Check Point Uncovers Link Between SystemBC Malware and Gentlemen Ransomware Operation

www.news4hackers.com-check-point-uncovers-link-between-systembc-malware-and-gentlemen-ransomware-operation-check-point-uncovers-link-between-systembc-malware-and-gentlemen-ransomware-operation

Threat Actors Linked to The Gentlemen Ransomware Operation Employ SystemBC Malware

In a recent development, researchers have discovered a connection between the notorious ransomware group, The Gentlemen, and the malware strain, SystemBC.

SystemBC Malware Overview

SystemBC is a well-known proxy malware that establishes SOCKS5 network tunnels within a victim’s environment, facilitating communication with its command-and-control server via a custom RC4-encrypted protocol.

The malware can also employ legitimate drivers and custom tools to evade defenses, making it a formidable tool for malicious actors.

The Gentlemen Ransomware Operation

The Gentlemen, which emerged in July 2025, operates a double-extortion model, targeting Windows, Linux, NAS, and BSD systems with a Go-based locker.

The group has claimed over 320 victims on its data leak site, with its activities spanning multiple continents.

According to researchers, “The Gentlemen’s operation appears to be larger than initially reported, with a growing number of victims and expanding infrastructure.”

Tactics and Techniques

Researchers have identified several key tactics employed by The Gentlemen, including the abuse of internet-facing services or compromised credentials, followed by discovery, lateral movement, payload staging, and ransomware deployment.

The group uses Group Policy Objects to facilitate domain-wide compromise, allowing them to spread their malware efficiently.

Additionally, The Gentlemen employs PowerShell scripts to disable Windows Defender during lateral movement.

These scripts turn off real-time monitoring, broaden exclusions, shut down the firewall, re-enable SMB1, and loosen LSA anonymous access controls before deploying the ransomware binary.

Other Ransomware Families

Other ransomware families, such as Kyber, have also been identified, targeting Windows and VMware ESXi infrastructure using encryptors developed in Rust and C++.

Ransomware attacks continue to evolve, with dwell times shrinking from days to hours and attackers increasingly targeting small and mid-sized organizations and operational technology environments.

In the first quarter of 2026, there were at least 2,059 separate ransomware and digital extortion incidents, with March alone accounting for 747 incidents. The most active groups included Qilin, Akira, The Gentlemen, INC Ransom, and Cl0p.




About Author

en_USEnglish