The Gentlemen ransomware targets Windows, Linux, NAS, BSD, and ESXi systems


The Gentlemen ransomware operation has quickly become one of the most active cybercriminal groups of 2026, with attacks spanning Windows, Linux, NAS, BSD, and VMware ESXi environments.

The group uses a ransomware-as-a-service model, giving affiliates tools to break into networks, steal data, disable recovery options, and encrypt systems across mixed enterprise infrastructure.

Security researchers say the operation is not entirely new. It appears to build on earlier ransomware affiliate activity linked to the Qilin ecosystem and a Russian-speaking actor known as hastalamuerte.

Why The Gentlemen is drawing attention

The Gentlemen emerged publicly in the second half of 2025 and scaled fast. By May 10, 2026, LevelBlue said the group had publicly claimed 352 attacks during the incomplete first part of the year.

That volume places the group among the most active ransomware operations globally in 2026. Check Point also described it as one of the top ransomware-as-a-service programs based on victims listed during the first five months of the year.

The group’s reach is notable because it does not focus on a single platform. It offers lockers for common business systems, including servers, workstations, NAS devices, BSD systems, and ESXi hypervisors.

AreaWhat researchers reported
Operation typeRansomware-as-a-service
Public emergenceSecond half of 2025
Claimed victims in 2026352 by May 10, 2026, according to LevelBlue
Target platformsWindows, Linux, NAS, BSD, and VMware ESXi
Extortion modelData theft plus file encryption
Known infrastructure abuseSystemBC, Cobalt Strike, remote access tools, and admin utilities

The group hits multiple operating systems

The Gentlemen’s platform coverage makes it dangerous for modern enterprise networks. A single company may run Windows endpoints, Linux servers, NAS appliances, and ESXi hosts in the same environment.

Check Point says the group offers Go-based lockers for Windows, Linux, NAS, and BSD, along with a C-based locker for ESXi. This gives affiliates a way to encrypt broad infrastructure rather than only user workstations.

ESXi attacks can be especially disruptive because one compromised hypervisor can affect many virtual machines at once. That can take down core business services, databases, file servers, and application workloads in minutes.

How The Gentlemen attacks unfold

The group follows a familiar human-operated ransomware workflow. Affiliates seek initial access through exposed remote services, stolen credentials, vulnerable edge devices, or access already available through criminal markets.

Once inside, they move through the network, escalate privileges, scan internal systems, deploy remote access tools, and stage stolen data for exfiltration.

Encryption usually comes late in the attack. By that point, the attackers may already have disabled security tools, stopped backup services, copied data, and prepared a domain-wide ransomware deployment.

  • Initial access through stolen credentials or exposed remote infrastructure.
  • Internal discovery with tools such as Nmap or Advanced IP Scanner.
  • Remote access through tools such as AnyDesk or SystemBC.
  • Lateral movement with PsExec, WMI, SMB shares, and remote services.
  • Security tool disruption using kill tools and privilege abuse.
  • Data theft before encryption.
  • Final encryption across workstations, servers, NAS, and ESXi hosts.

Data theft increases pressure on victims

The Gentlemen does not rely only on file encryption. The group also steals sensitive data and threatens to publish it on a leak site if victims refuse to pay.

This double-extortion model can keep pressure on organizations even when backups work. A company may restore systems but still face leaked customer files, contracts, employee records, financial documents, or internal communications.

LevelBlue’s victim data shows activity across roughly 70 countries. APAC, Europe, Latin America, and the United States and Canada all appear in the dataset, with the United States listed as the most frequent country at the country level.

SectorReported share in LevelBlue dataset
Professional services18.80%
Manufacturing17.90%
Technology11.60%
Healthcare8.80%
Transportation and logistics6.50%
Agriculture and food6.00%

Check Point found SystemBC activity during an incident response case involving a Gentlemen affiliate. SystemBC is proxy malware that can create SOCKS5 tunnels, support covert access, and help deliver additional payloads.

The specific SystemBC command-and-control server observed by Check Point showed more than 1,570 victims. Researchers said the profile suggested corporate and organizational environments rather than ordinary consumer infections.

Check Point also cautioned that it remains unclear whether SystemBC is formally integrated into The Gentlemen ecosystem or simply used by one affiliate. Either way, defenders should treat the group as more than a final-stage encryptor.

The alleged internal leak adds another layer

Researchers have also tracked claims that someone tried to sell data allegedly taken from The Gentlemen’s own internal systems. The reported price was $10,000 in Bitcoin.

Check Point said the group’s administrator acknowledged an internal backend leak on an underground forum on May 4, 2026. The leaked material reportedly included account details, infrastructure information, internal chats, victim data, and negotiation content.

LevelBlue treated similar claims as an intelligence lead requiring further validation. That distinction matters because underground leak claims can contain partial, stale, manipulated, or falsely attributed data.

Ransomware behavior and artifacts

LevelBlue says the Windows locker has been reported as Go-based and requires a password parameter during execution. That can help affiliates control when the ransomware detonates and may reduce accidental sandbox execution.

The ransomware has been associated with the ransom note README-GENTLEMEN.txt. Encrypted files may receive six-character extensions, including examples such as .7mtzhh and .ojuopo.

The encryption strategy is designed for speed. Smaller files may be fully encrypted, while larger files may be encrypted in chunks. That allows the ransomware to damage large file stores faster while still making recovery difficult without backups or decryptors.

Artifact or behaviorReported detail
Ransom noteREADME-GENTLEMEN.txt
Example extensions.7mtzhh and .ojuopo
Windows lockerGo-based and password-gated
Linux lockerObserved in public reporting
ESXi lockerC-based locker reported by Check Point
Pre-encryption activityStops database, backup, virtualization, remote access, and enterprise application services

Indicators defenders can hunt for

Security teams should not wait for the ransom note to appear. The strongest detection opportunities usually happen earlier, during reconnaissance, credential abuse, remote access, and lateral movement.

LevelBlue recommends hunting for unusual administrative logins, scanning tools, AnyDesk, WinSCP, PsExec, WMI, Group Policy changes, mass service shutdowns, and suspicious outbound proxy behavior.

The Gentlemen’s advertising banner, showing encryption launching (Sourced – LevelBlue)

Known infrastructure indicators include the following SystemBC-related addresses. They are defanged to avoid accidental access.

TypeIndicatorDescription
IP address91[.]107[.]247[.]163SystemBC C2 server
IP address45[.]86[.]230[.]112SystemBC C2 server
File namegentlemen.bmpRansomware wallpaper or artifact
Ransom noteREADME-GENTLEMEN.txtRansom note associated with the locker

Selected malware hashes

The following hashes were reported in the source material and can support threat hunting, endpoint triage, and retrospective searches.

SHA-256Description
992c951f4af57ca7cd8396f5ed69c2199fd6fd4ae5e93726da3e198e78bec0a5The Gentlemen Windows ransomware
025fc0976c548fb5a880c83ea3eb21a5f23c5d53c4e51e862bb893c11adf712aThe Gentlemen Windows ransomware
22b38dad7da097ea03aa28d0614164cd25fafeb1383dbc15047e34c8050f6f67The Gentlemen Windows ransomware
fe1033335a045c696c900d435119d210361966e2fb5cd1ba3382608cfa2c8e68The Gentlemen Linux ransomware
5dc607c8990841139768884b1b43e1403496d5a458788a1937be139594f01dcaInitial KillAV tool
7a311b584497e8133cd85950fec6132904dd5b02388a9feed3f5e057fb891d09PowerRun utility

How organizations should respond

Organizations should prioritize exposed remote access, identity security, backup isolation, and ESXi protection. The Gentlemen’s playbook depends on broad access before encryption begins.

Every internet-facing VPN, firewall, remote desktop portal, and admin service should have multi-factor authentication. Credentials exposed in prior breaches or stolen by infostealers should be rotated.

Backup systems should sit outside the main domain where possible. Security teams should test recovery regularly and confirm that attackers cannot erase backup repositories with normal domain admin access.

  1. Review all internet-facing remote access services.
  2. Enforce multi-factor authentication for privileged accounts.
  3. Disable stale accounts and rotate exposed credentials.
  4. Hunt for AnyDesk, WinSCP, PsExec, WMI, Nmap, and Advanced IP Scanner misuse.
  5. Monitor Group Policy changes and mass service shutdowns.
  6. Isolate backup infrastructure from the main domain.
  7. Patch and harden ESXi, NAS, and Linux servers.
  8. Review outbound traffic for SystemBC-style proxy behavior.

Why The Gentlemen matters now

The Gentlemen shows how quickly a ransomware brand can scale when it combines affiliate recruitment, cross-platform lockers, stolen data pressure, and mature intrusion tooling.

The group’s platform support makes it dangerous for companies with mixed infrastructure. Even strong Windows controls may not help if attackers can encrypt Linux servers, NAS shares, or ESXi hosts.

Defenders should treat The Gentlemen as a full intrusion lifecycle threat. The goal is not only to detect ransomware execution, but to catch the access, reconnaissance, tunneling, data theft, and deployment activity that comes before it.

FAQ

What is The Gentlemen ransomware?

The Gentlemen is a ransomware-as-a-service operation that emerged publicly in the second half of 2025 and rapidly scaled in 2026. Researchers link it to prior ransomware affiliate activity and the Qilin ecosystem.

Which systems does The Gentlemen ransomware target?

The group has lockers for Windows, Linux, NAS, BSD, and VMware ESXi environments. This allows affiliates to attack mixed enterprise networks and virtualization infrastructure.

How many victims has The Gentlemen claimed in 2026?

LevelBlue reported that The Gentlemen publicly claimed 352 attacks by May 10, 2026, during the incomplete first part of the year.

How can organizations defend against The Gentlemen ransomware?

Organizations should secure remote access, enforce multi-factor authentication, rotate exposed credentials, isolate backups, harden ESXi and NAS systems, and hunt for early intrusion activity such as AnyDesk, WinSCP, PsExec, WMI, Nmap, Advanced IP Scanner, and SystemBC traffic.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages