Date: 2026-05-09
Source: Ransomware.live / Dark Web Leak Site Monitoring
Analyst: Security Arsenal Intel Unit
Threat Actor Profile — THEGENTLEMEN
Affiliation & Model: THEGENTLEMEN operate as a Ransomware-as-a-Service (RaaS) entity. While they present a curated "gentlemanly" persona on their leak site, their operational tactics are aggressive. They utilize a double-extortion model, encrypting systems and exfiltrating sensitive data (CAD drawings, client DBs, employee PII) to pressure victims into payment.
Ransom Demands: Historically range from $300,000 to $5 million USD, scaling strictly with victim revenue.
Initial Access Vectors: Recent telemetry confirms a heavy reliance on exploiting public-facing email infrastructure. Specifically, the gang is leveraging deserialization vulnerabilities in Microsoft Exchange and SmarterTools SmarterMail. Once inside, they pivot via credential dumping and standard lateral movement tools (Cobalt Strike beacons, custom PowerShell loaders).
Dwell Time: Short. Average time between initial exploitation (Exchange/SmarterMail) and detonation is 3–5 days.
Current Campaign Analysis
Victimology Overview
In the last 48 hours, THEGENTLEMEN has posted 15 new victims, indicating a significant operational tempo spike.
- Top Targeted Sectors:
- Manufacturing: Misr Chemical Industries, Hillside Lumber, Clark Fixture Technologies.
- Telecommunication: TDS (US).
- Construction: McCarthy, Arizona Professional Painting.
- Geographic Spread: While US-based entities remain the primary target (60% of recent victims), the campaign has gone global, hitting Egypt (EG), Germany (DE), Netherlands (NL), Poland (PL), and Venezuela (VE).
CVEs & Initial Access
This campaign is directly correlated with the recent exploitation of specific CISA Known Exploited Vulnerabilities (KEVs):
- SmarterMail RCE Chain (CVE-2025-52691 & CVE-2026-23760): The gang is exploiting unrestricted file upload and auth bypass to drop webshells on mail servers. This appears to be the primary entry point for the Manufacturing and Construction victims.
- Microsoft Exchange (CVE-2023-21529): Added to KEV in April 2026, this deserialization flaw is being used to access Telecom and Business Services sectors.
Trend: Attackers are bypassing traditional perimeter firewalls (Cisco CVE-2026-20131) by hitting the collaboration/email layer directly.
Detection Engineering
SIGMA Rules
title: Potential SmarterMail Webshell Upload Activity
id: 8a7f9c1e-5b6d-4a8e-9f1c-2b3c4d5e6f78
description: Detects potential webshell upload activity via SmarterMail vulnerabilities (CVE-2025-52691). Monitor for suspicious file creation in the web root.
status: experimental
date: 2026/05/09
author: Security Arsenal
references:
- https://cisa.gov/known-exploited-vulnerabilities-catalog
logsource:
product: windows
category: file_event
detection:
selection:
TargetFilename|contains:
- 'MRS\'
- 'Mail\'
TargetFilename|endswith:
- '.aspx'
- '.ashx'
- '.asp'
condition: selection
falsepositives:
- Legitimate administrator updates
level: high
title: Microsoft Exchange Deserialization Anomaly
id: 9b8g0h2i-6c7e-5b9f-0g2d-3c4d5e6f7g8h
description: Detects exploitation attempts of Microsoft Exchange Deserialization Vulnerability (CVE-2023-21529) via suspicious backend process execution.
status: experimental
date: 2026/05/09
author: Security Arsenal
logsource:
product: windows
service: security
detection:
selection:
EventID: 5145
ShareName|contains: 'Exchange'
RelativeTargetName|contains: '.dll'
AccessMask|contains:
- '0x80'
- '0x100'
filter:
SubjectUserName|contains:
- 'ADMIN$'
- 'SYSTEM'
condition: selection and not filter
falsepositives:
- Normal Exchange maintenance
level: critical
title: Lateral Movement via PsExec Ransomware Pattern
id: 1c2d3e4f-7d8e-6f0a-1h2i-4d5e6f7g8h9i
description: Detects typical lateral movement patterns used by THEGENTLEMEN affiliates (PsExec usage creating services).
status: experimental
date: 2026/05/09
author: Security Arsenal
logsource:
product: windows
service: sysmon
detection:
selection:
EventID: 1
Image|endswith: '\psexec.exe'
CommandLine|contains: 'accepteula'
selection_service:
EventID: 6
ImageLoaded|endswith: '\psexesvc.exe'
condition: 1 of selection*
falsepositives:
- Administrative IT maintenance
level: high
KQL (Microsoft Sentinel)
Hunts for rapid creation of services (often used for Cobalt Strike or lateral movement tools) and anomalous processes spawned from IIS/Exchange worker processes.
let TimeFrame = 1h;
// Hunt for Service Creations not initiated by standard admin tools
ServiceCreationEvents
| where TimeGenerated > ago(TimeFrame)
| where ServiceName !in_contains ("WinDefend", "Schedule", "wuauserv")
| project TimeGenerated, Computer, ServiceName, AccountName, ImagePath
| join kind=inner (
ProcessCreationEvents
| where TimeGenerated > ago(TimeFrame)
| project TimeGenerated, Computer, ProcessName, ParentProcessName, CommandLine
) on Computer
| where ParentProcessName has "w3wp.exe" or ParentProcessName has "MSExchange"
| distinct TimeGenerated, Computer, ServiceName, ImagePath, CommandLine
PowerShell Rapid Response Script
Use this script on critical servers (Exchange/SmarterMail/Domain Controllers) to check for webshell indicators and suspicious scheduled tasks added in the last 7 days.
# THEGENTLEMEN Response Script - v1.0
# Checks for recent Scheduled Tasks and Webshell Indicators
Write-Host "[*] Initiating THEGENTLEMEN Hunt..." -ForegroundColor Cyan
# 1. Check for recently created Scheduled Tasks (Last 7 Days)
$DateCutoff = (Get-Date).AddDays(-7)
Write-Host "[+] Checking for Scheduled Tasks created since: $DateCutoff" -ForegroundColor Yellow
Get-ScheduledTask | Where-Object {$_.Date -gt $DateCutoff} | ForEach-Object {
$TaskInfo = Get-ScheduledTaskInfo -TaskName $_.TaskName -TaskPath $_.TaskPath
Write-Host "[!] Suspicious Task Found: $($_.TaskName)" -ForegroundColor Red
Write-Host " Path: $($_.TaskPath)"
Write-Host " Last Run: $($TaskInfo.LastRunTime)"
Write-Host " Command: $($_.Actions.Execute)"
}
# 2. Check for SmarterMail Webshell Indicators (Example paths)
Write-Host "[+] Scanning common SmarterMail directories for web shells..." -ForegroundColor Yellow
$WebPaths = @("C:\Program Files (x86)\SmarterTools\SmarterMail\MRS", "C:\SmarterMail\MRS")
$SuspiciousExtensions = @("*.aspx", "*.ashx", "*.config")
foreach ($Path in $WebPaths) {
if (Test-Path $Path) {
Get-ChildItem -Path $Path -Recurse -Include $SuspiciousExtensions -ErrorAction SilentlyContinue |
Where-Object { $_.LastWriteTime -gt $DateCutoff } |
Select-Object FullName, LastWriteTime, Length | Format-Table -AutoSize
}
}
Write-Host "[*] Hunt Complete." -ForegroundColor Green
---
Incident Response Priorities
T-Minus Detection Checklist (Pre-Encryption)
- IIS/Exchange Logs: Immediate grep for POST requests to
/ecp/,/owa/, or/MRS/ending in.aspxor containing异常字符 (abnormal characters). - Memory: Dump memory on Exchange/SmarterMail servers. Look for
powershell.exespawned byw3wp.exe. - MFT/Timeline: Check for massive file renames (e.g.,
original.doc->original.doc.locked) in VSS shadow copies.
Critical Assets for Exfiltration
Based on THEGENTLEMEN's leak site patterns, they prioritize:
- Manufacturing: CAD designs, proprietary formulas, client supply chain lists.
- Telecom: Customer call records, SSN/Tax ID databases, billing records.
Containment Actions
- Isolate: Disconnect Exchange and SmarterMail servers from the network immediately. Do not power down (preserve memory).
- Revoke: Revoke all privileged credentials (Domain Admin) used on the compromised mail servers.
- Block: Block inbound traffic to public IPs associated with recent CISA KEVs at the perimeter firewall.
Hardening Recommendations
Immediate (Within 24 Hours)
- Patch: Immediately patch SmarterMail to address CVE-2025-52691 and Microsoft Exchange for CVE-2023-21529.
- Perimeter: Disable external access to RDP (TCP 3389) and enforce VPN with MFA for all remote admin access.
- Account Audit: Disable accounts with "Password Never Expires" set, specifically for service accounts tied to email infrastructure.
Short-Term (Within 2 Weeks)
- Network Segmentation: Move Email servers to a dedicated VLAN with strict egress rules (allow only SMTP/HTTPs out, block all other).
- EDR Deployment: Ensure EDR sensors are installed on all public-facing infrastructure, not just endpoints.
- Web Application Firewall (WAF): Implement specific signatures for SmarterMail deserialization attacks.
Related Resources
Security Arsenal Incident Response Managed SOC & MDR Services AlertMonitor Threat Detection From The Dark Side Intel Hub
Is your security operations ready?
Get a free SOC assessment or see how AlertMonitor cuts through alert noise with automated triage.