Inside the Leak: A Step-by-Step Guide to Dissecting the Gentlemen RaaS Operation

By

Overview

On May 4th, 2026, the administrator of The Gentlemen ransomware-as-a-service (RaaS) program confirmed a data leak. A backend database called 'Rocket' was exposed, revealing nine accounts, internal chats, and operational details. This guide takes you through the key findings from Check Point Research's analysis of that leak, turning a raw dump into structured intelligence. You'll learn how to identify the RaaS admin, map affiliate roles, understand negotiation tactics, and trace data reuse—all from the same leaked materials. By the end, you'll be able to apply these steps to similar leaks in the future.

Inside the Leak: A Step-by-Step Guide to Dissecting the Gentlemen RaaS Operation
Source: research.checkpoint.com

Prerequisites

Step-by-Step Instructions

1. Identify the Administrator Accounts

The first step is isolating the admin from the nine leaked accounts. Look for the account with the highest privileges and consistent involvement in infrastructure management.

2. Map Roles, Tools, and CVE Interest

The leak provides a rare end-to-end view of how a RaaS group operates. Extract each role from the chats and assign tools.

Compile this into a map: admin → builds locker & panel → affiliates use initial access tools → SystemBC → ransomware deployment.

3. Analyze Negotiation Tactics and Payment Data

The leak includes screenshots of ransom negotiations. Reconstruct the bargaining trajectory.

4. Trace Data Reuse and Dual-Pressure Tactics

One of the most revealing aspects is how The Gentlemen reused stolen data from one victim to pressure another.

Inside the Leak: A Step-by-Step Guide to Dissecting the Gentlemen RaaS Operation
Source: research.checkpoint.com

5. Cross-Reference Affiliate IDs

Check Point Research collected all available ransomware samples from the program and identified 8 distinct affiliate TOX IDs, including the admin's own TOX ID.

Common Mistakes

Summary

By systematically analyzing the leaked internal database of The Gentlemen RaaS operation, you can extract actionable intelligence: identify the admin (zeta88), map the division of labor, understand negotiation dynamics (anchor $250k, final $190k), track data reuse for dual-pressure, and confirm that the admin also operates as an affiliate. This guide demonstrates how a single leak can provide a comprehensive view of an active RaaS program, and the steps you can apply to any similar incident.

Tags:

Related Articles

Recommended

Discover More

Discord Down? Here's What You Need to Know About Today's OutageNetflix's Ad-Supported Tier Surpasses 250 Million Users, Eyes Expansion into New FormatsMajor Mining Pools Unite to Accelerate Stratum v2 Adoption7 Critical Insights into Reward Hacking in Reinforcement LearningWhy We Think ChatGPT Changed — The Real Reason It Feels Different Now