top of page

SystemBC C2 Infrastructure Exposes Over 1,570 Victims Connected to The Gentlemen Ransomware Campaign

  • 19 hours ago
  • 2 min read

Key Findings


  • A compromised SystemBC C2 server linked to The Gentlemen ransomware operation revealed over 1,570 infected corporate networks globally

  • The Gentlemen has claimed more than 320 victims since emerging in July 2025, establishing itself as one of the most prolific ransomware groups

  • The group targets Windows, Linux, NAS, and BSD systems using Go-based encryption and demonstrates sophisticated defense evasion tactics

  • SystemBC establishes SOCKS5 tunnels using custom RC4-encrypted protocols and can download and execute additional malware payloads

  • Q1 2026 data shows 2,059 ransomware incidents with The Gentlemen among the top five most active groups


Background


The Gentlemen emerged in July 2025 as a ransomware-as-a-service operation operating under a double-extortion model. The group quickly distinguished itself through versatility and operational sophistication, capable of targeting multiple operating systems and infrastructure types. Check Point's discovery of the SystemBC C2 server provided unprecedented visibility into the operation's actual scale, revealing that publicly reported victims represent only a fraction of their true impact.


SystemBC Proxy Malware Capabilities


SystemBC functions as a sophisticated proxy tool that creates SOCKS5 network tunnels within victim environments. The malware communicates with its command-and-control infrastructure using a custom RC4-encrypted protocol, making detection more difficult for standard security measures. Beyond establishing tunnels for remote access, SystemBC can download and execute additional payloads either written directly to disk or injected into running processes to avoid detection.


Attack Methodology and Initial Access


The exact initial access vector remains unclear, but evidence suggests The Gentlemen exploits internet-facing services or compromised credentials to establish footholds. Once inside, operators engage in systematic reconnaissance, lateral movement, and payload staging before deploying ransomware. The group has demonstrated particular sophistication in abusing Group Policy Objects to achieve domain-wide compromise, indicating deep familiarity with Windows Active Directory environments.


Defense Evasion and Lateral Movement


During lateral movement, The Gentlemen employs aggressive anti-security measures. Operators deploy PowerShell scripts that disable Windows Defender real-time monitoring, add broad drive exclusions, shut down firewalls, re-enable SMB1, and loosen LSA anonymous access controls. This multi-layered approach ensures minimal resistance to ransomware deployment across compromised networks. The group has also demonstrated vendor-specific awareness, tailoring their tactics and tool modifications based on security products detected in target environments.


Multi-Platform Targeting


The group's Windows variant operates as a sophisticated Go-based encryptor, while their ESXi variant incorporates virtualization-specific functions including virtual machine shutdown capabilities, crontab-based persistence, and recovery inhibition. This specialization reflects serious operational planning aimed at maximizing damage and ransom leverage across diverse infrastructure types.


Affiliate Recruitment and Operation Scale


The Gentlemen's rapid growth stems from superior affiliate recruitment and revenue-sharing models compared to competitors. Check Point's analysis of the compromised operator server revealed that the publicly known victim count significantly underestimates the operation's true scope. The group continues expanding, suggesting the affiliate model is proving more sustainable than traditional ransomware operations that generate initial attention before disappearing.


Broader Ransomware Landscape


The first quarter of 2026 saw 2,059 separate ransomware and digital extortion incidents, with March alone accounting for 747 incidents. The Gentlemen ranked third among most active groups during this period, behind Qilin and Akira. Emerging competitors like Kyber ransomware demonstrate the ecosystem's continued evolution, with new families incorporating specialized capabilities for specific infrastructure types rather than broad general-purpose functionality.


Sources


  • https://thehackernews.com/2026/04/systembc-c2-server-reveals-1570-victims.html

  • https://www.socdefenders.ai/item/c35067c5-c887-45ba-8354-53369521b51f

  • https://www.sepe.gr/en/it-technology/cybersecurity/22715868/systembc-c2-server-reveals-1-570-victims-in-the-gentlemen-ransomware-operation/

Recent Posts

See All

Comments


  • Youtube

© 2025 by Explain IT Again. Powered and secured by Wix

bottom of page