A previously undocumented threat actor, dubbed "The Gentlemen," has demonstrated advanced capabilities, targeting critical industries across at least 17 countries with a highly adaptive and systematic approach. New Trend Micro research provides an in-depth ransomware attack analysis of the group.
The Gentlemen ransomware group employs a sophisticated attack chain characterized by custom tools and adaptive evasion techniques. The campaign leverages the abuse of legitimate, signed drivers to achieve kernel-level manipulation, allowing them to terminate endpoint protection processes.Â
The actors have shown proficiency in abusing Group Policy Objects (GPOs) to facilitate domain-wide compromise, indicating a deep understanding of enterprise environments.
The group uses a combination of legitimate tools like PsExec, Nmap, and AnyDesk for lateral movement, reconnaissance, and persistence, querying local groups such as standard administrative and virtualization-specific groups like VMware.
Initial access is believed to be gained through the exploitation of internet-facing services, such as a compromised FortiGate server. Data exfiltration is conducted using encrypted channels via WinSCP, highlighting the group's operational security awareness.
The ransomware payload itself is password-protected, likely to evade automated sandbox analysis, and is deployed through the NETLOGON share for maximum impact. Before encryption, the malware disables Windows Defender and modifies firewall rules to ensure persistent remote access.
This campaign poses a significant cybersecurity threat to critical industries. Trend Micro's analysis reveals a focus on manufacturing, construction, healthcare, and insurance sectors, primarily in the Asia-Pacific region and the U.S.
Their methodical approach underscores the severe risk the Gentlemen group presents to global organizations.
A recent The DFIR Report intrusion analysis revealed overlap in RansomHub, DragonForce, and Play ransomware operations. In March, RansomHub was linked to Play, Medusa, and BianLian Ransomware via shared EDRKillShifter use, and DragonForce claimed an alleged RansomHub takeover in April.