(checkpoint.com) The Gentlemen Ransomware-as-a-Service: Multi-Platform RaaS Operation with Advanced Lateral Movement and GPO-Based Mass DeploymentNew RaaS operation "The Gentlemen" has compromised 320+ victims with multi-platform ransomware (Windows/Linux/ESXi) and advanced GPO-based deployment tactics.In brief - Emerging RaaS group "The Gentlemen" employs double extortion, targeting enterprises via Domain Admin access, Cobalt Strike, and mass ransomware deployment through Group Policy Objects. Over 320 victims reported, with 1,570+ SystemBC proxy victims globally.Technically - The Gentlemen ransomware uses X25519 key exchange with XChaCha20 encryption (Windows: Go, ESXi: C). Features include CLI-driven partial encryption (1-9%), GPO deployment, PsExec/WMI lateral movement, and defense evasion via Defender disabling, firewall shutdown, and SMB1 re-enablement. Attack chain observed: Cobalt Strike (91.107.247[.]163) → Mimikatz credential harvesting → SystemBC SOCKS5 tunneling (45.86.230[.]112) → AnyDesk persistence → GPO-scheduled ransomware detonation. ESXi variant shuts down VMs via vim-cmd before encrypting VMFS datastores.Source: https://research.checkpoint.com/2026/dfir-report-the-gentlemen/#Cybersecurity #ThreatIntel