Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

http://thehackernews.com/2026/03/meta-disables-150k-accounts-linked-to.html

March 20, 2026

UK: Regulation Drives Cyber Spending for Critical Infrastructure Orgs

March 19, 2026

Dozens of Vendors Patch Security Flaws Across Enterprise Software and Network Devices

March 19, 2026
Facebook X (Twitter) Instagram
Friday, March 20
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»Ransomware Affiliate Exposes Details of ‘The Gentlemen’ Operation
Cyber Security

Ransomware Affiliate Exposes Details of ‘The Gentlemen’ Operation

Team-CWDBy Team-CWDMarch 19, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A ransomware affiliate known as ‘hastalamuerte’ has revealed operational details about a group called The Gentlemen, shedding light on its tactics, techniques and internal disputes.

New research by Group-IB, published on March 19, provided rare insight into how the ransomware-as-a-service (RaaS) group operates, including its infrastructure, attack methods and affiliate relationships.

The leak also highlighted growing tensions within cyber-criminal networks.

The Gentlemen Ransomware Group: an Overview

The research identified “The Gentlemen” as a relatively new but rapidly evolving ransomware group that emerged from a dispute within an existing RaaS ecosystem with Qilin.

Experienced affiliates quickly established this new brand using existing tooling and infrastructure. The group employs a dual-extortion model, encrypting victim data and threatening to release it publicly, increasing pressure on organizations to pay.

Group-IB found that the group targets multiple platforms, including Windows, Linux and ESXi environments.

Systematic exploitation of exposed FortiGate VPN devices through vulnerabilities or brute forcing remains a primary initial access method. Once inside, affiliates deploy automated lateral movement, credential harvesting, backup disruption and domain-wide encryption designed to maximize impact and reduce time to ransom.

Among the techniques observed by Group-IB were:

  • Use of PowerShell and Windows Management Instrumentation for lateral movement

  • Deployment of anti-forensic tools to erase traces after attacks

  • Targeting of backup and security systems to hinder recovery

  • Cross-platform encryption to maximize impact

The group also uses advanced defense evasion methods, including Bring Your Own Vulnerable Driver (BYOVD) and aggressive log deletion, to disable endpoint detection and antivirus tools and complicate forensic investigation.

Affiliate Tensions and Broader Threat Landscape

The report also highlighted friction within the RaaS model. Affiliates carrying out attacks using rented infrastructure sometimes expose operators when disputes arise.

In this case, ‘hastalamuerte’ publicly shared insights into the group’s operations, offering rare visibility into ransomware partnerships.

RaaS operations have expanded significantly in recent years, with more groups adopting structured affiliate programs that resemble legitimate business models. These ecosystems allow developers to scale attacks while outsourcing much of the operational risk.

Read more on ransomware-as-a-service threats: Researchers Warn of New “Vect” RaaS Variant

Group-IB noted that the evolution of groups like The Gentlemen reflects a broader trend towards more specialized and professionalized cybercrime.

The combination of advanced evasion techniques and flexible attack infrastructure continues to challenge traditional security measures. At the same time, internal instability may create opportunities for disruption, with intelligence leaks such as this offering a clearer view of how modern ransomware campaigns are organized and executed.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleFCA Updates Cyber Incident and Third-Party Reporting Rules
Next Article What Boards Must Demand in the Age of AI-Automated Exploitation
Team-CWD
  • Website

Related Posts

Cyber Security

Average Number of Daily API Attacks Up 113% Annually

March 18, 2026
Cyber Security

Companies House Web Glitch Exposes Corporate Details to Fraudsters

March 17, 2026
Cyber Security

Security Flaw in AWS Bedrock Code Interpreter Raises Alarms

March 16, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Near-ultrasonic attacks on voice assistants

September 11, 20256 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Our Picks

Your information is on the dark web. What happens next?

January 13, 2026

Is it time for internet services to adopt identity verification?

January 14, 2026

Why you should never pay to get paid

September 15, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.