On March 20, 2026, the internal tactics, techniques, and procedures (TTPs) of a new Ransomware-as-a-Service (RaaS) group called The Gentlemen were publicly leaked by one of its own affiliates. The affiliate, using the handle "hastalamuerte," exposed the group's entire operational playbook, reportedly due to a financial dispute. The leak provides valuable threat intelligence on the group, which is an offshoot of the established Qilin ransomware operation. Key details reveal that the group targets vulnerable Fortinet FortiGate VPN appliances for initial access and employs a sophisticated set of tools for lateral movement, data exfiltration, and encryption across Windows, Linux, and ESXi environments. This public infighting provides a unique opportunity for defenders to understand and counter a new ransomware threat.
The leak offers a fascinating glimpse into the professionalization and internal politics of the ransomware ecosystem.
The Gentlemen's playbook reveals a modern, multi-stage ransomware attack methodology.
Initial Access: A primary vector is the exploitation of vulnerabilities in Fortinet FortiGate VPN appliances (T1190 - Exploit Public-Facing Application). This continues a long trend of ransomware groups targeting unpatched edge devices.
Execution & Lateral Movement: Once inside a network, the group uses common but effective living-off-the-land techniques. They leverage PowerShell (T1059.001 - PowerShell) and Windows Management Instrumentation (WMI) (T1047 - Windows Management Instrumentation) to move between systems and execute commands.
Defense Evasion: The group employs several techniques to avoid detection and hinder response:
T1547.006 - Boot or Logon Autostart Execution: Kernel Modules and Extensions) This technique is used to disable or bypass security products (EDR) by loading a legitimate but vulnerable driver to execute code in the kernel.T1070.004 - Indicator Removal: File Deletion) to cover their tracks.Impact: The group follows a dual-extortion model.
T1486 - Data Encrypted for Impact), allowing them to cripple both standard servers and virtualized infrastructure.While the leak itself does not describe a specific victim, it provides a blueprint for the potential impact of an attack by The Gentlemen.
Based on the leaked TTPs, defenders can hunt for the following:
| Type | Value | Description |
|---|---|---|
url_pattern |
(known FortiGate exploit paths) |
Monitor web server and firewall logs for exploit attempts against known FortiGate vulnerabilities. |
command_line_pattern |
wmic.exe |
Look for suspicious use of WMI for remote process execution or system discovery. |
process_name |
powershell.exe |
Monitor for encoded PowerShell commands or PowerShell being used to download files from the internet. |
other |
(vulnerable driver load) |
EDR and OS-level logging may detect the loading of known-vulnerable drivers used in BYOVD attacks. |
Rigorously patch internet-facing infrastructure like VPN appliances to prevent initial access.
Use application control to prevent the loading of known-vulnerable drivers used in BYOVD attacks.
Segment networks to prevent lateral movement from user workstations to critical server infrastructure like ESXi hosts.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats