Malware & RansomwareHIGH

Ransomware - Affiliate Exposes 'The Gentlemen' Operation Details

IMInfosecurity Magazine
πŸ“° 2 sourcesΒ·Summary by CyberPings EditorialΒ·AI-assistedΒ·Reviewed by Rohit Rana
Updated:
🎯

Basically, a hacker shared secrets about a ransomware group that attacks businesses for money.

Quick Summary

A ransomware affiliate leaked vital details about 'The Gentlemen' operation, revealing their tactics and internal conflicts. This poses significant risks for targeted organizations. Cybersecurity experts urge immediate action to mitigate potential threats.

What Happened

A ransomware affiliate known as hastalamuerte has leaked critical operational details about a group called The Gentlemen. This revelation offers a rare glimpse into the inner workings of a ransomware-as-a-service (RaaS) operation. The insights, published by Group-IB, highlight the group's tactics, techniques, and even internal disputes. Such leaks are crucial as they shed light on how these cybercriminal networks function and evolve.

The Gentlemen group has emerged from a dispute within the existing RaaS ecosystem, particularly from a group called Qilin. This new brand quickly established itself using existing tools and infrastructure. They employ a dual-extortion model, which means they not only encrypt victim data but also threaten to release it publicly if the ransom isn't paid. This tactic significantly increases pressure on organizations to comply with their demands.

Who's Being Targeted

The Gentlemen group targets a wide range of platforms, including Windows, Linux, and ESXi environments. Their primary method of gaining initial access involves exploiting vulnerabilities in FortiGate VPN devices or using brute-force attacks. Once they infiltrate a system, they deploy a series of automated processes to maximize their impact, including credential harvesting and domain-wide encryption.

The group has been observed using advanced techniques such as PowerShell and Windows Management Instrumentation for lateral movement within networks. They also utilize anti-forensic tools to erase traces of their activities post-attack, making it harder for victims to recover and for investigators to track them down. Their approach is designed to create chaos and urgency, compelling organizations to pay the ransom quickly.

Tactics & Techniques

The operational tactics of The Gentlemen are sophisticated and reflect a trend toward more professionalized cybercrime. They utilize a Bring Your Own Vulnerable Driver (BYOVD) approach, which helps them evade detection by security systems. Additionally, they engage in aggressive log deletion to further complicate forensic investigations.

The internal dynamics of the group are also noteworthy. Tensions among affiliates can lead to leaks, as seen with hastalamuerte's revelations. Such friction can expose vulnerabilities within the RaaS model, potentially leading to disruptions in their operations. This internal instability may present opportunities for law enforcement and cybersecurity professionals to intervene.

Defensive Measures

Organizations must be vigilant against the evolving threat posed by groups like The Gentlemen. Implementing robust security measures is essential to mitigate risks. Regularly updating and patching systems, particularly those vulnerable to FortiGate exploits, is crucial.

Additionally, organizations should consider adopting a multi-layered security approach that includes endpoint detection and response solutions. Training employees to recognize phishing attempts and suspicious activities can also help prevent initial breaches. By staying informed about the tactics used by ransomware groups, businesses can better prepare themselves against potential attacks.

πŸ”’ Pro insight: The emergence of The Gentlemen highlights the increasing sophistication of RaaS operations, necessitating enhanced defensive strategies from organizations.

Original article from

IMInfosecurity Magazine
Read Full Article

Also covered by

SCSC Media

The Gentlemen ransomware gang's inner workings leaked

Read Article
CYCyber Security News

Exposed Server Reveals TheGentlemen Ransomware Toolkit, Victim Credentials, and Ngrok Tokens

Read Article

Related Pings

HIGHMalware & Ransomware

Malware Newsletter Round 91 - Latest Threats and Insights

The latest malware newsletter reveals new threats like Infiniti Stealer and npm supply chain attacks. Developers and organizations must stay alert to evolving risks in cybersecurity.

Security AffairsΒ·
HIGHMalware & Ransomware

Malicious Email Delivers CMD Malware - Privilege Escalation Alert

A malicious email has delivered a .cmd malware file that escalates privileges and bypasses antivirus systems. Users are at risk of significant system compromise. Awareness and immediate action are vital to mitigate this threat.

Security AffairsΒ·
HIGHMalware & Ransomware

Axios NPM Package Compromised - Supply Chain Attack Exposed

A major supply chain attack compromised the Axios NPM package, affecting millions of users. Malicious versions deployed a RAT, posing serious security risks. Swift action was taken to remove the threats.

Trend Micro ResearchΒ·
HIGHMalware & Ransomware

Brokk Hacked - Play Ransomware Exposes Sensitive Data

Brokk has reportedly been hacked by Play ransomware, leading to the leak of sensitive corporate data. This incident could severely impact the company's reputation and security. Organizations must bolster their defenses to prevent similar breaches.

SC MediaΒ·
HIGHMalware & Ransomware

Chaos Malware - New Targeting of 64-bit Linux Servers

Chaos malware has evolved to target 64-bit Linux servers, expanding its attack surface. This shift raises alarms for organizations relying on these systems. Enhanced security measures are now crucial to protect against potential larger-scale attacks.

SC MediaΒ·
HIGHMalware & Ransomware

Phorpiex Botnet - Spreading Ransomware and Sextortion Tactics

The notorious Phorpiex botnet is back, spreading ransomware and sextortion schemes. Millions are at risk as it targets users globally. Stay alert and protect your devices from this evolving threat.

Cyber Security NewsΒ·