressure show that stolen data is central to its operation. Even when systems can be restored, the remaining risks include public disclosure, resale of stolen data, regulatory exposure, and reputational damage.
The victim dataset shows rapid disclosure growth during Q1 and Q2 2026, including several high-volume publication days and a broad geographic spread. This pattern suggests scalable affiliate activity and coordinated leak site management rather than isolated incidents. The group’s focus on professional services, manufacturing, technology, healthcare, logistics, financial services, and other commercially sensitive sectors indicates a clear interest in organizations holding valuable operational, customer, employee, financial, and contractual data.
The recently observed dark web posts offering data allegedly connected to The Gentlemen add an important but still unverified intelligence lead. The claims reference actor-side artifacts, possible negotiation material, victim mapping data, and samples allegedly taken from the group’s own environment. If validated, this could expose internal workflows, affiliate activity, victim references, infrastructure details, or data-handling practices within the ransomware operation itself. Until confirmed, the material should be treated carefully and monitored alongside leak-site publications, resale posts, actor handles, file samples, and victim-data overlaps.
Remediations
Organizations should first review internet-facing exposure, especially VPNs, firewalls, remote access portals, and management interfaces. Any exposed administrative panel should be restricted, patched, monitored, and protected with MFA. Logs from perimeter devices should be reviewed for suspicious administrative sessions, new accounts, configuration changes, and authentication anomalies.
Credential security should be treated as a priority. This includes enforcing MFA, rotating credentials exposed in stealer logs or previous breaches, disabling stale accounts, reviewing privileged group membership, and monitoring for unusual use of domain administrator accounts. Service accounts should be reviewed for excessive permissions and interactive login capability.
From an operational resilience perspective, organizations should verify offline or immutable backups, test restoration procedures, isolate backup infrastructure from the domain, restrict access to virtualization management, and segment critical servers from user workstations. The ability to restore ESXi and core business systems should be tested before an incident occurs.
Threat hunting should focus on early-stage ransomware behaviors: reconnaissance, remote access tooling, file transfer tools, process termination, security-control tampering, suspicious GPO modifications, and lateral movement. Detection engineering should avoid relying only on known hashes, because affiliate tooling and payload builds may change frequently.
Detection should prioritize behaviors that appear before encryption. The most valuable opportunities are suspicious remote access, abnormal administrative activity, scanning, credential abuse, security control tampering, and domain-wide deployment preparation.
High-value detection areas include unusual VPN or firewall administration activity, new privileged accounts, suspicious logins from unexpected geographies, AnyDesk installation outside approved IT procedures, Nmap or Advanced IP Scanner execution from servers, WinSCP activity from unusual hosts, BYOVD driver loading, broad Defender exclusions, mass service-stopping activity, ransomware-like file rename patterns, unexpected GPO changes, payload staging in NETLOGON, and large outbound transfers before encryption.
Special attention should be given to virtualization environments. ESXi hosts, vCenter, backup servers, storage systems, and management networks should be monitored for unusual authentication, SSH activity, file modification, VM shutdown commands, and unexpected encryption-related artifacts.
Appendix 1: TTPs Used by The Gentlemen
The Gentlemen’s activity follows a mature ransomware-as-a-service intrusion model. The group’s affiliates appear to rely on a combination of exposed perimeter infrastructure, compromised credentials, valid accounts, and access obtained from the wider cybercriminal ecosystem. Public reporting highlights abuse of internet-facing services, VPN or firewall access, and FortiGate-related exposure as relevant initial access paths. The group’s recruitment of affiliates and penetration testers also suggests that intrusion methods may vary between cases depending on the operator involved.
|
Attack Stage |
Observed or Reported TTPs |
|
Initial Access |
Exploitation of exposed internet-facing services, VPN or firewall access, compromised credentials, valid accounts, and access obtained through affiliates or access brokers. |
|
Reconnaissance |
Internal network scanning, Active Directory enumeration, discovery of domain administrators, enterprise administrators, local groups, network shares, and VMware or backup-related systems. |
|
Execution |
Use of PowerShell, Windows command shell, PsExec, WMI, and administrative utilities to run commands and deploy payloads. |
|
Persistence |
Use of remote access tooling and proxy malware, including AnyDesk and SystemBC, to maintain access or support follow-on activity. |
|
Privilege Escalation |
Abuse of privileged accounts, administrative tools, and utilities such as PowerRun to execute with elevated permissions. |
|
Defense Evasion |
Disabling or attempting to bypass security tools, use of BYOVD-style driver abuse, process termination, and modification of security-related settings. |
|
Lateral Movement |
Use of PsExec, WMI, SMB/admin shares, remote services, Group Policy, and NETLOGON-based payload staging. |
|
Collection and Exfiltration |
Use of file transfer tools such as WinSCP and encrypted channels to stage and exfiltrate victim data before encryption. |
|
Command and Control |
Use of Cobalt Strike and SystemBC infrastructure for remote control, tunneling, payload delivery, and post-exploitation activity. |
|
Impact |
Encryption of files across Windows and Linux environments, targeting of servers, shares, NAS systems, and ESXi or virtualization infrastructure, followed by leak-site pressure and victim negotiation. |
Table 4. TTPs used by The Gentlemen ransomware group.
The group’s pre-encryption activity is especially important for detection. Reported intrusions include network scanning with tools such as Advanced IP Scanner and Nmap, the use of AnyDesk for remote access, WinSCP for data transfer, and PsExec or WMI for lateral execution. This indicates that defenders should not wait for ransomware artifacts but should prioritize the detection of abnormal administrative behavior, unusual remote access, privilege escalation, domain enumeration, and file staging.
The Gentlemen has also been associated with more advanced post-exploitation infrastructure. Recent reporting describes the attempted deployment of SystemBC, a proxy malware used to create SOCKS5 tunnels, support covert access, and deliver additional payloads. The same activity involved Cobalt Strike infrastructure, showing that affiliates may use a broader toolchain before ransomware deployment. This reinforces the need to hunt for C2 traffic, suspicious outbound connections, unknown proxy behavior, and unexpected beaconing from internal systems.
For deployment and impact, the group has been observed using domain-level mechanisms such as Group Policy and NETLOGON-based staging to push ransomware across compromised environments. Its advertised and reported multi-platform capability, including Windows, Linux, NAS, BSD, and VMware ESXi systems, increases the potential business impact because compromise may affect endpoints, servers, file shares, backup systems, and virtualization infrastructure at the same time.
The following MITRE ATT&CK mapping summarizes the main tactics and techniques associated with The Gentlemen ransomware activity. The mapping is intended to support detection engineering, threat hunting, and incident response prioritization, and should be validated against the customer’s own telemetry.
|
Tactic |
Technique ID |
Technique Name |
Relevance to The Gentlemen Activity |
|
Initial Access |
T1190 |
Exploit Public-Facing Application |
Possible exploitation of exposed VPN, firewall, or perimeter infrastructure. |
|
Initial Access |
T1078 |
Valid Accounts |
Use of compromised credentials, VPN accounts, remote access accounts, or access obtained through affiliates. |
|
Discovery |
T1087 |
Account Discovery |
Enumeration of local and domain accounts during internal reconnaissance. |
|
Discovery |
T1069 |
Permission Groups Discovery |
Discovery of privileged groups, including domain administrators and other high-value groups. |
|
Discovery |
T1046 |
Network Service Discovery |
Internal scanning to identify reachable hosts, open services, and network structure. |
|
Discovery |
T1018 |
Remote System Discovery |
Identification of servers, endpoints, shares, and infrastructure systems for lateral movement or encryption. |
|
Execution |
T1059 |
Command and Scripting Interpreter |
Use of PowerShell, Windows command shell, or scripts to execute commands and deploy payloads. |
|
Lateral Movement |
T1021 |
Remote Services |
Use of remote services to move across the compromised environment. |
|
Lateral Movement |
T1021.002 |
SMB / Windows Admin Shares |
Use of SMB and administrative shares for payload staging, remote access, or deployment. |
|
Lateral Movement |
T1570 |
Lateral Tool Transfer |
Transfer of tools, payloads, or ransomware binaries between internal systems. |
|
Defense Evasion |
T1562 |
Impair Defenses |
Attempts to disable, bypass, or modify security controls before ransomware deployment. |
|
Defense Evasion |
T1562.001 |
Disable or Modify Tools |
Disabling or modifying endpoint protection, security tools, or monitoring controls. |
|
Defense Evasion / Lateral Movement |
T1484.001 |
Group Policy Modification |
Abuse or modification of Group Policy for domain-wide deployment or environment changes. |
|
Exfiltration |
T1048 |
Exfiltration Over Alternative Protocol |
Exfiltration of collected data using attacker-controlled or non-standard transfer methods. |
|
Impact |
T1486 |
Data Encrypted for Impact |
Encryption of files and systems as the final ransomware impact stage. |
|
Impact |
T1489 |
Service Stop |
Stopping database, backup, security, or business application services before encryption. |
These techniques show that The Gentlemen should be monitored as a full intrusion lifecycle threat, not only as a final stage encryptor.
Appendix 2: IOCs
|
Type/Description |
Value/SHA256 |
|
C2 Server |
91.107.247[.]163 |
|
SystemBC C2 |
45.86.230[.]112 |
|
SystemBC |
992c951f4af57ca7cd8396f5ed69c2199fd6fd4ae5e93726da3e198e78bec0a5 |
|
The Gentlemen Windows ransomware |
025fc0976c548fb5a880c83ea3eb21a5f23c5d53c4e51e862bb893c11adf712a |
|
The Gentlemen Windows ransomware |
22b38dad7da097ea03aa28d0614164cd25fafeb1383dbc15047e34c8050f6f67 |
|
The Gentlemen Windows ransomware |
2ed9494e9b7b68415b4eb151c922c82c0191294d0aa443dd2cb5133e6bfe3d5d |
|
The Gentlemen Windows ransomware |
3ab9575225e00a83a4ac2b534da5a710bdcf6eb72884944c437b5fbe5c5c9235 |
|
The Gentlemen Windows ransomware |
48d9b2ce4fcd6854a3164ce395d7140014e0b58b77680623f3e4ca22d3a6e7fd |
|
The Gentlemen Windows ransomware |
62c2c24937d67fdeb43f2c9690ab10e8bb90713af46945048db9a94a465ffcb8 |
|
The Gentlemen Windows ransomware |
860a6177b055a2f5aa61470d17ec3c69da24f1cdf0a782237055cba431158923 |
|
The Gentlemen Windows ransomware |
87d25d0e5880b3b5cd30106853cbfc6ef1ad38966b30d9bd5b99df46098e546c |
|
The Gentlemen Windows ransomware |
8c87134c1b45e990e9568f0a3899b0076f94be16d3c40fa824ac1e6c6ee892db |
|
The Gentlemen Windows ransomware |
91415e0b9fe4e7cbe43ec0558a7adf89423de30d22b00b985c2e4b97e75076b1 |
|
The Gentlemen Windows ransomware |
994d6d1edb57f945f4284cc0163ec998861c7496d85f6d45c08657c9727186e3 |
|
The Gentlemen Windows ransomware |
9f61ff4deb8afced8b1ecdc8787a134c63bde632b18293fbfc94a91749e3e454 |
|
The Gentlemen Windows ransomware |
a7a19cab7aab606f833fa8225bc94ec9570a6666660b02cc41a63fe39ea8b0ad |
|
The Gentlemen Windows ransomware |
b67958afc982cafbe1c3f114b444d7f4c91a88a3e7a86f89ab8795ac2110d1e6 |
|
The Gentlemen Windows ransomware |
c46b5a18ab3fb5fd1c5c8288a41c75bf0170c10b5e829af89370a12c86dd10f8 |
|
The Gentlemen Windows ransomware |
c7f7b5a6e7d93221344e6368c7ab4abf93e162f7567e1a7bcb8786cb8a183a73 |
|
The Gentlemen Windows ransomware |
ec368ae0b4369b6ef0da244774995c819c63cffb7fd2132379963b9c1640ccd2 |
|
The Gentlemen Windows ransomware |
efaf8e7422ffd09c7f03f1a5b4e5c2cc32b05334c18d1ccb9673667f8f43108f |
|
The Gentlemen Windows ransomware |
f736be55193c77af346dbe905e25f6a1dee3ec1aedca8989ad2088e4f6576b12 |
|
The Gentlemen Windows ransomware |
fc75ed2159e0c8274076e46a37671cfb8d677af9f586224da1713df89490a958 |
|
gentlemen.bmp |
fe1033335a045c696c900d435119d210361966e2fb5cd1ba3382608cfa2c8e68 |
|
The Gentlemen Linux ransomware |
5dc607c8990841139768884b1b43e1403496d5a458788a1937be139594f01dca |
|
Initial KillAV |
7a311b584497e8133cd85950fec6132904dd5b02388a9feed3f5e057fb891d09 |
|
PowerRun |
4c82fbafef9bab484a2fbe23e4ec8aac06e8e296d6c9e496f4a589f97fd4ab71 |
ABOUT LEVELBLUE
LevelBlue secures what's next with intelligence-led security delivering visibility and speed to stop threats faster. As the world’s largest and most analyst-recognized pure-play managed security services provider, our AI-powered managed services and cyber expertise across managed, advisory, and incident response services help clients operate with confidence. Learn more about us.
https://www.levelblue.com/resources/blogs/internal-blog/how-to-create-a-blog-post/