Ransomware affiliate leak exposes The Gentlemen’s playbook

March 21, 20262 min read2 sources
Share:
Ransomware affiliate leak exposes The Gentlemen’s playbook

A ransomware affiliate using the name “Hastalamuerte” has reportedly leaked operational details tied to The Gentlemen ransomware-as-a-service group, offering a rare look at how the crew gains access, evades defenses and structures attacks. According to Infosecurity Magazine, the exposed material references FortiGate exploitation, bring-your-own-vulnerable-driver (BYOVD) techniques and “split tactics” linked to Qilin-style operations.

The reported FortiGate angle matters because edge devices remain a common entry point for ransomware crews. Compromising a firewall or remote access appliance can give attackers a foothold before they move laterally inside a victim network. The leak did not publicly tie the activity to a specific Fortinet CVE, but FortiGate flaws and stolen credentials have repeatedly featured in real-world intrusion chains. Organizations running internet-facing firewalls and VPN infrastructure should review patch status, exposed management interfaces and authentication logs.

The mention of BYOVD suggests The Gentlemen or its affiliates are using signed but vulnerable drivers to disable or bypass endpoint protections before deploying ransomware. That technique has become a favored way to tamper with EDR and antivirus tools without using obviously malicious kernel code. In practice, it gives attackers a better chance of reaching encryption and extortion stages undetected.

The reference to Qilin “split tactics” points to another trend: ransomware brands increasingly operate as loose affiliate networks, with intrusion, data theft and encryption sometimes handled by different actors or separate infrastructure. That makes attribution harder and disruption less durable, since operators can rebrand or shift tooling quickly when exposed.

There is no public victim list attached to this leak so far. Still, the disclosure is useful intelligence for defenders because affiliate leaks often reveal the real mechanics behind ransomware campaigns more clearly than victim posts or leak-site claims. Security teams should treat the report as a reminder to harden perimeter devices, monitor for unusual driver loads and look for signs of endpoint tampering before encryption begins.

Share:

// SOURCES

// RELATED

Most 'AI SOCs' are just faster triage, and that's not enough

Many AI security tools only speed up alert analysis, failing to reduce analyst workload. Experts argue real gains require AI that automates response a

2 min readApr 17

ZionSiphon malware designed to sabotage water treatment systems

A new proof-of-concept malware, ZionSiphon, demonstrates how attackers can sabotage water treatment plants by manipulating industrial control systems.

2 min readApr 17

ThreatsDay bulletin: A deep dive into the Defender 0-day, SonicWall attacks, and a 17-year-old Excel flaw

This week’s threat bulletin is a heavy one. We analyze the critical Microsoft Defender 0-day, a massive SonicWall brute-force campaign, and a 17-year-

6 min readApr 17

Microsoft Defender's 'RedSun' zero-day: A researcher's protest and a threat to Windows systems

A researcher's protest exposed a critical zero-day in Microsoft Defender, allowing attackers full system control. Here's the technical breakdown and h

7 min readApr 17