Illustration of a hacking forum ad for The Gentlemen's RaaS ransomware service, depicting a dark web cyber threat environment.
Picha iliyoundwa na AI

New gentlemen's raas advertised on underground forums

Picha iliyoundwa na AI

Threat actor zeta88 is promoting a new ransomware-as-a-service operation called The Gentlemen's RaaS on hacking forums, targeting Windows, Linux, and ESXi systems. The platform offers affiliates 90 percent of ransom payments and features cross-platform encryption tools developed in Go and C. This development highlights the ongoing commercialization of sophisticated ransomware targeting enterprise environments.

On October 29, 2025, threat intelligence reports emerged detailing the advertisement of The Gentlemen's RaaS by the operator known as zeta88 across underground hacking forums. This cross-platform ransomware-as-a-service (RaaS) targets enterprise systems running Windows, Linux—including network-attached storage (NAS) and BSD variants—and VMware ESXi virtual environments.

The technical architecture emphasizes modularity and efficiency. Windows and Linux lockers are built in Go for cross-compilation and resource optimization, while the ESXi variant, coded in C, has a compact size of approximately 32 kilobytes to facilitate stealthy deployment in virtualized setups. Encryption relies on XChaCha20 stream cipher and Curve25519 for key exchange, with per-file ephemeral keys to hinder decryption efforts. Propagation and persistence mechanisms include Windows Management Instrumentation (WMI), WMIC, SCHTASKS for scheduled tasks, SC for services, and PowerShell Remoting, enabling lateral movement and run-on-boot execution. The malware also automates network share discovery for worm-like spread.

Economically, the program allocates 90 percent of ransom proceeds to affiliates, with operators retaining 10 percent. Affiliates control negotiations, leveraging their expertise, while the operator provides backend support, including a data-leak site for exfiltrated data and a universal decryptor for all platforms. Builds are password-protected to evade analysis.

The operation excludes targets in Russia and Commonwealth of Independent States (CIS) countries, a common trait in Russian-affiliated cybercrime. All specifications stem from unverified promotional materials, but they align with trends in professional ransomware development. Organizations are advised to enhance endpoint detection, network segmentation, and backups against such threats.

Makala yanayohusiana

Realistic illustration of a computer screen showing the VanHelsing ransomware attack targeting multiple operating systems, suitable for a cybersecurity news article.
Picha iliyoundwa na AI

VanHelsing ransomware RaaS targets multiple platforms

Imeripotiwa na AI Picha iliyoundwa na AI

A new ransomware-as-a-service operation called VanHelsing emerged on March 7, 2025, quickly claiming at least three victims. It supports attacks on Windows, Linux, BSD, ARM, and ESXi systems, with affiliates retaining 80% of ransoms after a $5,000 deposit. The group prohibits targeting entities in the Commonwealth of Independent States.

SentinelOne researchers have disclosed a critical flaw in CyberVolk's new VolkLocker ransomware-as-a-service: a hardcoded master key stored in plaintext, enabling victims to decrypt files without ransom payment. Following the group's August 2025 relaunch after Telegram bans, this weakness underscores quality issues in their RaaS ecosystem.

Imeripotiwa na AI

The Qilin ransomware group, also known as Agenda, has developed a hybrid attack using Linux payloads on Windows hosts to evade detection. By abusing legitimate remote management tools and exploiting vulnerable drivers, attackers disable defenses and target backups. This cross-platform tactic highlights evolving ransomware sophistication.

Cyble Research and Intelligence Labs has revealed ShadowHS, a sophisticated fileless framework for post-exploitation on Linux systems. The tool enables stealthy, in-memory operations and long-term access for attackers. It features a weaponized version of hackshell and advanced evasion techniques.

Imeripotiwa na AI

A Go-based botnet known as GoBruteforcer is scanning and compromising Linux servers globally by brute-forcing weak passwords on exposed services like FTP, MySQL, and PostgreSQL. Check Point Research has identified a 2025 variant that has infected tens of thousands of machines, putting over 50,000 internet-facing servers at risk. The attacks exploit common defaults from AI-generated configurations and legacy setups.

Cybercriminals have compromised trusted Linux applications on the Snap Store by seizing expired domains, allowing them to push malware that steals cryptocurrency recovery phrases. Security experts from SlowMist and Ubuntu contributor Alan Pope highlighted the attack, which targets established publisher accounts to distribute malicious updates impersonating popular wallets. Canonical has removed the affected snaps, but calls for stronger safeguards persist.

Imeripotiwa na AI

The EU Commission has presented a revised cybersecurity law to better fend off attacks and reduce dependencies on high-risk third countries. In particular focus: Chinese companies like Huawei and ZTE, which are to be effectively excluded from 5G rollout. This follows a recent hacker attack on the Eurail platform.

Jumanne, 20. Mwezi wa kwanza 2026, 09:23:54

Ransomware gang NightSpire claims Hyatt data breach

Alhamisi, 8. Mwezi wa kwanza 2026, 07:18:04

China-linked UAT-7290 targets telecoms with Linux malware

Jumatano, 31. Mwezi wa kumi na mbili 2025, 02:53:37

US cybersecurity professionals plead guilty to blackcat ransomware attacks

Jumapili, 21. Mwezi wa kumi na mbili 2025, 12:02:47

Chinese hackers install backdoors via Cisco email zero-day

Jumamosi, 13. Mwezi wa kumi na mbili 2025, 02:22:17

Rust-based Luca stealer targets Linux and Windows systems

Ijumaa, 12. Mwezi wa kumi na mbili 2025, 11:54:38

CyberVolk launches VolkLocker ransomware targeting Linux and Windows

Ijumaa, 12. Mwezi wa kumi na mbili 2025, 08:50:00

Russian cybercriminals release new ransomware

Jumatano, 10. Mwezi wa kumi na mbili 2025, 15:36:03

React2Shell flaw exploited for PeerBlight malware on Linux

Jumatano, 5. Mwezi wa kumi na moja 2025, 22:25:46

Russian hackers use Linux VMs to hide malware on Windows

Jumatano, 29. Mwezi wa kumi 2025, 11:29:39

Malicious npm packages steal developer credentials on multiple platforms

 

 

 

Tovuti hii inatumia vidakuzi

Tunatumia vidakuzi kwa uchambuzi ili kuboresha tovuti yetu. Soma sera ya faragha yetu kwa maelezo zaidi.
Kataa