On March 20, 2026, the internal tactics, techniques, and procedures (TTPs) of a new Ransomware-as-a-Service (RaaS) group called The Gentlemen were publicly leaked by one of its own affiliates. The affiliate, using the handle "hastalamuerte," exposed the group's entire operational playbook, reportedly due to a financial dispute. The leak provides valuable threat intelligence on the group, which is an offshoot of the established Qilin ransomware operation. Key details reveal that the group targets vulnerable Fortinet FortiGate VPN appliances for initial access and employs a sophisticated set of tools for lateral movement, data exfiltration, and encryption across Windows, Linux, and ESXi environments. This public infighting provides a unique opportunity for defenders to understand and counter a new ransomware threat.
The leak offers a fascinating glimpse into the professionalization and internal politics of the ransomware ecosystem.
The Gentlemen's playbook reveals a modern, multi-stage ransomware attack methodology.
Initial Access: A primary vector is the exploitation of vulnerabilities in Fortinet FortiGate VPN appliances (T1190 - Exploit Public-Facing Application). This continues a long trend of ransomware groups targeting unpatched edge devices.
Execution & Lateral Movement: Once inside a network, the group uses common but effective living-off-the-land techniques. They leverage PowerShell (T1059.001 - PowerShell) and Windows Management Instrumentation (WMI) (T1047 - Windows Management Instrumentation) to move between systems and execute commands.
Defense Evasion: The group employs several techniques to avoid detection and hinder response:
T1547.006 - Boot or Logon Autostart Execution: Kernel Modules and Extensions) This technique is used to disable or bypass security products (EDR) by loading a legitimate but vulnerable driver to execute code in the kernel.T1070.004 - Indicator Removal: File Deletion) to cover their tracks.Impact: The group follows a dual-extortion model.
T1486 - Data Encrypted for Impact), allowing them to cripple both standard servers and virtualized infrastructure.While the leak itself does not describe a specific victim, it provides a blueprint for the potential impact of an attack by The Gentlemen.
Based on the leaked TTPs, defenders can hunt for the following:
url_pattern(known FortiGate exploit paths)command_line_patternwmic.exeprocess_namepowershell.exeother(vulnerable driver load)Rigorously patch internet-facing infrastructure like VPN appliances to prevent initial access.
Use application control to prevent the loading of known-vulnerable drivers used in BYOVD attacks.
Segment networks to prevent lateral movement from user workstations to critical server infrastructure like ESXi hosts.
An affiliate known as 'hastalamuerte' leaks the internal TTPs of The Gentlemen ransomware group.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.