Inside the Leak: A Step-by-Step Guide to Dissecting the Gentlemen RaaS Operation

Overview

On May 4th, 2026, the administrator of The Gentlemen ransomware-as-a-service (RaaS) program confirmed a data leak. A backend database called 'Rocket' was exposed, revealing nine accounts, internal chats, and operational details. This guide takes you through the key findings from Check Point Research's analysis of that leak, turning a raw dump into structured intelligence. You'll learn how to identify the RaaS admin, map affiliate roles, understand negotiation tactics, and trace data reuse—all from the same leaked materials. By the end, you'll be able to apply these steps to similar leaks in the future.

Inside the Leak: A Step-by-Step Guide to Dissecting the Gentlemen RaaS Operation
Source: research.checkpoint.com

Prerequisites

Step-by-Step Instructions

1. Identify the Administrator Accounts

The first step is isolating the admin from the nine leaked accounts. Look for the account with the highest privileges and consistent involvement in infrastructure management.

2. Map Roles, Tools, and CVE Interest

The leak provides a rare end-to-end view of how a RaaS group operates. Extract each role from the chats and assign tools.

Compile this into a map: admin → builds locker & panel → affiliates use initial access tools → SystemBC → ransomware deployment.

3. Analyze Negotiation Tactics and Payment Data

The leak includes screenshots of ransom negotiations. Reconstruct the bargaining trajectory.

4. Trace Data Reuse and Dual-Pressure Tactics

One of the most revealing aspects is how The Gentlemen reused stolen data from one victim to pressure another.

Inside the Leak: A Step-by-Step Guide to Dissecting the Gentlemen RaaS Operation
Source: research.checkpoint.com

5. Cross-Reference Affiliate IDs

Check Point Research collected all available ransomware samples from the program and identified 8 distinct affiliate TOX IDs, including the admin's own TOX ID.

Common Mistakes

Summary

By systematically analyzing the leaked internal database of The Gentlemen RaaS operation, you can extract actionable intelligence: identify the admin (zeta88), map the division of labor, understand negotiation dynamics (anchor $250k, final $190k), track data reuse for dual-pressure, and confirm that the admin also operates as an affiliate. This guide demonstrates how a single leak can provide a comprehensive view of an active RaaS program, and the steps you can apply to any similar incident.

Tags:

Recommended

Discover More

How the AMDGPU Driver Team Prepares HDMI 2.1 FRL Support for Linux 7.2Curiosity's Wheels After Six Years on Mars: A Detailed Q&ANVIDIA and ServiceNow Unveil Autonomous AI Agents for Enterprise WorkflowsNavigating Oracle’s Monthly Patch Cycle: A Guide for Administrators in the Age of AI-Driven ThreatsBuilding AI-Powered Applications with Spring AI: A Comprehensive Guide