OTX Pulse analysis reveals active exploitation of Fortinet by The Gentlemen, AdaptixC2 framework adoption, and UNC1945 targeting finance via MSPs. Urgent patching required.
Threat Summary
Recent intelligence from AlienVault OTX highlights a convergence of sophisticated threat activities targeting enterprise infrastructure. The primary threats include The Gentlemen, a RaaS operation aggressively exploiting FortiOS/FortiProxy vulnerabilities for initial access; the widespread adoption of the AdaptixC2 post-exploitation framework by APT groups due to its cross-platform support and stealthy C2 channels; and UNC1945 (LightBasin), which continues to leverage compromised Managed Service Providers (MSPs) to infiltrate the financial sector. Collectively, these pulses indicate a trend toward exploiting edge devices (Fortinet), leveraging legitimate-but-compromised third-party access (MSPs), and utilizing highly modular, open-source C2 frameworks to evade detection.
Threat Actor / Malware Profile
The Gentlemen (RaaS)
- Profile: A sophisticated ransomware group operating as a Ransomware-as-a-Service model. They maintain a database of compromised devices to facilitate rapid deployment.
- Malware Families: Babuk, Babyk, Vasa Locker, Qilin, LockBit 5.0, Medusa.
- Distribution/TTPs: Exploits public-facing applications, specifically targeting FortiOS and FortiProxy vulnerabilities (e.g., CVE-2024-37085, CVE-2025-32463). They utilize advanced defense evasion techniques and employ a "double-extortion" model involving data exfiltration.
AdaptixC2 (Framework)
- Profile: An emerging open-source post-exploitation framework written in Go and C++. It is rapidly being adopted by various threat actors for its flexibility.
- Associated Malware: MgBot, CoolClient, ToneShell, VBShower, VBCloud, PowerShower, CloudAtlas.
- C2 & Capabilities: Supports extensive modularity via Beacon Object Files (BOFs). C2 channels include HTTP/S, TCP, mTLS, DNS, DoH, and SMB, all utilizing RC4 encryption. It supports Windows, macOS, and Linux.
UNC1945 / LightBasin
- Profile: A threat actor focused on the telecommunications and financial sectors. They specialize in compromising MSPs to gain third-party access to high-value targets.
- Malware Families: SLAPSTICK, EVILSUN, LEMONSTICK, STEELCORGI, LOGBLEACH, PUPYRAT, TINYSHELL, OKSOLO, OPENSHACKLE, ROLLCOAST.
- TTPs: Uses custom virtual machines pre-loaded with post-exploitation tools. Demonstrates advanced capabilities across Oracle Solaris, Windows, and Linux, exploiting zero-days like CVE-2020-14871.
IOC Analysis
The provided pulses consist primarily of File Hashes (MD5, SHA1, SHA256) and CVEs.
- Operationalizing Hashes: SOC teams should immediately load the provided hashes into EDR alerting rules and SIEM correlation engines. The SHA256 hashes are critical for identifying payloads on disk and in memory.
- CVE Management: The presence of CVE-2024-37085 (ESXi), CVE-2025-32463 (Fortinet - Future/Zero-day context), CVE-2024-55591, and CVE-2020-14871 (Solaris) suggests a focus on infrastructure and virtualization layers. Vulnerability scanners must be configured to flag these specific CVEs for immediate patching.
- Tooling: Use tools like
virustotal,hashmyfiles, or native EDR capabilities to hunt for these specific hashes on endpoints.
Detection Engineering
Sigma Rules
---
title: Potential The Gentlemen RaaS Fortinet Exploitation
id: 4b2e1a2f-8c9d-4e5f-9a1b-2c3d4e5f6a7b
description: Detects potential exploitation attempts of FortiOS vulnerabilities associated with The Gentlemen activity, focusing on critical CVEs and administrative access anomalies.
status: experimental
date: 2026/04/20
author: Security Arsenal
references:
- https://otx.alienvault.com/pulse/6624e1f2a3b1c4d5e6f7a8b9
tags:
- attack.initial_access
- attack.t1190
- cve.2024.37085
- cve.2025.32463
logsource:
category: webserver
detection:
selection:
c-uri|contains:
- '/remote/login'
- '/api/v2/cmdb/system/admin'
filter:
sc-status: 200
condition: selection | count() > 10
falsepositives:
- Legitimate administrative access from internal network ranges
level: high
---
title: AdaptixC2 Framework Process Execution
id: 5c3f2b3a-9d0e-5f6a-0b2c-3d4e5f6a7b8c
description: Detects execution of known AdaptixC2 associated malware families and suspicious Go binaries behaving like post-exploitation frameworks.
status: experimental
date: 2026/04/20
author: Security Arsenal
references:
- https://otx.alienvault.com/pulse/6624e1f2a3b1c4d5e6f7a8c0
tags:
- attack.execution
- attack.t1059
- malware.adaptixc2
logsource:
category: process_creation
product: windows
detection:
selection_img:
- Image|endswith:
- '\mgbot.exe'
- '\coolclient.exe'
- '\toneshell.exe'
- '\vbcloud.exe'
selection_go:
Image|endswith: '.exe'
Company|contains: 'Go'
CommandLine|contains:
- '-enc'
- 'rc4'
condition: 1 of selection*
falsepositives:
- Legitimate Go applications
level: critical
---
title: UNC1945 LightBasin Custom Tooling
id: 6d4g3h4j-5k6l-7m8n-9o0p-1q2r3s4t5u6v
description: Detects the execution of custom malware tools associated with UNC1945 (LightBasin) targeting Solaris, Windows, and Linux systems within financial sectors.
status: experimental
date: 2026/04/20
author: Security Arsenal
references:
- https://otx.alienvault.com/pulse/6624e1f2a3b1c4d5e6f7a8c1
tags:
- attack.persistence
- attack.t1543
- apt.unc1945
logsource:
category: process_creation
product: windows
detection:
selection:
Image|contains:
- 'slapstick'
- 'evilsun'
- 'lemonstick'
- 'steelcorgi'
- 'logbleach'
- 'pupyrat'
- 'oksh' # OKSOLO reference
condition: selection
falsepositives:
- Unknown
level: critical
KQL Hunt Query
// Hunt for The Gentlemen and UNC1945 File Hashes
DeviceProcessEvents
| where Timestamp > ago(7d)
| where SHA256 in (
"3ab9575225e00a83a4ac2b534da5a710bdcf6eb72884944c437b5fbe5c5c9235",
"51b9f246d6da85631131fcd1fabf0a67937d4bdde33625a44f7ee6a3a7baebd2",
"632be2363c7a13be6d5ce0dca11e387bd0a072cc962b004f0dcf3c1f78982a5a"
) or MD5 in (
"adf675ffc1acb357f2d9f1a94e016f52",
"f212fd00d9ffc0f3d868845f7f4215cb",
"6983f7001de10f4d19fc2d794c3eb534",
"d505533ae75f89f98554765aaf2a330a",
"2eff2273d423a7ae6c68e3ddd96604bc",
"0845835e18a3ed4057498250d30a11b1",
"abaf1d04982449e0f7ee8a34577fe8af"
)
| project DeviceName, AccountName, FolderPath, ProcessCommandLine, SHA256, MD5
PowerShell Hunt Script
<#
.SYNOPSIS
IOC Hunt Script for The Gentlemen, AdaptixC2, and UNC1945 Malware Hashes.
.DESCRIPTION
Scans specific directories for known malicious file hashes associated with recent OTX pulses.
#>
$TargetPaths = @("C:\Windows\Temp\", "C:\Users\Public\", "C:\ProgramData\", "$env:USERPROFILE\Downloads\")
$KnownHashes = @{
"3ab9575225e00a83a4ac2b534da5a710bdcf6eb72884944c437b5fbe5c5c9235" = "The Gentlemen Payload"
"51b9f246d6da85631131fcd1fabf0a67937d4bdde33625a44f7ee6a3a7baebd2" = "Babuk Variant"
"f212fd00d9ffc0f3d868845f7f4215cb" = "AdaptixC2 Agent"
"6983f7001de10f4d19fc2d794c3eb534" = "UNC1945 SLAPSTICK"
"632be2363c7a13be6d5ce0dca11e387bd0a072cc962b004f0dcf3c1f78982a5a" = "UNC1945 EVILSUN"
}
foreach ($Path in $TargetPaths) {
if (Test-Path $Path) {
Write-Host "Scanning $Path..." -ForegroundColor Cyan
Get-ChildItem -Path $Path -Recurse -ErrorAction SilentlyContinue | ForEach-Object {
$FileHash = (Get-FileHash -Path $_.FullName -Algorithm SHA256 -ErrorAction SilentlyContinue).Hash
if ($KnownHashes.ContainsKey($FileHash)) {
Write-Host "[MATCH] Malicious file found: $($_.FullName)" -ForegroundColor Red
Write-Host " Identity: $($KnownHashes[$FileHash])" -ForegroundColor Red
}
}
}
}
Write-Host "Scan Complete."
Response Priorities
Immediate (0-24h):
- Block all IOCs at the perimeter (firewalls, proxies) and endpoints (EDR).
- Initiate a hunt for the specific file hashes provided in the pulses across all endpoints, focusing on
C:\Windows\Tempand user download directories. - Isolate any systems returning positive matches for AdaptixC2 or UNC1945 malware signatures.
24h - 48h:
- Verify identity and access logs for all MSP accounts connected to the network (UNC1945 vector).
- Audit FortiOS/FortiProxy and VMware ESXi logs for signs of exploitation related to CVE-2024-37085 and CVE-2025-32463.
1 Week:**
- Apply patches for CVE-2024-37085, CVE-2024-55591, and CVE-2020-14871 immediately upon vendor release.
- Implement network segmentation to restrict lateral movement from internet-facing edge devices (Fortinet) to the internal core.
- Review and update MSP access controls, enforcing Zero Trust principles for third-party remote access.
Related Resources
Security Arsenal Incident Response Managed SOC & MDR Services AlertMonitor Threat Detection From The Dark Side Intel Hub
Is your security operations ready?
Get a free SOC assessment or see how AlertMonitor cuts through alert noise with automated triage.