Illustration of a hacking forum ad for The Gentlemen's RaaS ransomware service, depicting a dark web cyber threat environment.
Illustration of a hacking forum ad for The Gentlemen's RaaS ransomware service, depicting a dark web cyber threat environment.
AI द्वारा उत्पन्न छवि

New gentlemen's raas advertised on underground forums

AI द्वारा उत्पन्न छवि

Threat actor zeta88 is promoting a new ransomware-as-a-service operation called The Gentlemen's RaaS on hacking forums, targeting Windows, Linux, and ESXi systems. The platform offers affiliates 90 percent of ransom payments and features cross-platform encryption tools developed in Go and C. This development highlights the ongoing commercialization of sophisticated ransomware targeting enterprise environments.

On October 29, 2025, threat intelligence reports emerged detailing the advertisement of The Gentlemen's RaaS by the operator known as zeta88 across underground hacking forums. This cross-platform ransomware-as-a-service (RaaS) targets enterprise systems running Windows, Linux—including network-attached storage (NAS) and BSD variants—and VMware ESXi virtual environments.

The technical architecture emphasizes modularity and efficiency. Windows and Linux lockers are built in Go for cross-compilation and resource optimization, while the ESXi variant, coded in C, has a compact size of approximately 32 kilobytes to facilitate stealthy deployment in virtualized setups. Encryption relies on XChaCha20 stream cipher and Curve25519 for key exchange, with per-file ephemeral keys to hinder decryption efforts. Propagation and persistence mechanisms include Windows Management Instrumentation (WMI), WMIC, SCHTASKS for scheduled tasks, SC for services, and PowerShell Remoting, enabling lateral movement and run-on-boot execution. The malware also automates network share discovery for worm-like spread.

Economically, the program allocates 90 percent of ransom proceeds to affiliates, with operators retaining 10 percent. Affiliates control negotiations, leveraging their expertise, while the operator provides backend support, including a data-leak site for exfiltrated data and a universal decryptor for all platforms. Builds are password-protected to evade analysis.

The operation excludes targets in Russia and Commonwealth of Independent States (CIS) countries, a common trait in Russian-affiliated cybercrime. All specifications stem from unverified promotional materials, but they align with trends in professional ransomware development. Organizations are advised to enhance endpoint detection, network segmentation, and backups against such threats.

संबंधित लेख

Realistic illustration of a computer screen showing the VanHelsing ransomware attack targeting multiple operating systems, suitable for a cybersecurity news article.
AI द्वारा उत्पन्न छवि

VanHelsing ransomware RaaS targets multiple platforms

AI द्वारा रिपोर्ट किया गया AI द्वारा उत्पन्न छवि

A new ransomware-as-a-service operation called VanHelsing emerged on March 7, 2025, quickly claiming at least three victims. It supports attacks on Windows, Linux, BSD, ARM, and ESXi systems, with affiliates retaining 80% of ransoms after a $5,000 deposit. The group prohibits targeting entities in the Commonwealth of Independent States.

SentinelOne researchers have disclosed a critical flaw in CyberVolk's new VolkLocker ransomware-as-a-service: a hardcoded master key stored in plaintext, enabling victims to decrypt files without ransom payment. Following the group's August 2025 relaunch after Telegram bans, this weakness underscores quality issues in their RaaS ecosystem.

AI द्वारा रिपोर्ट किया गया

The Qilin ransomware group, also known as Agenda, has developed a hybrid attack using Linux payloads on Windows hosts to evade detection. By abusing legitimate remote management tools and exploiting vulnerable drivers, attackers disable defenses and target backups. This cross-platform tactic highlights evolving ransomware sophistication.

Researchers at LevelBlue have identified a new variant of the SysUpdate malware aimed at Linux systems during a digital forensics and incident response engagement. The malware disguises itself as a legitimate system service and employs advanced encryption for command-and-control communications. By reverse-engineering it, the team created tools to decrypt its traffic more quickly.

AI द्वारा रिपोर्ट किया गया

Researchers at Check Point have revealed that VoidLink, a sophisticated Linux malware targeting cloud servers, was largely built by a single developer using AI tools. The framework, which includes over 30 modular plugins for long-term system access, reached 88,000 lines of code in under a week despite plans suggesting a 20-30 week timeline. This development highlights AI's potential to accelerate advanced malware creation.

A Go-based botnet known as GoBruteforcer is scanning and compromising Linux servers globally by brute-forcing weak passwords on exposed services like FTP, MySQL, and PostgreSQL. Check Point Research has identified a 2025 variant that has infected tens of thousands of machines, putting over 50,000 internet-facing servers at risk. The attacks exploit common defaults from AI-generated configurations and legacy setups.

AI द्वारा रिपोर्ट किया गया

Two US-based cybersecurity professionals have pleaded guilty to participating in Blackcat ransomware attacks. Ryan Clifford Goldberg and Kevin Tyler Martin face potential years in prison for their involvement.

 

 

 

यह वेबसाइट कुकीज़ का उपयोग करती है

हम अपनी साइट को बेहतर बनाने के लिए विश्लेषण के लिए कुकीज़ का उपयोग करते हैं। अधिक जानकारी के लिए हमारी गोपनीयता नीति पढ़ें।
अस्वीकार करें