Ransomware affiliate leak exposes The Gentlemen’s playbook

March 21, 20262 min read2 sources
Share:
Ransomware affiliate leak exposes The Gentlemen’s playbook

A ransomware affiliate using the name “Hastalamuerte” has reportedly leaked operational details tied to The Gentlemen ransomware-as-a-service group, offering a rare look at how the crew gains access, evades defenses and structures attacks. According to Infosecurity Magazine, the exposed material references FortiGate exploitation, bring-your-own-vulnerable-driver (BYOVD) techniques and “split tactics” linked to Qilin-style operations.

The reported FortiGate angle matters because edge devices remain a common entry point for ransomware crews. Compromising a firewall or remote access appliance can give attackers a foothold before they move laterally inside a victim network. The leak did not publicly tie the activity to a specific Fortinet CVE, but FortiGate flaws and stolen credentials have repeatedly featured in real-world intrusion chains. Organizations running internet-facing firewalls and VPN infrastructure should review patch status, exposed management interfaces and authentication logs.

The mention of BYOVD suggests The Gentlemen or its affiliates are using signed but vulnerable drivers to disable or bypass endpoint protections before deploying ransomware. That technique has become a favored way to tamper with EDR and antivirus tools without using obviously malicious kernel code. In practice, it gives attackers a better chance of reaching encryption and extortion stages undetected.

The reference to Qilin “split tactics” points to another trend: ransomware brands increasingly operate as loose affiliate networks, with intrusion, data theft and encryption sometimes handled by different actors or separate infrastructure. That makes attribution harder and disruption less durable, since operators can rebrand or shift tooling quickly when exposed.

There is no public victim list attached to this leak so far. Still, the disclosure is useful intelligence for defenders because affiliate leaks often reveal the real mechanics behind ransomware campaigns more clearly than victim posts or leak-site claims. Security teams should treat the report as a reminder to harden perimeter devices, monitor for unusual driver loads and look for signs of endpoint tampering before encryption begins.

Share:

// SOURCES

// RELATED

Critical and high-severity n8n sandbox flaws open path to remote code execution

Two severe n8n sandbox flaws could enable remote code execution, putting self-hosted automation servers and stored secrets at risk.

2 min readMar 21

Microsoft fixes three zero-days in first Patch Tuesday of 2026

Microsoft’s first Patch Tuesday of 2026 fixes three zero-days, including one already exploited, prompting urgent patching.

2 min readMar 21

Google patches Chrome’s fifth zero-day of the year

Google fixed Chrome zero-day CVE-2023-4863, a libwebp flaw under active attack that could allow arbitrary code execution.

2 min readMar 21

Compromised WordPress sites used in global ClickFix infostealer campaign

Rapid7 warns over 250 legitimate sites were compromised to push ClickFix prompts and infostealer malware at unsuspecting visitors.

2 min readMar 21