A newly emerged ransomware group – THE GENTLEMEN RANSOMWARE

September 11, 2025
A newly emerged ransomware group – THE GENTLEMEN RANSOMWARE

Summary

The Gentlemen ransomware represents a sophisticated, highly adaptive threat that emerged in August 2025. This group demonstrates advanced capabilities through systematic enterprise compromise, custom tool development, and targeted defense evasion techniques specifically designed to bypass security solutions.

A newly emerged ransomware group

Key Statistics:

  • 17 Countries targeted across multiple regions
  • 4+ Primary Industries (Manufacturing, Construction, Healthcare, Insurance)
  • 60+ Services systematically terminated during attacks
  • 100+ Processes killed to disable security and backup solutions

Target Profile

Primary Targets: Manufacturing, Construction, Healthcare, Insurance
Geographic Focus: Asia-Pacific region (Thailand, United States)
Attack Vector: Internet-facing services, compromised credentials, vulnerable FortiGate appliances
Victim Impact: Organizations across 17 countries with focus on critical infrastructure and essential services


Threat Actor Profile

  • Experience Level: Advanced – demonstrates sophisticated understanding of enterprise environments
  • Operational Security: High – uses encrypted channels, removes artifacts, adapts tools
  • Target Selection: Strategic – focuses on critical infrastructure and high-value industries
  • Tool Development: Custom – develops tailored tools for specific security solutions

Campaign Characteristics

  • Persistence: Long-term campaign with systematic approach
  • Adaptability: Mid-campaign tool evolution and technique refinement
  • Impact Focus: Double extortion model with data theft and encryption
  • Geographic Spread: Global reach with Asia-Pacific concentration

Mitre Att&ck Mapping

Tactic Technique ID Technique Name Implementation
Initial Access T1190 Exploit Public-Facing Application FortiGate server exploitation
T1078.002 Valid Accounts: Domain Accounts Compromised administrative credentials
Discovery T1046 Network Service Discovery Nmap service enumeration
T1018 Remote System Discovery Advanced IP Scanner network mapping
Execution T1087.002 Account Discovery: Domain Account Batch script domain account enumeration
T1069.002 Permission Groups Discovery Domain group enumeration
T1482 Domain Trust Discovery PowerShell PDC identification
T1059.003 Command and Scripting Interpreter: Windows Command Shell Cmd.exe command execution
T1059.001 Command and Scripting Interpreter: PowerShell PowerShell-based operations
Defense Evasion T1562.001 Impair Defenses: Disable or Modify Tools Anti-AV tool deployment
T1014 Rootkit Vulnerable driver abuse
T1112 Modify Registry Authentication control weakening
T1562.004 Impair Defenses: Disable or Modify System Firewall RDP firewall rule modification
T1027 Obfuscated Files or Information Base64 encoded PowerShell
Privilege Escalation T1484.001 Domain Policy Modification: Group Policy Modification GPO manipulation
Persistence T1219 Remote Access Software AnyDesk installation
T1112 Modify Registry Persistent registry modifications
Lateral Movement T1021.002 Remote Services: SMB/Windows Admin Shares PsExec lateral movement
T1021.001 Remote Services: Remote Desktop Protocol RDP-based movement
T1021.004 Remote Services: SSH PuTTY SSH access
Collection T1074.001 Data Staged: Local Data Staging C:\ProgramData\data staging
T1039 Data from Network Shared Drive WebDAV share access
Command and Control T1219 Remote Access Software AnyDesk C2 communication
T1071.001 Application Layer Protocol: Web Protocols WebDAV-based communication
Exfiltration T1048.001 Exfiltration Over Alternative Protocol WinSCP encrypted exfiltration
Impact T1486 Data Encrypted for Impact Domain-wide ransomware deployment
T1489 Service Stop Systematic service termination

Indicators of Compromise (IOCs)

File Hashes (SHA1)

  • c12c4d58541cc4f75ae19b65295a52c559570054 – Ransom.Win64.GENTLEMAN.THHAIBE (Main ransomware)
  • c0979ec20b87084317d1bfa50405f7149c3b5c5f – Trojan.Win64.KILLAV.THHBHBE (Initial anti-AV tool)
  • df249727c12741ca176d5f1ccba3ce188a546d28 – Trojan.Win64.KILLAV.THHBHBE (Patched anti-AV tool)
  • e00293ce0eb534874efd615ae590cf6aa3858ba4 – HackTool.Win32.PowerRun.THHBHBE (PowerRun tool)

Conclusuion

The Gentlemen ransomware represents a significant evolution in ransomware operations, demonstrating advanced capabilities through systematic enterprise compromise and adaptive tool development. Organizations must implement comprehensive security measures focusing on Zero Trust architecture, advanced endpoint protection, and proactive threat hunting to defend against this sophisticated threat.

The group’s ability to adapt tools mid-campaign and target specific security solutions indicates a well-resourced and technically sophisticated operation that poses ongoing risks to organizations across multiple industries and regions.

About the author