Posted in

Exposed Server Reveals TheGentlemen Ransomware Toolkit, Victim Credentials, and Ngrok Tokens

A misconfigured server hosted on bulletproof infrastructure has exposed the complete operational toolkit of a ransomware affiliate linked to TheGentlemen group. The leak included victim credentials, malicious scripts, and plaintext authentication tokens used to create hidden remote access tunnels. 

The exposure provides rare insight into how ransomware operators prepare networks before launching encryption attacks.


TheGentlemen Ransomware Operation

TheGentlemen operates as a Ransomware-as-a-Service (RaaS) platform where affiliates conduct intrusions using shared tools and playbooks.

Key characteristics:

  • Targets Windows, Linux, and ESXi environments
  • Rapid attack timelines measured in hours
  • Shared infrastructure across affiliates
  • Multi-region victim targeting

Unlike typical leaks, this server contained evidence of active operations, not just unused tooling.


Exposed Infrastructure Details

Researchers discovered an open directory hosted on bulletproof infrastructure. The server contained:

  • 126 operational files
  • 18 subdirectories
  • Approximately 140 MB of data
  • Exploit scripts and configuration files
  • Authentication tokens and credentials

The exposed materials were accessible without authentication for multiple weeks.


Malicious Toolkit Components

Analysis of the files revealed two primary categories:

Exploit Scripts

  • Privilege escalation routines
  • Security product disabling
  • Persistence mechanisms
  • Event log clearing tools

Configuration Files

  • Plaintext credentials
  • Ngrok authentication tokens
  • Remote access setup parameters
  • Victim-specific artifacts

These elements collectively enable rapid ransomware deployment.


Pre-Ransomware Deployment Script

A central batch script consolidated nearly every pre-encryption preparation step.

Its capabilities included:

  • Disabling multiple antivirus and security tools
  • Stopping enterprise applications and databases
  • Terminating backup infrastructure services
  • Enabling remote access features
  • Creating open network shares

The script was designed for speed, prioritizing maximum encryption coverage.


Persistence and Access Techniques

The toolkit implemented several persistence mechanisms:

  • Remote Desktop Protocol enabling
  • User Account Control modifications
  • Accessibility tool backdoors
  • Registry modifications
  • Network-level authentication disabling

These actions ensure continued access even if initial entry points are removed.


Credential and Data Collection

Logs discovered in the server indicated:

  • Credential dumping activity
  • Memory access targeting authentication services
  • Security policy changes
  • Token harvesting for tunneling services

This stage allows attackers to move laterally across the network.


Ransomware Preparation Actions

Before encryption, the scripts performed destructive preparation:

  • Deletion of shadow copies
  • Event log clearing
  • Service termination
  • Share creation across drives
  • Process termination

These steps weaken recovery options and reduce forensic visibility.


Detection and Defense Recommendations

Security teams should monitor for:

  • Mass service shutdown behavior
  • Event log clearing commands
  • Credential dumping indicators
  • Registry security changes
  • Unexpected network share creation
  • Remote access configuration changes

Network defenses should include:

  • Blocking known malicious infrastructure
  • Monitoring tunneling service activity
  • Inspecting unusual outbound connections

Hardening Measures

Organizations are advised to:

  • Enable credential protection features
  • Maintain offline immutable backups
  • Deploy tamper protection controls
  • Audit policy changes regularly
  • Implement application allow-listing

These controls help reduce ransomware blast radius.


Conclusion

The exposed server provides a detailed look into modern ransomware affiliate operations. By revealing pre-encryption preparation techniques, credential harvesting methods, and persistence strategies, the incident highlights how attackers streamline intrusions for rapid deployment. Organizations should use these insights to strengthen detection and hardening efforts against evolving ransomware threats.

Leave a Reply

Your email address will not be published. Required fields are marked *