The Gentlemen Ransomware

Description

Emerging in mid-2025, The Gentlemen is a cybercriminal group that breaks into company networks, steals sensitive data, and encrypts the victims’ files. The group then demands a ransom to recover the encrypted files, with the added threat that they will publish the stolen data online if the company refuses to pay-a strategy commonly known as the “double-extortion” tactic. The group is speculated to be working out of Russian-speaking regions due to a prohibition enforced by the operators against targeting organizations in Russia and other Commonwealth of Independent States (CIS) counties. As of early 2026, their data leak site lists more than 200 victim organizations in over 50 countries, spanning every major continent. These victims represent over 20 industries, including vital areas such as energy, government, and healthcare services. The Gentlemen publicly advertises its tools on underground criminal forums, operating what looks like a Ransomware-as-a-Service (RaaS) program and promising affiliates a generous 90% cut of the profits. However, there is mixed feedback regarding the reality of their business model. Given the high level of precision and operational discipline seen in their attacks, there are questions about whether the group runs a traditional RaaS mode. This has led to speculation that the group operates a small, highly coordinated team conducting the attacks directly.

Aliases

  • The Gentlemen
  • Gentlemen

Common Vulnerabilities and Exposures

Targeted Industries

  • Agriculture
  • Business Services
  • Construction
  • Consumer Services
  • Education
  • Energy
  • Finance
  • Government
  • Healthcare Services
  • Holding Companies & Conglomerates
  • Hospitals & Physicians Clinics
  • Hospitality
  • Insurance
  • Law Firms & Legal Services
  • Manufacturing
  • Media & Internet
  • Organizations
  • Real Estate
  • Retail
  • Software
  • Telecommunications
  • Transportation

Objectives

Financial Gain

Known Tools Used

  • Advanced IP Scanner
  • AnyDesk
  • ICACLS
  • Nmap
  • PowerRun
  • PowerShell
  • PsExec
  • PuTTY
  • Windows Management Instrumentation (WMI)
  • WinSCP

Known Infection Vectors

  • Compromised Credentials
  • Exploitation of Public-Facing Applications
  • Phishing
  • Remote Desktop Protocol (RDP) Access
  • VPN Access Abuse

References

Global Gentlemen ransomware intrusions ramp up | SC Media

https://www.scworld.com/brief/global-gentlemen-ransomware-intrusions-ramp-up

Gentlemen ransomware compromises Romanian energy producer | SC Media

https://www.scworld.com/brief/gentlemen-ransomware-compromises-romanian-energy-producer

#StopRansomware Guide — CISA (ransomware prevention & response best practices)

https://www.cisa.gov/stopransomware/ransomware-guide

Active CVEs