Unmasking The Gentlemen RaaS: A Technical Guide to Understanding and Defending Against SystemBC Proxy Attacks

By
<h2 id="overview">Overview</h2> <p>The cybersecurity landscape in early 2026 has witnessed the rapid rise of <strong>The Gentlemen</strong> ransomware-as-a-service (RaaS) operation, which has already claimed over 320 victims—240 of them in the first months of this year. This group provides a versatile locker portfolio written in Go for Windows, Linux, NAS, and BSD, plus a C-based ESXi locker, enabling affiliates to target the heterogeneous environments common in modern enterprises. During incident response engagements, Check Point Research observed affiliates deploying <strong>SystemBC</strong>, a proxy malware used for covert tunneling and payload delivery. Analysis of the associated command-and-control (C2) server revealed a botnet of over 1,570 victims, predominantly corporate networks rather than individual consumers. This tutorial provides a step-by-step guide for security analysts to understand, detect, and respond to attacks leveraging The Gentlemen RaaS and SystemBC.</p><figure style="margin:20px 0"><img src="https://research.checkpoint.com/wp-content/uploads/2026/04/gentlemen.png" alt="Unmasking The Gentlemen RaaS: A Technical Guide to Understanding and Defending Against SystemBC Proxy Attacks" style="width:100%;height:auto;border-radius:8px" loading="lazy"><figcaption style="font-size:12px;color:#666;margin-top:5px">Source: research.checkpoint.com</figcaption></figure> <h2 id="prerequisites">Prerequisites</h2> <p>Before diving into the analysis, ensure you have the following:</p> <ul> <li><strong>Basic knowledge of ransomware operations</strong> and common TTPs (Tactics, Techniques, and Procedures).</li> <li><strong>Familiarity with network analysis tools</strong> such as Wireshark, Zeek, or tcpdump.</li> <li><strong>Access to endpoint detection and response (EDR) logs</strong> or sandbox environments for malware analysis.</li> <li><strong>Understanding of SOCKS5 proxies</strong> and tunneling concepts.</li> <li><strong>Optional:</strong> A virtual lab with Windows, Linux, and ESXi machines to simulate multi-platform infections.</li> </ul> <h2 id="step-by-step">Step-by-Step Analysis and Mitigation</h2> <h3 id="step1">Step 1: Identify The Gentlemen RaaS Characteristics</h3> <p>The Gentlemen emerged around mid-2025 and aggressively markets its RaaS platform on underground forums and social media (e.g., Twitter/X). Key identifiers include:</p> <ul> <li><strong>Multi-platform lockers:</strong> Go-based executables for Windows, Linux, NAS, and BSD; a C-based locker for ESXi.</li> <li><strong>EDR-killing tools</strong> provided to verified affiliates.</li> <li><strong>Multi-chain pivot infrastructure</strong> (proprietary server and client components).</li> <li><strong>Leak site on an onion domain</strong>, but negotiations occur via individual affiliate Tox IDs, not the portal.</li> <li><strong>Ransom note references</strong> a Twitter/X account that publicly shames victims.</li> </ul> <p><strong>Action:</strong> Monitor underground forums and social media for posts advertising The Gentlemen. Collect samples from open-source threat intel feeds (e.g., VirusTotal, Any.Run). Hash the lockers and add them to detection rules.</p> <h3 id="step2">Step 2: Recognize SystemBC Proxy Malware</h3> <p>SystemBC is a proxy malware that establishes SOCKS5 tunnels within a victim’s network. It is frequently used in human-operated ransomware operations to:</p> <ul> <li>Create covert channels for C2 communication.</li> <li>Enable lateral movement by routing traffic through compromised hosts.</li> <li>Deliver additional payloads (e.g., ransomware binaries).</li> </ul> <p><strong>Indicators of compromise (IoCs):</strong></p> <ul> <li>Outbound connections to unusual IPs/ports, especially on non-standard SOCKS5 ports (e.g., 1080, 8080).</li> <li>Processes named after common system utilities but located in temporary directories.</li> <li>Registry or file modifications creating persistence (e.g., scheduled tasks, services).</li> </ul> <p><strong>Action:</strong> Deploy network monitoring rules to flag SOCKS5 handshake patterns. Use YARA rules for SystemBC payload hashes (available from Check Point Research reports).</p> <h3 id="step3">Step 3: Analyze the Infection Chain</h3> <p>During an incident response engagement, the affiliate used SystemBC to maintain access and later deploy The Gentlemen ransomware. The typical chain:</p> <ol> <li><strong>Initial access</strong> via phishing, exploited public-facing applications, or purchased credentials.</li> <li><strong>Persistence and reconnaissance</strong> using Cobalt Strike or similar frameworks.</li> <li><strong>SystemBC deployment</strong> to establish a SOCKS5 proxy for hidden C2.</li> <li><strong>Lateral movement</strong> using RDP or SMB, facilitated by the proxy.</li> <li><strong>Ransomware execution</strong> on multiple platforms using The Gentlemen lockers.</li> </ol> <p><strong>Action:</strong> Review EDR logs for process creation chains—look for command-line arguments that download SystemBC (e.g., <code>powershell -enc ...</code>). Use timeline analysis to correlate network connections and file writes.</p><figure style="margin:20px 0"><img src="https://research.checkpoint.com/wp-content/uploads/2026/04/image-3.png" alt="Unmasking The Gentlemen RaaS: A Technical Guide to Understanding and Defending Against SystemBC Proxy Attacks" style="width:100%;height:auto;border-radius:8px" loading="lazy"><figcaption style="font-size:12px;color:#666;margin-top:5px">Source: research.checkpoint.com</figcaption></figure> <h3 id="step4">Step 4: Detect C2 Activity via Telemetry</h3> <p>Check Point Research observed victim telemetry from SystemBC’s C2 server, revealing over 1,570 victims. Detection strategies include:</p> <ul> <li><strong>Network traffic analysis:</strong> Identify periodic beaconing to IPs that do not resolve to known CDNs or cloud providers. SystemBC often uses custom encryption and non-standard ports.</li> <li><strong>DNS anomalies:</strong> Look for DGA-like domain queries or excessive NXDOMAIN responses.</li> <li><strong>Endpoint indicators:</strong> SystemBC may inject into legitimate processes (e.g., svchost.exe) to blend in.</li> </ul> <p><strong>Action:</strong> Set up Zeek scripts to detect SOCKS5 initiation (e.g., the 0x05 byte sequence). Use suricata rules to alert on known SystemBC C2 IP ranges (from threat intel).</p> <h3 id="step5">Step 5: Implement Mitigation and Response</h3> <p>To defend against The Gentlemen and SystemBC attacks, consider these steps:</p> <ul> <li><strong>Network segmentation</strong> to limit lateral movement through proxies.</li> <li><strong>Restrict outbound traffic</strong> using allowlists; block SOCKS5 on perimeter firewalls unless explicitly needed.</li> <li><strong>Endpoint hardening:</strong> Disable unused services, apply least privilege, and enable AppLocker or WDAC.</li> <li><strong>Logging and monitoring:</strong> Centralize logs from Windows Event Logs (4688, 5156), Linux syslog, and network flows.</li> <li><strong>Incident response playbook:</strong> Prepare procedures for isolating compromised hosts, revoking certificates, and notifying law enforcement.</li> </ul> <p><strong>Action:</strong> Test detection rules in a production-like lab. Coordinate with threat intel feeds to update IoCs regularly.</p> <h2 id="common-mistakes">Common Mistakes</h2> <ul> <li><strong>Ignoring non-Windows platforms:</strong> The Gentlemen targets Linux, NAS, BSD, and ESXi—securing only Windows leaves critical infrastructure vulnerable.</li> <li><strong>Assuming SystemBC is only a proxy:</strong> It can also deliver other payloads; treat any SOCKS5-related alert as a potential precursor to ransomware.</li> <li><strong>Relying solely on signature-based detection:</strong> SystemBC often evades static detection—use behavioral analysis and network heuristics.</li> <li><strong>Neglecting Tox ID monitoring:</strong> Affiliates use Tox for negotiations; tracking Tox IDs on underground forums can provide early warning.</li> <li><strong>Underestimating the scale:</strong> A single C2 server hosted over 1,570 victims—lack of visibility into proxy networks may hide widespread compromise.</li> </ul> <h2 id="summary">Summary</h2> <p>This guide has covered the key aspects of The Gentlemen RaaS and SystemBC proxy malware, from identifying the threat actor’s modus operandi to practical detection and response steps. By understanding the multi-platform nature of the locker portfolio and the role of SystemBC in enabling covert C2, security teams can better safeguard corporate environments. Continuous monitoring, threat intel ingestion, and proactive testing of detection rules are essential to stay ahead of this rapidly growing threat.</p>

Related Articles