Gentlemen Ransomware Hits Over 1,570 Victims Globally: Uncovering SystemBC’s Role in Expansive Cyberattack

Unveiling The Gentlemen Ransomware’s Global Reach: Over 1,570 Victims Identified

In a significant cybersecurity development, researchers have uncovered that The Gentlemen ransomware-as-a-service (RaaS) operation has compromised over 1,570 victims worldwide. This revelation emerged from an analysis of a command-and-control (C2) server associated with the SystemBC malware, a tool frequently utilized by the group.

The Gentlemen Ransomware Operation

Since its inception in July 2025, The Gentlemen has rapidly ascended to prominence within the cybercriminal landscape. The group has claimed responsibility for more than 320 victims, as evidenced by postings on their data leak site. Employing a double-extortion model, they not only encrypt victims’ data but also threaten to release sensitive information unless ransom demands are met.

Demonstrating remarkable versatility, The Gentlemen have developed capabilities to target a diverse range of systems, including Windows, Linux, Network-Attached Storage (NAS), and Berkeley Software Distribution (BSD) platforms. Their Go-based ransomware locker is complemented by the strategic use of legitimate drivers and custom malicious tools designed to circumvent security defenses.

SystemBC: A Key Component in the Attack Chain

A critical element in The Gentlemen’s operational toolkit is the SystemBC malware. This proxy malware establishes SOCKS5 network tunnels within compromised environments, facilitating covert communication with C2 servers through a custom RC4-encrypted protocol. Beyond its tunneling capabilities, SystemBC can download and execute additional malware payloads, either by writing them to disk or injecting them directly into system memory.

The deployment of SystemBC has led to the identification of a botnet encompassing over 1,570 victims across various countries, including the United States, the United Kingdom, Germany, Australia, and Romania. This widespread infiltration underscores the global reach and impact of The Gentlemen’s operations.

Attack Methodology and Techniques

The exact methods by which The Gentlemen gain initial access to target networks remain partially obscured. However, evidence suggests that they exploit internet-facing services and compromised credentials to establish an initial foothold. Once inside, their attack sequence typically involves:

1. Discovery: Conducting reconnaissance to map out the network and identify valuable assets.

2. Lateral Movement: Utilizing tools like Cobalt Strike and SystemBC to navigate through the network.

3. Payload Staging: Preparing and deploying the ransomware encryptor.

4. Defense Evasion: Implementing measures to disable or bypass security mechanisms.

5. Ransomware Deployment: Executing the ransomware to encrypt data and initiate the extortion process.

A notable tactic employed by The Gentlemen is the abuse of Group Policy Objects (GPOs) to achieve domain-wide compromise, allowing them to propagate their malware efficiently across entire networks.

Adaptive Strategies and Security Evasion

The Gentlemen have demonstrated a high degree of adaptability and awareness of their targets’ security environments. By tailoring their tactics to circumvent specific security vendors, they engage in thorough reconnaissance and modify their tools accordingly throughout their operations.

During lateral movement phases, the ransomware attempts to neutralize Windows Defender on accessible remote hosts by deploying a PowerShell script. This script disables real-time monitoring, adds broad exclusions for drives and processes, deactivates the firewall, re-enables SMB1, and loosens Local Security Authority (LSA) anonymous access controls. These actions are taken prior to deploying and executing the ransomware binary on the targeted host.

The variant of the ransomware targeting VMware ESXi systems, while possessing fewer functionalities than its Windows counterpart, is designed to shut down virtual machines to enhance the attack’s effectiveness. It also establishes persistence through crontab modifications and inhibits recovery processes before deploying the ransomware binary.

Implications and Industry Response

The scale and sophistication of The Gentlemen’s operations have raised significant concerns within the cybersecurity community. Eli Smadja, Group Manager at Check Point Research, highlighted the group’s unique approach:

Most ransomware groups make noise when they launch and then disappear. The Gentlemen are different. They’ve cracked the affiliate recruitment problem by offering a better deal than anyone else in the criminal ecosystem. When we got inside one of their operator’s servers, we found over 1,570 compromised corporate networks that hadn’t even made the news yet. The real scale of this operation is significantly larger than what’s publicly known, and it’s still growing.

This statement underscores the expansive and ongoing nature of The Gentlemen’s activities, suggesting that the number of affected organizations may be substantially higher than currently reported.

Broader Context: The Evolving Ransomware Landscape

The emergence of The Gentlemen is indicative of broader trends in the ransomware ecosystem. Cybercriminal groups are increasingly adopting RaaS models, allowing affiliates to conduct attacks using pre-developed ransomware tools. This approach lowers the barrier to entry for cybercriminals and facilitates rapid proliferation of ransomware campaigns.

Additionally, the use of proxy malware like SystemBC highlights the evolving tactics employed by threat actors to maintain persistence, evade detection, and facilitate data exfiltration. The integration of such tools into ransomware operations signifies a shift towards more complex and multi-faceted attack strategies.

Mitigation and Defense Strategies

In light of these developments, organizations are urged to adopt comprehensive cybersecurity measures to defend against such sophisticated threats. Recommended strategies include:

– Regularly Updating and Patching Systems: Ensuring that all software and systems are up-to-date to mitigate vulnerabilities that could be exploited by attackers.

– Implementing Multi-Factor Authentication (MFA): Adding an extra layer of security to user accounts to prevent unauthorized access.

– Conducting Security Awareness Training: Educating employees about phishing attacks, social engineering tactics, and safe online practices.

– Deploying Advanced Threat Detection Solutions: Utilizing tools that can identify and respond to suspicious activities in real-time.

– Establishing Incident Response Plans: Developing and regularly updating plans to respond effectively to security incidents, minimizing potential damage.

By implementing these measures, organizations can enhance their resilience against ransomware attacks and reduce the likelihood of falling victim to operations like those conducted by The Gentlemen.

Conclusion

The discovery of over 1,570 victims linked to The Gentlemen ransomware operation underscores the pervasive and evolving threat posed by modern cybercriminal groups. Their sophisticated use of tools like SystemBC, combined with adaptive attack strategies, highlights the need for vigilant and proactive cybersecurity practices. As the ransomware landscape continues to evolve, staying informed and prepared is paramount for organizations aiming to protect their assets and data from malicious actors.