The rapidly growing The Gentlemen ransomware-as-a-service (RaaS) operation is increasing its sophistication by incorporating the SystemBC proxy botnet into its attack chain. Research from Check Point has revealed that Gentlemen affiliates are using SystemBC to establish covert SOCKS5 tunnels on compromised hosts. This allows them to obscure their command-and-control (C2) traffic, evade detection, and deliver additional malicious payloads, including the ransomware itself. The investigation uncovered a SystemBC botnet of over 1,570 compromised corporate systems linked to this activity. This adoption of a dedicated proxy botnet marks a significant enhancement of the RaaS group's operational capabilities, enabling more stealthy and resilient attacks across a wide range of target platforms.
The Gentlemen RaaS group, which emerged in mid-2025, has quickly scaled its operations by advertising on underground forums and providing affiliates with a versatile toolkit. The group offers multi-platform ransomware lockers, including:
The integration of SystemBC into their playbook provides affiliates with a powerful tool for stealth and persistence. SystemBC is a well-known malware that functions as a backdoor and proxy. By routing their traffic through the compromised systems in the botnet, attackers can make it difficult for defenders to trace the origin of the attack or block C2 communications.
During an incident response engagement, Check Point observed a Gentlemen affiliate's attack chain in detail.
Typical Attack Chain:
T1486).MITRE ATT&CK TTPs:
T1090 - Proxy: The core functionality provided by the SystemBC botnet to obscure C2 traffic.T1059.003 - Windows Command Shell: Used for executing commands and deploying tools like Cobalt Strike and SystemBC.T1588.002 - Tool: The affiliate acquires and uses commercial/public tools like Cobalt Strike and SystemBC.T1486 - Data Encrypted for Impact: The final goal of the ransomware deployment.T1490 - Inhibit System Recovery: Targeting ESXi hosts is a common technique to inhibit recovery by encrypting virtual machines and their snapshots.The use of SystemBC makes Gentlemen ransomware attacks harder to detect and block. By tunneling C2 traffic through legitimate-looking SOCKS5 proxies, they can bypass many simple network-based IOCs. The ability to target ESXi hypervisors is particularly damaging, as a single command can encrypt dozens of virtual machines, causing massive operational disruption. The group's double-extortion model, using a Tor-based leak site to publish data from over 320 claimed victims, adds the threat of data breach and reputational damage to the operational impact of encryption.
No specific file hashes, IP addresses, or domains were provided in the source articles.
Security teams can hunt for Gentlemen and SystemBC activity using these patterns:
system.exe or svchost.exe (with unusual parent process)explorer.exe.powershell.exe -enc <base64>C:\Users\<user>\AppData\Roaming\Detection:
Response:
Implement strict egress filtering to block unexpected outbound connections from servers, which can disrupt SystemBC C2 communications.
Mapped D3FEND Techniques:
Keeping VMware ESXi and other systems fully patched reduces the potential for initial access via vulnerability exploitation.
Mapped D3FEND Techniques:
To counter the core functionality of the SystemBC botnet used by Gentlemen affiliates, organizations must implement strict outbound traffic filtering, especially from server segments. The purpose of SystemBC is to create a covert tunnel to an external C2 server. By configuring firewalls with a default-deny egress policy, you can block these unauthorized connections. Servers should only be allowed to communicate outbound to a small, well-defined list of IP addresses and ports required for their function (e.g., patch servers, specific API endpoints). Any attempt by SystemBC to connect to its C2, which is likely hosted on a compromised residential system or other non-standard IP, would be blocked and logged. This single control can neutralize the attacker's ability to maintain persistence and deliver the final ransomware payload.
For detecting the presence of SystemBC, Network Traffic Analysis (NTA) is crucial. NTA tools can identify the characteristic beaconing of SOCKS5 proxy malware. Even if the traffic is encrypted, NTA can analyze metadata such as connection frequency, duration, and data volume. A corporate server suddenly making a persistent, low-and-slow connection to a residential IP address in another country is a high-confidence indicator of a proxy botnet infection. Furthermore, since the Gentlemen group targets ESXi hosts, monitoring the ESXi management network is critical. Any unexpected traffic from an ESXi host to an external address should be treated as a major red flag. NTA provides the visibility needed to spot these anomalous patterns that EDR on the host might miss.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats