On March 16, 2026, a ransomware group known as The Gentlemen announced it had breached Chase Asia, a publicly traded Thai company specializing in debt collection and financial services. The group posted a threat on its data leak site, indicating it had stolen sensitive data and would publish it unless the company initiated negotiations. This incident highlights the ongoing threat to the global financial services sector from increasingly sophisticated ransomware operations.
The Gentlemen is identified as a newer but capable Ransomware-as-a-Service (RaaS) group, with alleged origins as a splinter from the notorious Qilin ransomware operation. The group's TTPs include targeting multiple operating systems (Windows, Linux, ESXi) and using advanced techniques to evade detection, making them a significant threat. The attack on a major Thai financial firm underscores the continued expansion of high-tier ransomware actors into the Asia-Pacific region.
Based on research into The Gentlemen's operations, the group employs a range of advanced techniques.
Defenders should hunt for TTPs associated with The Gentlemen and similar RaaS groups.
| Type | Value | Description | Context | Confidence |
|---|---|---|---|---|
log_source |
Fortinet VPN logs | Monitor for anomalous logins or exploit attempts against FortiGate VPNs. | Firewall/VPN logs | High |
event_id |
Windows System Event Log (ID 7045) | Look for the installation of new, suspicious, or unsigned drivers, which could indicate a BYOVD attack. | EDR, SIEM | High |
process_name |
powershell.exe |
Monitor for PowerShell processes executing encoded commands or making remote connections, indicating lateral movement. | EDR, PowerShell Script Block Logging | High |
command_line_pattern |
esxcli vm process kill |
On ESXi hosts, this command can be used by attackers to terminate running VMs before encrypting their virtual disks. | ESXi shell logs | High |
esxcli commands, unauthorized SSH access, or the creation of new files on datastores. This is a critical part of D3FEND Platform Hardening.Aggressively patching internet-facing VPNs and other appliances is crucial to block the primary initial access vector for this group.
Using strict application control to prevent the loading of unauthorized or unsigned kernel drivers can defeat the BYOVD technique.
Segmenting the network, especially isolating ESXi management interfaces from the general corporate network, can prevent lateral movement to the virtualization environment.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats