Security researchers have recently published in-depth analyses of The Gentlemen, a Ransomware-as-a-Service (RaaS) group that has been steadily increasing its activity since emerging in mid-2025. This group targets medium to large organizations globally, with victims identified in at least 17 countries. The Gentlemen employ a classic double-extortion model, first exfiltrating sensitive corporate data before executing their Go-based ransomware to encrypt files. Their ransomware is cross-platform, with variants capable of targeting Windows, Linux, and VMware ESXi environments, maximizing their impact on enterprise networks. The group's affiliates have demonstrated a notable level of operational sophistication, using legitimate remote access tools, abusing Active Directory features for deployment, and taking active measures to disable security controls, marking them as a significant and ongoing threat.
The Gentlemen's affiliates utilize a range of TTPs that demonstrate a clear understanding of enterprise network intrusion.
The ransomware itself has a key feature designed to evade automated analysis: it requires a specific password to be provided as a command-line argument to execute its encryption routine (T1486 - Data Encrypted for Impact). This prevents the malware from running in a simple sandbox environment, forcing manual analysis.
T1219 - Remote Access Software).T1562.001 - Impair Defenses: Disable or Modify Tools).T1484.001 - Group Policy Modification). They also use standard tools like PsExec for lateral movement.T1567 - Exfiltration Over Web Service).AnyDesk, ScreenConnect, or LogMeIn on servers or in environments where they are not standard.Hardening Active Directory and monitoring GPO changes can prevent the group's primary deployment technique.
Using application control to block unauthorized software like AnyDesk can disrupt the attacker's toolchain.
Ensuring security tools have tamper protection enabled is critical to prevent them from being disabled.
Enforcing MFA on remote access points is a key defense against initial access.
The Gentlemen's tactic of abusing Group Policy Objects (GPOs) to deploy ransomware is a powerful 'live-off-the-land' technique. The most direct countermeasure is to implement robust domain policy monitoring. This involves continuously auditing Active Directory for any changes to GPOs. Security teams should use a SIEM or a specialized Active Directory auditing tool to generate high-priority alerts for specific events, such as the creation of a new GPO, modification of an existing GPO to add a scheduled task or startup script, or changes to GPO link ordering. By detecting these changes in real-time, incident responders can investigate and revert the malicious GPO modification before the ransomware has a chance to execute across the entire domain at the next policy refresh cycle. This provides a critical window to disrupt the final stage of the attack.
To counter The Gentlemen's use of legitimate tools like AnyDesk and PsExec for persistence and lateral movement, organizations should implement application control policies. An executable denylisting (or preferably, allowlisting) approach can prevent these tools from running in environments where they are not authorized. Using a technology like Windows AppLocker or a third-party application control solution, create rules that block the execution of known remote access tools from any location on servers and standard user workstations. While these tools have legitimate uses, their presence on a server is often a strong indicator of compromise. By blocking them by default, you force the attacker to use noisier or less familiar methods, increasing the chances of detection, and may break their attack chain entirely.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats