LevelBlue + SentinelOne Partner to Deliver AI-Powered Managed Security Operations and Incident Response. Learn More

A Closer Look at The Gentlemen’s Alleged Leak

Executive Summary

The Gentlemen is an active ransomware and extortion operation that emerged publicly in the second half of 2025 and rapidly scaled into a high-volume threat actor. Rather than a fully new group, it seems to be a continuation or reorganization of prior ransomware affiliate activity, with links to the Qilin ecosystem and the Russian-speaking actor “hastalamuerte". Its growth likely reflects existing ransomware experience, affiliate relationships, and access to resources.

Gentlemen-Figure-1
Figure 1. The Gentlemen’s related Illustration spotted on the dark web.

The group has demonstrated capability against enterprise environments, including Windows, Linux, NAS, BSD, and VMware ESXi systems. Observed activity includes the abuse of exposed remote access infrastructure, compromised credentials, network reconnaissance, legitimate administrative tools, security tool disabling, data exfiltration, and domain-wide ransomware deployment.

A new relevant finding is that underground sources show attempts to sell data claimed to be connected to The Gentlemen ransomware activity. At this stage, the available information is limited and does not provide enough victim-specific or technical details to confirm the data’s origin, freshness, or authenticity. This finding should be treated as a separate intelligence lead requiring further validation.

The Gentlemen should be assessed as a financially motivated ransomware threat with growing operational maturity, aggressive affiliate recruitment, and strong potential to cause both operational disruption and data-exposure impact.

 

Analytical Assessment

The Gentlemen represents a mature and fast-growing ransomware threat. Its significance is not only in its malware, but in its operating model, affiliate recruitment, multi-platform capability, and use of the wider cybercriminal access economy. The group benefits from the same conditions that support many modern ransomware operations: exposed remote infrastructure, weak identity controls, credential theft, access brokerage, and poor segmentation.

The Gentlemen may not be a fully new ransomware ecosystem, but rather a structured continuation of prior affiliate activity. The operation has evolved from an earlier affiliate group associated with the Qilin ransomware ecosystem and is reportedly managed by a Russian-speaking actor known as hastalamuerte. This context is important because it suggests that The Gentlemen benefits from existing ransomware experience, operational knowledge, affiliate relationships, and access to resources rather than building capability from scratch.

Figure 2. The Gentlemen’s account on X
Figure 2. The Gentlemen’s account on X.

For affected or potentially exposed organizations, the main risk is not limited to encryption. The broader risk includes data exposure, regulatory impact, business interruption, credential compromise, third-party exposure, and reputational damage. Defensive response should therefore combine incident response readiness, external exposure management, identity security, backup resilience, and dark web monitoring.

The Gentlemen uses data theft as a core part of its pressure strategy. Stolen data may be uploaded to the group’s infrastructure or listed on its leak site if the victim does not negotiate. The group’s extortion model therefore extends beyond encryption alone. Even if an organization restores systems from backups, the risk of data exposure, regulatory impact, customer notification obligations, and reputational damage may remain.

 

Operational Model

The Gentlemen’s operating model follows a mature ransomware workflow. Initial access is likely obtained through a combination of exposed remote services, compromised credentials, VPN or firewall abuse, purchased access, and credential material sourced from stealer logs or access brokers. After gaining access, affiliates typically conduct internal reconnaissance, identify privileged users, map Active Directory, enumerate reachable hosts, disable security tools, stage data, and deploy ransomware across the environment.

Figure 3. The Gentlemen’s advertising banner, showing encryption launching
Figure 3. The Gentlemen’s advertising banner, showing encryption launching.

The group’s affiliate panel is reported to support victim management, payload generation, ransom note customization, victim revenue estimation, stolen data uploads, negotiation channel configuration, and decryptor management. This indicates a structured backend environment rather than an isolated malware campaign.

Figure 4. The Gentlemen’s advertising banner
Figure 4. The Gentlemen’s advertising banner.

Negotiations are not always handled directly through the public leak portal. In some cases, communication appears to be delegated to affiliate-controlled Tox or Session identifiers. This makes tracking incidents more difficult because communication channels may vary between intrusions.

 

The Gentlemen’s Statistics

From a purely statistical standpoint, 2026 marks the inflection year for The Gentlemen ransomware operation. Leak site monitoring shows that the group publicly claimed 352 attacks during the incomplete first part of 2026 (May 10, 2026). This places The Gentlemen among the top two most active ransomware groups globally in 2026, despite being less than a year old at the start of the reporting period.

Figure 5. The Gentlemen’s blog
Figure 5. The Gentlemen’s blog.

The most revealing trend is the velocity of disclosures rather than the cumulative number alone. Activity increased sharply in Q1 to Q2 2026, with February and April standing out as the most active months in the dataset. In the normalized view, Q1 2026 accounts for around 219 unique disclosure records, while Q2 2026 up to May 10, 2026, already accounts for around 133 records. Several days show unusually high publication volume, including January 20, 2026, February 6, 2026, April 8, 2026, and April 14, 2026, when the group listed large batches of victims. This pattern suggests either coordinated batch publication, multiple active affiliates, or both, and supports the assessment that The Gentlemen operates with broad affiliate concurrency rather than isolated single-operator activity.

Figure 6. The Gentlemen’s victim distribution by sector
Figure 6. The Gentlemen’s victim distribution by sector.

Sector

Count

Percent

Professional Services

66

18.80%

Manufacturing

63

17.90%

Technology

41

11.60%

Healthcare

31

8.80%

Transportation & Logistics

23

6.50%

Agriculture & Food

21

6.00%

Financial Services

16

4.50%

Construction

14

4.00%

Education

13

3.70%

Government & Public Sector

12

3.40%

Hospitality & Tourism

10

2.80%

Energy & Utilities

10

2.80%


Table
1. The Gentlemen's distribution of victims by sector.

The victims’ sector distribution shows a strong concentration in business and industrial environments. Professional services and manufacturing represent the two largest categories, together accounting for nearly 37% of all records. They are followed by technology, healthcare, transportation and logistics, financial services, agriculture and food, education, construction, and government/public sector. This distribution indicates that The Gentlemen is not limited to one vertical; however, the repeated appearance of manufacturing, professional services, technology, and healthcare suggests a preference for organizations with complex operational networks, valuable business data, and higher disruption potential.

Figure 7. Distribution of victims by geographical region
Figure 7. Distribution of victims by geographical region.

Region

Count

Percent

APAC

101

28.70%

Europe

100

28.40%

Latin America

59

16.80%

United States & Canada

55

15.60%

Middle East

19

5.40%

Africa

14

4.00%

Unknown

4

1.10%


Table
2. Distribution of victims by geographical region.

Geographically, the dataset shows broad international activity across approximately 70 countries, with no single region fully dominating the victim list. In the normalized data, APAC represents the largest regional share, followed by Europe, Latin America, and the United States and Canada.

Figure 8. Distribution of victims by country
Figure 8. Distribution of victims by country.

Country

Count

Percent

United States

46

13.10%

Thailand

30

8.50%

France

19

5.40%

El Salvador

14

4.00%

Japan

13

3.70%

Brazil

13

3.70%

Italy

13

3.70%

Taiwan

12

3.40%

Germany

12

3.40%

India

12

3.40%

United Kingdom

11

3.10%

Canada

9

2.60%

Poland

8

2.30%

Colombia

8

2.30%

Turkey

8

2.30%

Czechia

7

2.00%

Malaysia

7

2.00%

Mexico

7

2.00%

China

7

2.00%


Table 3. Distribution of victims by country.

At the country level, the United States is the most frequently listed country, followed by Thailand, France, El Salvador, Italy, Brazil, Japan, India, Germany, and Taiwan. The concentration across APAC, Europe, Latin America, and North America suggests a globally distributed target set, while the absence of Russia and CIS countries in the dataset remains consistent with the group’s reported affiliate rules and broader Russian-speaking ransomware targeting patterns.

Dedicated to hunting and eradicating the world's most challenging threats.

SpiderLabs

The group’s activity is concentrated on organizations with commercially valuable data and exposed attack surfaces, rather than on a single strategic sector. While healthcare, financial services, government, energy, logistics, and telecommunications remain high-risk categories, the broader pattern indicates opportunistic targeting across industries. This supports the assessment that The Gentlemen’s growth is driven by affiliate scale, exposed perimeter infrastructure, valid credential abuse, and monetizable business data.

Crucially, experienced analysts caution that leak site victim counts materially underrepresent real compromise activity. During a 2026 incident response investigation, researchers correlated The Gentlemen’s use of the SystemBC proxy infrastructure. They identified telemetry from over 1,570 enterprise environments, many of which never appeared on the group’s public shame site. This indicates that the 692 publicly disclosed victims in 2026 likely represents only organizations that refused to pay, not the full scale of its intrusion activity.

Taken together, the 2026 statistics paint a clear picture: The Gentlemen’s growth is not episodic but structural. The aggressive affiliate economics, rapid exploitation of internet-facing systems, and short time-to-encryption cycles have translated directly into rising victim counts. From a defensive standpoint, these numbers should be interpreted not as retrospective reporting but as a leading indicator of continued high volume ransomware risk, particularly for industrial and infrastructure-adjacent organizations.

 

The Gentlemen’s Malware Capabilities

The Gentlemen ransomware includes multi-platform capabilities. Public technical analysis indicates support for Windows, Linux, NAS, BSD, and ESXi environments. This is important because attacks against ESXi and virtualization infrastructure can rapidly disrupt entire server estates and critical business applications.

The Windows locker has been reported as Go-based and requires a password parameter during execution. This type of execution control may reduce accidental detonation, limit sandbox analysis, and allow affiliates to control when and where the payload runs.

The ransomware has been associated with the ransom note name:

  • README-GENTLEMEN.txt

Observed encrypted file extensions include:

  • .7mtzhh
  • .ojuopo
  • variable six-character extensions

The encryption logic reportedly uses a hybrid encryption approach and may support configurable encryption modes. Smaller files may be fully encrypted, while larger files may be partially encrypted in chunks to accelerate impact. This allows the actor to damage large file repositories faster while still making recovery difficult without backups or decryptors.

Before encryption, the malware attempts to stop services and processes associated with databases, backup software, virtualization platforms, remote access tools, and enterprise applications. This behavior is designed to maximize business disruption and prevent easy restoration.

 

Alleged Sale of The Gentlemen-Related Data

During our dark web monitoring, a forum activity was identified in which an unknown actor claimed to have access to data allegedly related to The Gentlemen ransomware group.

Figure 9. The Gentlemen’s data advertised on a dark web forum
Figure 9. The Gentlemen’s data advertised on a dark web forum.

The actor offered the full dataset for sale for US$10,000, requesting payment in Bitcoin, and invited interested buyers to contact them for samples.

Figure 10. Sample files published by the dark web poster to prove the authenticity of his claims
Figure 10. Sample files published by the dark web poster to prove the authenticity of his claims.

As proof, the forum actor published material allegedly taken from the group’s internal environment. One post included content that appears to be an /etc/shadow file, which also contained actor names or nicknames, as observed across other platforms, discussions, and underground offers. This may indicate an attempt to demonstrate access to infrastructure or systems associated with the ransomware operation.

Another dark web forum post made a similar claim of access to The Gentlemen related data and provided additional alleged proof. The posted material reportedly included one of the threat actor’s nicknames previously visible in the mentioned file content, a related credential reference, chat conversations that may represent the victim negotiation preparation process, and mapping data that appears to describe collected files or directories from victim machines. If authentic, this type of material could indicate exposure not only of victim data, but also of internal operational artifacts linked to the ransomware group or its affiliates.

Figure 11. Company name spotted on the shared screenshot
Figure 11. Company name spotted on the shared screenshot.

Among the listed items, the name JN Aceros was mentioned. JN Aceros appears to refer to J.N. Aceros S.A., a Peru-based company focused on the import and commercialization of stainless-steel products, including tubes, sheets, bars, plates, and related materials. Public ransomware tracking also lists JN Aceros as a victim claimed by The Gentlemen, with the claim discovered on September 9, 2025. This overlap makes the reference relevant, but it does not independently confirm the authenticity of the newly offered forum data.

Figure 12. A screenshot of a part of a file included in the leaked data claims
Figure 12. A screenshot of a part of a file included in the leaked data claims.

One of the screenshots attached to the data allegedly leaked from The Gentlemen’s servers appears to show a plaintext log, export, or working note connected to the preparation of a ransomware leak-site post. The content includes Russian-language discussion, actor handles such as “xanax,” “donpakto,” and “Protagor,” as well as onion links and a structured list of allegedly stolen data. The visible material does not look like a standard victim file directory. It appears closer to actor-side operational content, possibly a chat export, backend note, draft publication text, or affiliate workspace artifact.

The main topic of the screenshot appears to be the preparation of an extortion message for a victim in the mining, energy, or natural resources sector. The listed stolen data categories include production and technological information, geological data about deposits, mining and processing plans, financial and commercial information, contracts, bank details, management strategy, employee personal data, occupational health and safety documents, and environmental or regulatory records. The same content appears in both Russian and English, which may indicate that the actors were preparing or translating a public-facing leak description. The text also includes pressure language claiming that, if the victim does not contact the actors, the data may be shared with competitors, members of the media, and the authorities.

The numeric values visible in the log may represent spreadsheet-style date or time values. If interpreted as Excel-style serial dates, they could correspond to early February 2026, but this should not be treated as confirmed without access to the original source file, time zone context, and metadata. The screenshot also contains Onion links that appear to reference a group.

From a threat intelligence perspective, the screenshot is relevant because it may show more than stolen victim data. It may expose elements of the ransomware group’s internal or affiliate-side workflow, including actor handles, publication preparation, victim pressure messaging, and possible leak site references. However, the current evidence remains limited to a screenshot. It is not enough to confirm that the data came directly from The Gentlemen’s own infrastructure. The material could be genuine actor-side data, an affiliate leak, copied negotiation or publication content, recycled victim material, or a proof package assembled by a third party.

For responsible delivery, this finding should be presented as an unverified intelligence lead under investigation, not as a confirmed compromise of The Gentlemen's infrastructure. At this stage, the source and authenticity of the offered data cannot be verified. The data remains under investigation.

 

Conclusions

The Gentlemen should be assessed as a mature, data-driven extortion ecosystem rather than only a ransomware group publishing victim names. Its leak site activity, communication channels, victim countdowns, and negotiation pressure show that stolen data is central to its operation. Even when systems can be restored, the remaining risks include public disclosure, resale of stolen data, regulatory exposure, and reputational damage.

The victim dataset shows rapid disclosure growth during Q1 and Q2 2026, including several high-volume publication days and a broad geographic spread. This pattern suggests scalable affiliate activity and coordinated leak site management rather than isolated incidents. The group’s focus on professional services, manufacturing, technology, healthcare, logistics, financial services, and other commercially sensitive sectors indicates a clear interest in organizations holding valuable operational, customer, employee, financial, and contractual data.

The recently observed dark web posts offering data allegedly connected to The Gentlemen add an important but still unverified intelligence lead. The claims reference actor-side artifacts, possible negotiation material, victim mapping data, and samples allegedly taken from the group’s own environment. If validated, this could expose internal workflows, affiliate activity, victim references, infrastructure details, or data-handling practices within the ransomware operation itself. Until confirmed, the material should be treated carefully and monitored alongside leak-site publications, resale posts, actor handles, file samples, and victim-data overlaps.

 

Remediations

Organizations should first review internet-facing exposure, especially VPNs, firewalls, remote access portals, and management interfaces. Any exposed administrative panel should be restricted, patched, monitored, and protected with MFA. Logs from perimeter devices should be reviewed for suspicious administrative sessions, new accounts, configuration changes, and authentication anomalies.

Credential security should be treated as a priority. This includes enforcing MFA, rotating credentials exposed in stealer logs or previous breaches, disabling stale accounts, reviewing privileged group membership, and monitoring for unusual use of domain administrator accounts. Service accounts should be reviewed for excessive permissions and interactive login capability.

From an operational resilience perspective, organizations should verify offline or immutable backups, test restoration procedures, isolate backup infrastructure from the domain, restrict access to virtualization management, and segment critical servers from user workstations. The ability to restore ESXi and core business systems should be tested before an incident occurs.

Threat hunting should focus on early-stage ransomware behaviors: reconnaissance, remote access tooling, file transfer tools, process termination, security-control tampering, suspicious GPO modifications, and lateral movement. Detection engineering should avoid relying only on known hashes, because affiliate tooling and payload builds may change frequently.

Detection should prioritize behaviors that appear before encryption. The most valuable opportunities are suspicious remote access, abnormal administrative activity, scanning, credential abuse, security control tampering, and domain-wide deployment preparation.

High-value detection areas include unusual VPN or firewall administration activity, new privileged accounts, suspicious logins from unexpected geographies, AnyDesk installation outside approved IT procedures, Nmap or Advanced IP Scanner execution from servers, WinSCP activity from unusual hosts, BYOVD driver loading, broad Defender exclusions, mass service-stopping activity, ransomware-like file rename patterns, unexpected GPO changes, payload staging in NETLOGON, and large outbound transfers before encryption.

Special attention should be given to virtualization environments. ESXi hosts, vCenter, backup servers, storage systems, and management networks should be monitored for unusual authentication, SSH activity, file modification, VM shutdown commands, and unexpected encryption-related artifacts.

 

Appendix 1: TTPs Used by The Gentlemen

The Gentlemen’s activity follows a mature ransomware-as-a-service intrusion model. The group’s affiliates appear to rely on a combination of exposed perimeter infrastructure, compromised credentials, valid accounts, and access obtained from the wider cybercriminal ecosystem. Public reporting highlights abuse of internet-facing services, VPN or firewall access, and FortiGate-related exposure as relevant initial access paths. The group’s recruitment of affiliates and penetration testers also suggests that intrusion methods may vary between cases depending on the operator involved.

Attack Stage

Observed or Reported TTPs

Initial Access

Exploitation of exposed internet-facing services, VPN or firewall access, compromised credentials, valid accounts, and access obtained through affiliates or access brokers.

Reconnaissance

Internal network scanning, Active Directory enumeration, discovery of domain administrators, enterprise administrators, local groups, network shares, and VMware or backup-related systems.

Execution

Use of PowerShell, Windows command shell, PsExec, WMI, and administrative utilities to run commands and deploy payloads.

Persistence

Use of remote access tooling and proxy malware, including AnyDesk and SystemBC, to maintain access or support follow-on activity.

Privilege Escalation

Abuse of privileged accounts, administrative tools, and utilities such as PowerRun to execute with elevated permissions.

Defense Evasion

Disabling or attempting to bypass security tools, use of BYOVD-style driver abuse, process termination, and modification of security-related settings.

Lateral Movement

Use of PsExec, WMI, SMB/admin shares, remote services, Group Policy, and NETLOGON-based payload staging.

Collection and Exfiltration

Use of file transfer tools such as WinSCP and encrypted channels to stage and exfiltrate victim data before encryption.

Command and Control

Use of Cobalt Strike and SystemBC infrastructure for remote control, tunneling, payload delivery, and post-exploitation activity.

Impact

Encryption of files across Windows and Linux environments, targeting of servers, shares, NAS systems, and ESXi or virtualization infrastructure, followed by leak-site pressure and victim negotiation.


Table 4. TTPs used by The Gentlemen ransomware group.

The group’s pre-encryption activity is especially important for detection. Reported intrusions include network scanning with tools such as Advanced IP Scanner and Nmap, the use of AnyDesk for remote access, WinSCP for data transfer, and PsExec or WMI for lateral execution. This indicates that defenders should not wait for ransomware artifacts but should prioritize the detection of abnormal administrative behavior, unusual remote access, privilege escalation, domain enumeration, and file staging.

The Gentlemen has also been associated with more advanced post-exploitation infrastructure. Recent reporting describes the attempted deployment of SystemBC, a proxy malware used to create SOCKS5 tunnels, support covert access, and deliver additional payloads. The same activity involved Cobalt Strike infrastructure, showing that affiliates may use a broader toolchain before ransomware deployment. This reinforces the need to hunt for C2 traffic, suspicious outbound connections, unknown proxy behavior, and unexpected beaconing from internal systems.

For deployment and impact, the group has been observed using domain-level mechanisms such as Group Policy and NETLOGON-based staging to push ransomware across compromised environments. Its advertised and reported multi-platform capability, including Windows, Linux, NAS, BSD, and VMware ESXi systems, increases the potential business impact because compromise may affect endpoints, servers, file shares, backup systems, and virtualization infrastructure at the same time.

The following MITRE ATT&CK mapping summarizes the main tactics and techniques associated with The Gentlemen ransomware activity. The mapping is intended to support detection engineering, threat hunting, and incident response prioritization, and should be validated against the customer’s own telemetry.

Tactic

Technique ID

Technique Name

Relevance to The Gentlemen Activity

Initial Access

T1190

Exploit Public-Facing Application

Possible exploitation of exposed VPN, firewall, or perimeter infrastructure.

Initial Access

T1078

Valid Accounts

Use of compromised credentials, VPN accounts, remote access accounts, or access obtained through affiliates.

Discovery

T1087

Account Discovery

Enumeration of local and domain accounts during internal reconnaissance.

Discovery

T1069

Permission Groups Discovery

Discovery of privileged groups, including domain administrators and other high-value groups.

Discovery

T1046

Network Service Discovery

Internal scanning to identify reachable hosts, open services, and network structure.

Discovery

T1018

Remote System Discovery

Identification of servers, endpoints, shares, and infrastructure systems for lateral movement or encryption.

Execution

T1059

Command and Scripting Interpreter

Use of PowerShell, Windows command shell, or scripts to execute commands and deploy payloads.

Lateral Movement

T1021

Remote Services

Use of remote services to move across the compromised environment.

Lateral Movement

T1021.002

SMB / Windows Admin Shares

Use of SMB and administrative shares for payload staging, remote access, or deployment.

Lateral Movement

T1570

Lateral Tool Transfer

Transfer of tools, payloads, or ransomware binaries between internal systems.

Defense Evasion

T1562

Impair Defenses

Attempts to disable, bypass, or modify security controls before ransomware deployment.

Defense Evasion

T1562.001

Disable or Modify Tools

Disabling or modifying endpoint protection, security tools, or monitoring controls.

Defense Evasion / Lateral Movement

T1484.001

Group Policy Modification

Abuse or modification of Group Policy for domain-wide deployment or environment changes.

Exfiltration

T1048

Exfiltration Over Alternative Protocol

Exfiltration of collected data using attacker-controlled or non-standard transfer methods.

Impact

T1486

Data Encrypted for Impact

Encryption of files and systems as the final ransomware impact stage.

Impact

T1489

Service Stop

Stopping database, backup, security, or business application services before encryption.


These techniques show that The Gentlemen should be monitored as a full intrusion lifecycle threat, not only as a final stage encryptor.

 

Appendix 2: IOCs

Type/Description

Value/SHA256

C2 Server

91.107.247[.]163

SystemBC C2

45.86.230[.]112

SystemBC

992c951f4af57ca7cd8396f5ed69c2199fd6fd4ae5e93726da3e198e78bec0a5

The Gentlemen Windows ransomware

025fc0976c548fb5a880c83ea3eb21a5f23c5d53c4e51e862bb893c11adf712a

The Gentlemen Windows ransomware

22b38dad7da097ea03aa28d0614164cd25fafeb1383dbc15047e34c8050f6f67

The Gentlemen Windows ransomware

2ed9494e9b7b68415b4eb151c922c82c0191294d0aa443dd2cb5133e6bfe3d5d

The Gentlemen Windows ransomware

3ab9575225e00a83a4ac2b534da5a710bdcf6eb72884944c437b5fbe5c5c9235

The Gentlemen Windows ransomware

48d9b2ce4fcd6854a3164ce395d7140014e0b58b77680623f3e4ca22d3a6e7fd

The Gentlemen Windows ransomware

62c2c24937d67fdeb43f2c9690ab10e8bb90713af46945048db9a94a465ffcb8

The Gentlemen Windows ransomware

860a6177b055a2f5aa61470d17ec3c69da24f1cdf0a782237055cba431158923

The Gentlemen Windows ransomware

87d25d0e5880b3b5cd30106853cbfc6ef1ad38966b30d9bd5b99df46098e546c

The Gentlemen Windows ransomware

8c87134c1b45e990e9568f0a3899b0076f94be16d3c40fa824ac1e6c6ee892db

The Gentlemen Windows ransomware

91415e0b9fe4e7cbe43ec0558a7adf89423de30d22b00b985c2e4b97e75076b1

The Gentlemen Windows ransomware

994d6d1edb57f945f4284cc0163ec998861c7496d85f6d45c08657c9727186e3

The Gentlemen Windows ransomware

9f61ff4deb8afced8b1ecdc8787a134c63bde632b18293fbfc94a91749e3e454

The Gentlemen Windows ransomware

a7a19cab7aab606f833fa8225bc94ec9570a6666660b02cc41a63fe39ea8b0ad

The Gentlemen Windows ransomware

b67958afc982cafbe1c3f114b444d7f4c91a88a3e7a86f89ab8795ac2110d1e6

The Gentlemen Windows ransomware

c46b5a18ab3fb5fd1c5c8288a41c75bf0170c10b5e829af89370a12c86dd10f8

The Gentlemen Windows ransomware

c7f7b5a6e7d93221344e6368c7ab4abf93e162f7567e1a7bcb8786cb8a183a73

The Gentlemen Windows ransomware

ec368ae0b4369b6ef0da244774995c819c63cffb7fd2132379963b9c1640ccd2

The Gentlemen Windows ransomware

efaf8e7422ffd09c7f03f1a5b4e5c2cc32b05334c18d1ccb9673667f8f43108f

The Gentlemen Windows ransomware

f736be55193c77af346dbe905e25f6a1dee3ec1aedca8989ad2088e4f6576b12

The Gentlemen Windows ransomware

fc75ed2159e0c8274076e46a37671cfb8d677af9f586224da1713df89490a958

gentlemen.bmp

fe1033335a045c696c900d435119d210361966e2fb5cd1ba3382608cfa2c8e68

The Gentlemen Linux ransomware

5dc607c8990841139768884b1b43e1403496d5a458788a1937be139594f01dca

Initial KillAV

7a311b584497e8133cd85950fec6132904dd5b02388a9feed3f5e057fb891d09

PowerRun

4c82fbafef9bab484a2fbe23e4ec8aac06e8e296d6c9e496f4a589f97fd4ab71

ABOUT LEVELBLUE

LevelBlue secures what's next with intelligence-led security delivering visibility and speed to stop threats faster. As the world’s largest and most analyst-recognized pure-play managed security services provider, our AI-powered managed services and cyber expertise across managed, advisory, and incident response services help clients operate with confidence. Learn more about us.

https://www.levelblue.com/resources/blogs/internal-blog/how-to-create-a-blog-post/

Latest Intelligence

Discover how our specialists can tailor a security program to fit the needs of
your organization.

Request a Demo