The Gentlemen ransomware now uses SystemBC for bot-powered attacks
好的,我现在需要帮用户总结一篇文章,控制在100字以内。用户给的文章内容比较复杂,涉及Gentlemen勒索软件、SystemBC代理恶意软件僵尸网络等。 首先,我需要通读整篇文章,抓住主要信息。文章提到Gentlemen勒索软件攻击了罗马尼亚最大的能源公司,并且Check Point发现了超过1570个受感染的主机,这些受害者主要是企业。SystemBC被用来作为代理恶意软件,用于分发恶意负载。 接下来,我需要将这些信息浓缩到100字以内。要确保涵盖关键点:Gentlemen勒索软件、攻击事件、Check Point的发现、受感染的企业数量以及SystemBC的作用。 然后,检查是否有遗漏的重要信息。比如文章提到Gentlemen RaaS的发展情况、加密方案以及他们在地下论坛招募 affiliate 等。但为了简洁,可能不需要全部包含进去。 最后,组织语言,确保句子通顺且信息完整。避免使用复杂的术语,让总结更易理解。 </think> Gentlemen 勒索软件攻击了罗马尼亚大型能源公司等目标,Check Point 发现其利用 SystemBC 代理恶意软件僵尸网络感染超 1,570 个企业主机。该僵尸网络用于分发恶意负载并支持横向移动及加密操作。 2026-4-20 20:16:41 Author: www.bleepingcomputer.com(查看原文) 阅读量:15 收藏

The Gentlemen ransomware now uses SystemBC for bot-powered attacks

A SystemBC proxy malware botnet of more than 1,570 hosts, believed to be corporate victims, has been discovered following an investigation into a Gentlemen ransomware attack carried out by a gang affiliate.

The Gentlemen ransomware-as-a-service (RaaS) operation emerged around mid-2025 and provides a Go-based locker that can encrypt Windows, Linux, NAS, and BSD systems, and a C-based locker for ESXi hypervisors.

Last December, it compromised one of Romania’s largest energy providers, the Oltenia Energy Complex. Earlier this month, The Adaptavist Group disclosed a breach that Gentlemen ransomware listed on its data leak site.

image

Although the RaaS operation has publicly claimed around 320 victims, most of the attacks occurring this year, Check Point researchers discovered that the Gentlemen ransomware affiliates are expanding their attack toolkit and infrastructure.

During an incident response engagement, the researchers found that an affiliate for the ransomware operation tried to deploy the proxy malware for covert payload delivery.

“Check Point Research observed victim telemetry from the relevant SystemBC command‑and‑control server, revealing a botnet of over 1,570 victims, with the infection profile strongly suggesting a focus on corporate and organizational environments rather than opportunistic consumer targeting,” the researchers say in a report today.

SystemBC has been around since at least 2019 and is used for SOCKS5 tunneling. Due to its capability to deliver malicious payloads, it was quickly adopted  and also to send malicious payloads. It capability to introduce payloads onto infected systems was quickly adopted by ransomware gangs.

Despite a law enforcement operation that affected it in 2024, the botnet remains active, and last year Black Lotus Labs reported that it was infecting 1,500 commercial virtual private servers (VPS) every day to funnel malicious traffic.

According to Check Point, most of the victims linked to Gentlemen’s deployment of SystemBC are located in the United States, the United Kingdom, Germany, Australia, and Romania.

Location of infected organizations
Location of infected organizations
Source: Check Point

"The specific Command and Control server that was used for the communication had infected a large number of victims across the globe. It is likely that the majority of those victims are companies and organizations, given that SystemBC is typically deployed as part of human‑operated intrusion workflows rather than massive targeting," Check Point says.

The researchers are unsure how SystemBC fits into Gentlemen ransomware's ecosystem and could not determine if the malware was used by multiple affiliates.

Infection chain and encryption scheme

Although Check Point could not determine the initial access vector in the observed attacks, the researchers say that the Gentlemen threat actor operated from a Domain Controller with Domain Admin privileges.

From there, the attacker checked which credentials worked and conducted reconnaissance before deploying Cobalt Strike payloads to remote systems via RPC.

Lateral movement was supported by credential harvesting using Mimikatz and remote execution. The attackers staged the ransomware from an internal server and leveraged built-in propagation and Group Policy (GPO) to trigger near-simultaneous execution of the encryptor across domain-joined systems.

The Gentlemen attack chain
Gentlemen ransomware affiliate's attack chain
Source: Check Point

According to the researchers, the malware uses a hybrid scheme based on X25519 (Diffie–Hellman) and XChaCha20, with a random ephemeral key pair generated for each file.

Files under 1 MB are fully encrypted, while with larger files only chunks of data of about 9%, 3%, or 1% were encrypted.

Before encryption, Gentlemen ransomware terminates databases, backup software, and virtualization processes, and deletes Shadow copies and logs. The ESXi variant also shuts down VMs to ensure the disks can be encrypted.

Ransom note of the ESXi variant
Ransom note of the ESXi variant
Source: Check Point

The Gentlemen ransomware doesn’t make headlines often but Check Point warns that the RaaS is quickly growing, advertising to recruit new ransomware affiliates via underground forums.

The researchers believe that using SystemBC with Cobalt Strike and the botnet of 1,570 hosts may indicate that the Gentlemen ransomware gang is now operating at a higher level,  "actively integrating into a broader toolchain of mature, post‑exploitation frameworks and proxy infrastructure."

Apart from indicators of compromise (IoCs) collected from the investigated incident, Check Point also provides signature-based detection in the form of a YARA rule to help defenders protect against such attacks.

article image

99% of What Mythos Found Is Still Unpatched.

AI chained four zero-days into one exploit that bypassed both renderer and OS sandboxes. A wave of new exploits is coming.

At the Autonomous Validation Summit (May 12 & 14), see how autonomous, context-rich validation finds what's exploitable, proves controls hold, and closes the remediation loop.

Claim Your Spot


文章来源: https://www.bleepingcomputer.com/news/security/the-gentlemen-ransomware-now-uses-systembc-for-bot-powered-attacks/
如有侵权请联系:admin#unsafe.sh