Science & Space

Unmasking The Gentlemen RaaS: A Technical Guide to Understanding and Defending Against SystemBC Proxy Attacks

2026-05-04 14:49:01

Overview

The cybersecurity landscape in early 2026 has witnessed the rapid rise of The Gentlemen ransomware-as-a-service (RaaS) operation, which has already claimed over 320 victims—240 of them in the first months of this year. This group provides a versatile locker portfolio written in Go for Windows, Linux, NAS, and BSD, plus a C-based ESXi locker, enabling affiliates to target the heterogeneous environments common in modern enterprises. During incident response engagements, Check Point Research observed affiliates deploying SystemBC, a proxy malware used for covert tunneling and payload delivery. Analysis of the associated command-and-control (C2) server revealed a botnet of over 1,570 victims, predominantly corporate networks rather than individual consumers. This tutorial provides a step-by-step guide for security analysts to understand, detect, and respond to attacks leveraging The Gentlemen RaaS and SystemBC.

Unmasking The Gentlemen RaaS: A Technical Guide to Understanding and Defending Against SystemBC Proxy Attacks
Source: research.checkpoint.com

Prerequisites

Before diving into the analysis, ensure you have the following:

Step-by-Step Analysis and Mitigation

Step 1: Identify The Gentlemen RaaS Characteristics

The Gentlemen emerged around mid-2025 and aggressively markets its RaaS platform on underground forums and social media (e.g., Twitter/X). Key identifiers include:

Action: Monitor underground forums and social media for posts advertising The Gentlemen. Collect samples from open-source threat intel feeds (e.g., VirusTotal, Any.Run). Hash the lockers and add them to detection rules.

Step 2: Recognize SystemBC Proxy Malware

SystemBC is a proxy malware that establishes SOCKS5 tunnels within a victim’s network. It is frequently used in human-operated ransomware operations to:

Indicators of compromise (IoCs):

Action: Deploy network monitoring rules to flag SOCKS5 handshake patterns. Use YARA rules for SystemBC payload hashes (available from Check Point Research reports).

Step 3: Analyze the Infection Chain

During an incident response engagement, the affiliate used SystemBC to maintain access and later deploy The Gentlemen ransomware. The typical chain:

  1. Initial access via phishing, exploited public-facing applications, or purchased credentials.
  2. Persistence and reconnaissance using Cobalt Strike or similar frameworks.
  3. SystemBC deployment to establish a SOCKS5 proxy for hidden C2.
  4. Lateral movement using RDP or SMB, facilitated by the proxy.
  5. Ransomware execution on multiple platforms using The Gentlemen lockers.

Action: Review EDR logs for process creation chains—look for command-line arguments that download SystemBC (e.g., powershell -enc ...). Use timeline analysis to correlate network connections and file writes.

Unmasking The Gentlemen RaaS: A Technical Guide to Understanding and Defending Against SystemBC Proxy Attacks
Source: research.checkpoint.com

Step 4: Detect C2 Activity via Telemetry

Check Point Research observed victim telemetry from SystemBC’s C2 server, revealing over 1,570 victims. Detection strategies include:

Action: Set up Zeek scripts to detect SOCKS5 initiation (e.g., the 0x05 byte sequence). Use suricata rules to alert on known SystemBC C2 IP ranges (from threat intel).

Step 5: Implement Mitigation and Response

To defend against The Gentlemen and SystemBC attacks, consider these steps:

Action: Test detection rules in a production-like lab. Coordinate with threat intel feeds to update IoCs regularly.

Common Mistakes

Summary

This guide has covered the key aspects of The Gentlemen RaaS and SystemBC proxy malware, from identifying the threat actor’s modus operandi to practical detection and response steps. By understanding the multi-platform nature of the locker portfolio and the role of SystemBC in enabling covert C2, security teams can better safeguard corporate environments. Continuous monitoring, threat intel ingestion, and proactive testing of detection rules are essential to stay ahead of this rapidly growing threat.

Explore

PlayStation 2 Rarity Crisis: Five Games Vanish from Shelves, Prices Soar Identifying and Addressing Sacrifice Zones in Critical Mineral Mining: A Comprehensive Guide Microsoft Discovery: Redefining R&D with Autonomous Agent Teams New Zine Exposes Hidden Rules of the Terminal, Promises to End Decades of Confusion Upcoming Linux 7.2 Kernel: Fair Scheduler and AMD AIE4 Support