A Look Inside 'The Gentlemen': A Sophisticated RaaS Operation

Researchers Profile 'The Gentlemen' Ransomware-as-a-Service Group

HIGH
March 23, 2026
5m read
RansomwareThreat ActorMalware

Related Entities

Threat Actors

The Gentlemen

Products & Tech

AnyDeskPsExec WinSCP

Other

The Gentlemen Ransomware

Full Report

Executive Summary

Security researchers have recently published in-depth analyses of The Gentlemen, a Ransomware-as-a-Service (RaaS) group that has been steadily increasing its activity since emerging in mid-2025. This group targets medium to large organizations globally, with victims identified in at least 17 countries. The Gentlemen employ a classic double-extortion model, first exfiltrating sensitive corporate data before executing their Go-based ransomware to encrypt files. Their ransomware is cross-platform, with variants capable of targeting Windows, Linux, and VMware ESXi environments, maximizing their impact on enterprise networks. The group's affiliates have demonstrated a notable level of operational sophistication, using legitimate remote access tools, abusing Active Directory features for deployment, and taking active measures to disable security controls, marking them as a significant and ongoing threat.


Threat Overview

  • Threat Actor: The Gentlemen
  • Business Model: Ransomware-as-a-Service (RaaS)
  • First Seen: July 2025
  • Malware: Custom ransomware written in the Go programming language.
  • Targets: Medium to large organizations across various sectors, including Manufacturing, Healthcare, and Insurance. Victims are spread globally, with a presence in the U.S., Brazil, France, and the U.K.
  • Strategy: Double extortion (Data Exfiltration + Encryption).

Technical Analysis

The Gentlemen's affiliates utilize a range of TTPs that demonstrate a clear understanding of enterprise network intrusion.

Ransomware Payload

The ransomware itself has a key feature designed to evade automated analysis: it requires a specific password to be provided as a command-line argument to execute its encryption routine (T1486 - Data Encrypted for Impact). This prevents the malware from running in a simple sandbox environment, forcing manual analysis.

Intrusion TTPs

  1. Initial Access: While not detailed in the reports, initial access is likely gained through common vectors such as stolen credentials, phishing, or exploitation of unpatched vulnerabilities.
  2. Persistence & C2: Affiliates have been observed using legitimate remote access software like AnyDesk to maintain persistent access to the compromised network (T1219 - Remote Access Software).
  3. Defense Evasion: The actors use custom tools and scripts to disable or uninstall security products on the victim's network, clearing the way for their ransomware payload (T1562.001 - Impair Defenses: Disable or Modify Tools).
  4. Lateral Movement & Execution: The group makes extensive use of Active Directory for mass deployment. They have been seen abusing Group Policy Objects (GPOs) to push scheduled tasks that execute the ransomware across all domain-joined computers (T1484.001 - Group Policy Modification). They also use standard tools like PsExec for lateral movement.
  5. Exfiltration: Before encryption, the affiliates steal sensitive data. They have been observed using tools like WinSCP to exfiltrate the data over encrypted channels to attacker-controlled infrastructure (T1567 - Exfiltration Over Web Service).

Impact Assessment

  • Operational Disruption: The encryption of files on Windows clients, Linux servers, and ESXi hosts can bring an entire organization's operations to a standstill.
  • Data Breach: The exfiltration of data leads to a data breach, with associated regulatory fines (e.g., GDPR, HIPAA), notification costs, and reputational damage.
  • Financial Loss: Victims face significant financial pressure from the ransom demand, as well as the high costs of incident response, recovery, and business downtime.

Detection & Response

  1. Monitor for Legitimate RATs: Generate alerts for the installation or execution of legitimate remote access tools like AnyDesk, ScreenConnect, or LogMeIn on servers or in environments where they are not standard.
  2. Audit GPO Changes: Monitor Active Directory for changes to Group Policy Objects, especially the creation of new scheduled tasks or startup scripts. This is a high-fidelity indicator of a widespread ransomware deployment attempt. This is a form of D3FEND Domain Policy Monitoring.
  3. Detect Security Tool Tampering: EDR and AV solutions should have tamper protection enabled. Alerts on services being stopped or processes being killed for security tools are a critical sign of an active, hands-on-keyboard attacker.
  4. Network Egress Monitoring: Monitor for large outbound data transfers to unknown destinations, which could indicate data exfiltration via tools like WinSCP.

Mitigation

  1. Secure Active Directory: Hardening Active Directory is critical. Limit the number of Domain Admins, implement privileged access management (PAM) solutions, and closely monitor for GPO modifications.
  2. Application Control: Use application control solutions to prevent the execution of unauthorized remote access software and other tools used by the attackers.
  3. Immutable Backups: Maintain a robust backup strategy with offline, air-gapped, or immutable backups. This ensures you can recover your data without paying the ransom.
  4. Multi-Factor Authentication (MFA): Enforce MFA on all external access points (VPN, RDP) and for all privileged accounts to prevent initial access via stolen credentials.

Timeline of Events

1
July 1, 2025
The Gentlemen ransomware group first emerges.
2
March 23, 2026
This article was published

MITRE ATT&CK Mitigations

Hardening Active Directory and monitoring GPO changes can prevent the group's primary deployment technique.

Using application control to block unauthorized software like AnyDesk can disrupt the attacker's toolchain.

Ensuring security tools have tamper protection enabled is critical to prevent them from being disabled.

Enforcing MFA on remote access points is a key defense against initial access.

D3FEND Defensive Countermeasures

The Gentlemen's tactic of abusing Group Policy Objects (GPOs) to deploy ransomware is a powerful 'live-off-the-land' technique. The most direct countermeasure is to implement robust domain policy monitoring. This involves continuously auditing Active Directory for any changes to GPOs. Security teams should use a SIEM or a specialized Active Directory auditing tool to generate high-priority alerts for specific events, such as the creation of a new GPO, modification of an existing GPO to add a scheduled task or startup script, or changes to GPO link ordering. By detecting these changes in real-time, incident responders can investigate and revert the malicious GPO modification before the ransomware has a chance to execute across the entire domain at the next policy refresh cycle. This provides a critical window to disrupt the final stage of the attack.

To counter The Gentlemen's use of legitimate tools like AnyDesk and PsExec for persistence and lateral movement, organizations should implement application control policies. An executable denylisting (or preferably, allowlisting) approach can prevent these tools from running in environments where they are not authorized. Using a technology like Windows AppLocker or a third-party application control solution, create rules that block the execution of known remote access tools from any location on servers and standard user workstations. While these tools have legitimate uses, their presence on a server is often a strong indicator of compromise. By blocking them by default, you force the attacker to use noisier or less familiar methods, increasing the chances of detection, and may break their attack chain entirely.

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

ransomwareRaaSThe Gentlemendouble extortionGPOActive DirectoryAnyDesk

📢 Share This Article

Help others stay informed about cybersecurity threats