Illustration of a hacking forum ad for The Gentlemen's RaaS ransomware service, depicting a dark web cyber threat environment.
Immagine generata dall'IA

New gentlemen's raas advertised on underground forums

Immagine generata dall'IA

Threat actor zeta88 is promoting a new ransomware-as-a-service operation called The Gentlemen's RaaS on hacking forums, targeting Windows, Linux, and ESXi systems. The platform offers affiliates 90 percent of ransom payments and features cross-platform encryption tools developed in Go and C. This development highlights the ongoing commercialization of sophisticated ransomware targeting enterprise environments.

On October 29, 2025, threat intelligence reports emerged detailing the advertisement of The Gentlemen's RaaS by the operator known as zeta88 across underground hacking forums. This cross-platform ransomware-as-a-service (RaaS) targets enterprise systems running Windows, Linux—including network-attached storage (NAS) and BSD variants—and VMware ESXi virtual environments.

The technical architecture emphasizes modularity and efficiency. Windows and Linux lockers are built in Go for cross-compilation and resource optimization, while the ESXi variant, coded in C, has a compact size of approximately 32 kilobytes to facilitate stealthy deployment in virtualized setups. Encryption relies on XChaCha20 stream cipher and Curve25519 for key exchange, with per-file ephemeral keys to hinder decryption efforts. Propagation and persistence mechanisms include Windows Management Instrumentation (WMI), WMIC, SCHTASKS for scheduled tasks, SC for services, and PowerShell Remoting, enabling lateral movement and run-on-boot execution. The malware also automates network share discovery for worm-like spread.

Economically, the program allocates 90 percent of ransom proceeds to affiliates, with operators retaining 10 percent. Affiliates control negotiations, leveraging their expertise, while the operator provides backend support, including a data-leak site for exfiltrated data and a universal decryptor for all platforms. Builds are password-protected to evade analysis.

The operation excludes targets in Russia and Commonwealth of Independent States (CIS) countries, a common trait in Russian-affiliated cybercrime. All specifications stem from unverified promotional materials, but they align with trends in professional ransomware development. Organizations are advised to enhance endpoint detection, network segmentation, and backups against such threats.

Articoli correlati

Realistic illustration of a computer screen showing the VanHelsing ransomware attack targeting multiple operating systems, suitable for a cybersecurity news article.
Immagine generata dall'IA

VanHelsing ransomware RaaS targets multiple platforms

Riportato dall'IA Immagine generata dall'IA

A new ransomware-as-a-service operation called VanHelsing emerged on March 7, 2025, quickly claiming at least three victims. It supports attacks on Windows, Linux, BSD, ARM, and ESXi systems, with affiliates retaining 80% of ransoms after a $5,000 deposit. The group prohibits targeting entities in the Commonwealth of Independent States.

SentinelOne researchers have disclosed a critical flaw in CyberVolk's new VolkLocker ransomware-as-a-service: a hardcoded master key stored in plaintext, enabling victims to decrypt files without ransom payment. Following the group's August 2025 relaunch after Telegram bans, this weakness underscores quality issues in their RaaS ecosystem.

Riportato dall'IA

The Qilin ransomware group, also known as Agenda, has developed a hybrid attack using Linux payloads on Windows hosts to evade detection. By abusing legitimate remote management tools and exploiting vulnerable drivers, attackers disable defenses and target backups. This cross-platform tactic highlights evolving ransomware sophistication.

Cyble Research and Intelligence Labs has revealed ShadowHS, a sophisticated fileless framework for post-exploitation on Linux systems. The tool enables stealthy, in-memory operations and long-term access for attackers. It features a weaponized version of hackshell and advanced evasion techniques.

Riportato dall'IA

A Go-based botnet known as GoBruteforcer is scanning and compromising Linux servers globally by brute-forcing weak passwords on exposed services like FTP, MySQL, and PostgreSQL. Check Point Research has identified a 2025 variant that has infected tens of thousands of machines, putting over 50,000 internet-facing servers at risk. The attacks exploit common defaults from AI-generated configurations and legacy setups.

Cybercriminals have compromised trusted Linux applications on the Snap Store by seizing expired domains, allowing them to push malware that steals cryptocurrency recovery phrases. Security experts from SlowMist and Ubuntu contributor Alan Pope highlighted the attack, which targets established publisher accounts to distribute malicious updates impersonating popular wallets. Canonical has removed the affected snaps, but calls for stronger safeguards persist.

Riportato dall'IA

The EU Commission has presented a revised cybersecurity law to better fend off attacks and reduce dependencies on high-risk third countries. In particular focus: Chinese companies like Huawei and ZTE, which are to be effectively excluded from 5G rollout. This follows a recent hacker attack on the Eurail platform.

 

 

 

Questo sito web utilizza i cookie

Utilizziamo i cookie per l'analisi per migliorare il nostro sito. Leggi la nostra politica sulla privacy per ulteriori informazioni.
Rifiuta