SHARE
Facebook X Pinterest WhatsApp

These ‘Gentlemen’ Aren’t Gentle: Rapidly Evolving Ransomware Threat

“The Gentlemen” ransomware gang is rapidly becoming one of 2025’s most dangerous threats.

Written By
thumbnail
Ken Underhill
Ken Underhill
Nov 21, 2025
eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

A fast-moving ransomware group known as “The Gentlemen” has emerged as one of 2025’s most aggressive cybercrime operations, rapidly scaling its attacks across Windows, Linux, and ESXi environments. 

First observed in July 2025, the group has already listed 48 victims on its leak site and continues to release new, highly capable ransomware variants. 

Cybereason researchers said the group “… blends mature ransomware techniques with RaaS features, dual‑extortion, cross‑platform (Windows/Linux/ESXi) lockers, automated persistence, flexible propagation, and affiliate support, allowing it to scale attacks and evade basic defenses quickly.

“The Gentlemen ransomware group relies on tried-and-true tactics borrowed from other successful RaaS operations. Organizations can stay ahead by validating their defenses against these established methods before attackers utilize them,” said Hüseyin Can Yüceel, Security Research Lead at Picus Security.

The Gentlemen’s Rapid Rise

Cybereason’s analysis shows that The Gentlemen did not rush into building a ransomware empire — they studied the market first. 

Early underground forum posts reveal operators experimenting with multiple affiliate ecosystems, including attempts to gain access to Qilin’s ransomware locker panel, before eventually developing a tailored Ransomware-as-a-Service (RaaS) platform of their own. 

This period of reconnaissance allowed the group to borrow proven techniques from established operations while refining them into a more adaptable, efficient, and scalable model. That foundation now fuels one of the fastest-evolving ransomware families observed in 2025.

Their latest updates reflect a rapid and deliberate push toward automation, persistence, and cross-platform reach. 

The ransomware now includes automatic self-restart and run-on-boot mechanisms, ensuring continued access even after system reboots. 

Propagation capabilities have expanded through WMI, PowerShell remoting, SCHTASKS, and Windows Service Control, allowing the malware to spread quickly and quietly across enterprise networks. 

Encryption performance has improved as well, with a 9–15% speed increase across variants — an upgrade that shrinks defenders’ reaction window. 

The group also introduced dual execution modes that support both local and network-wide encryption from a single session, further complicating containment efforts.

The Gentlemen have also broadened their operating system coverage, adding enhanced support for Linux and ESXi environments. 

These variants include privilege escalation features, cluster-aware operations, and the ability to encrypt vSAN storage or multiple hypervisors simultaneously — capabilities that directly target the core infrastructure many enterprises rely on. 

Silent-execution modes and timestamp preservation add an additional stealth layer, making detection and forensic reconstruction more difficult.

Collectively, these capabilities enable The Gentlemen to encrypt local disks, removable media, mapped network drives, virtualized workloads, and clustered hypervisors with equal efficiency. 

Their technical maturity, combined with aggressive dual-extortion tactics, makes them a highly effective and increasingly dangerous ransomware operation.

How The Gentlemen Ransomware Evades Defenses

Cybereason’s technical analysis shows that The Gentlemen ransomware family is built on a highly sophisticated cryptographic and operational foundation. 

The group uses modern, resilient encryption schemes such as XChaCha20 and Curve25519

Their Windows variant offers an unusually rich set of command-line flags enabling fine-tuned control over each deployment. 

Operators can choose system-level encryption (–system), network-share targeting (–shares), stealth operations via silent mode (–silent), or full dual-phase execution (–full). 

They also have access to adjustable encryption speeds ranging from 1% to 9% (–fast, –superfast, –ultrafast), allowing them to balance stealth against impact depending on the victim’s defenses.

Reverse engineering by Cybereason uncovered embedded ransom notes and distinctive internal markers — strings previously discussed on dark-web forums as components of anti-ransomware bypass strategies. 

These artifacts suggest that the developers intentionally integrated techniques known to evade modern defensive tooling. 

During active intrusions, The Gentlemen rely heavily on PowerShell, executing commands that disable Microsoft Defender, add global exclusions, expand firewall discovery rules, enumerate volumes across local and clustered environments, and modify file permissions using icacls to guarantee full access before encryption begins. 

The ransomware also performs extensive anti-forensics, wiping Prefetch data, RDP logs, Defender support files, and other artifacts to obstruct post-incident investigations.

To maximize impact, the group maintains an internal “kill list” targeting critical processes such as database engines, virtualization components, backup services, and remote-access tools — ensuring no files remain locked or protected during encryption. 

Their Linux and ESXi lockers extend the threat even further, adding system-level autostart persistence, configurable user-to-root privilege escalation, concurrent encryption across ESXi clusters (including vSAN), and aggressive disk-space wiping after encryption to complicate recovery efforts.

Essential Defenses for Fast-Moving Ransomware Threats

As The Gentlemen ransomware group continues to evolve with advanced propagation, persistence, and encryption capabilities, organizations need proactive defenses that can detect and contain attacks before data is locked or exfiltrated.

  • Monitor for pre-ransomware behaviors such as suspicious PowerShell execution, unauthorized admin tooling, or WMI-driven lateral movement.
  • Enforce MFA, strong credential hygiene, and strict application allow-listing to prevent unauthorized binaries or privilege abuse.
  • Maintain offline, immutable backups and regularly test restoration procedures to ensure rapid recovery after an attack.
  • Patch Windows, Linux, and ESXi systems to close privilege escalation and remote-execution vulnerabilities.
  • Segment networks to isolate high-value systems, hypervisors, and backups from user environments.
  • Deploy endpoint protection with behavioral ransomware detection to block unauthorized encryption or mass file modification.
  • Automate incident response to detect and contain suspicious activity appears.

Building resilience against fast-moving ransomware groups like The Gentlemen requires more than isolated security controls — it demands a coordinated strategy that limits attacker mobility and accelerates detection.

The New Ransomware Model: Agile, Modular, and Fast

The Gentlemen’s rapid evolution highlights a broader shift in the ransomware landscape, where emerging groups can now reach the sophistication of long-established gangs by relying on modular tooling, affiliate networks, and cross-platform development. 

Their dual-extortion tactics, expanding victim list, and steady stream of feature updates show how modern ransomware crews increasingly operate like full-fledged software organizations — iterating quickly, scaling efficiently, and continuously improving their capabilities.

This pace of adversary evolution underscores the need for organizations to adopt zero-trust principles to limit attacker movement and reduce risk.

Recommended for you...

Grafana SCIM Flaw Allows Admin Impersonation and Full Takeover
Ken Underhill
Nov 21, 2025
Hidden Comet Browser API Allowed Dangerous Local Command Execution
Ken Underhill
Nov 21, 2025
Allies Sanction Russian Network Behind Major Cyberattacks
Ken Underhill
Nov 21, 2025
Amazon Warns: Nation-State Hackers Tying Cyber Attacks to Real-World Strikes
Ken Underhill
Nov 20, 2025
eSecurity Planet Logo

eSecurity Planet is a leading resource for IT professionals at large enterprises who are actively researching cybersecurity vendors and latest trends. eSecurity Planet focuses on providing instruction for how to approach common security challenges, as well as informational deep-dives about advanced cybersecurity topics.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.