Threat Actor Profile
High Cybercriminal
Confidence Score
100%
Tags
ransomware ransomware.live
First Seen

Unknown

Last Updated

Unknown

Active Status
Active
Created

April 29, 2026

MITRE ATT&CK Techniques (32)
T1039 - Data from Network Shared Drive
Collection
T1074 - Data Staged
Collection
T1074.001 - Local Data Staging
Collection
T1071 - Application Layer Protocol
Command and Control
T1071.001 - Web Protocols
Command and Control
T1219 - Remote Access Tools
Command and Control
T1552 - Unsecured Credentials
Credential Access
T1027 - Obfuscated Files or Information
Defense Evasion
T1078 - Valid Accounts
Defense Evasion
T1078.002 - Domain Accounts
Defense Evasion
T1112 - Modify Registry
Defense Evasion
T1484.001 - Group Policy Modification
Defense Evasion
T1562 - Impair Defenses
Defense Evasion
T1046 - Network Service Discovery
Discovery
T1087 - Account Discovery
Discovery
T1087.002 - Domain Account
Discovery
T1482 - Domain Trust Discovery
Discovery
T1059 - Command and Scripting Interpreter
Execution
T1059.001 - PowerShell
Execution
T1059.003 - Windows Command Shell
Execution
T1048 - Exfiltration Over Alternative Protocol
Exfiltration
T1048.001 - Exfiltration Over Symmetric Encrypted N…
Exfiltration
T1486 - Data Encrypted for Impact
Impact
T1489 - Service Stop
Impact
T1190 - Exploit Public-Facing Application
Initial Access
T1021 - Remote Services
Lateral Movement
T1021.001 - Remote Desktop Protocol
Lateral Movement
T1021.002 - SMB/Windows Admin Shares
Lateral Movement
T1021.004 - SSH
Lateral Movement
T1136 - Create Account
Persistence
T1547 - Boot or Logon Autostart Execution
Persistence
T1068 - Exploitation for Privilege Escalation
Privilege Escalation
Indicators of Compromise

Loading IOCs…

IOC KQL for Sentinel
STIX Data
{'added_date': '2025-09-09',
 'client': '2003264@sit.singaporetech.edu.sg',
 'description': None,
 'firstseen': '2023-02-28T06:59:00+00:00',
 'group': 'thegentlemen',
 'has_negotiations': False,
 'has_ransomnote': True,
 'lastseen': '2026-04-26T15:52:06.109820+00:00',
 'locations': [{'available': False,
                'fqdn': 'tezwsse5czllksjb7cwp65rvnk4oobmzti2znn42i43bjdfd2prqqkad.onion',
                'slug': 'http://tezwsse5czllksjb7cwp65rvnk4oobmzti2znn42i43bjdfd2prqqkad.onion',
                'title': 'The Gentlemen',
                'type': 'DLS'}],
 'negotiation_count': 0,
 'ransomnotes_count': 2,
 'tiaras_metadata': {'has_negotiations': False,
                     'has_ransomnote': True,
                     'locations': [{'available': False,
                                    'fqdn': 'tezwsse5czllksjb7cwp65rvnk4oobmzti2znn42i43bjdfd2prqqkad.onion',
                                    'slug': 'http://tezwsse5czllksjb7cwp65rvnk4oobmzti2znn42i43bjdfd2prqqkad.onion',
                                    'title': 'The Gentlemen',
                                    'type': 'DLS'}],
                     'negotiation_count': 0,
                     'ransomnotes_count': 2,
                     'ransomware_live_group': 'thegentlemen',
                     'tools': {},
                     'url': 'https://www.ransomware.live/group/thegentlemen',
                     'victims': 352,
                     'vulnerabilities': []},
 'tiaras_source': 'ransomware.live',
 'tools': {},
 'ttps': [{'tactic_id': 'TA0001',
           'tactic_name': 'Initial Access',
           'techniques': [{'technique_details': 'Exploitation of public-facing '
                                                'applications for initial '
                                                'access.',
                           'technique_id': 'T1190',
                           'technique_name': 'Exploit Public-Facing '
                                             'Application'},
                          {'technique_details': 'Use of valid accounts for '
                                                'initial access.',
                           'technique_id': 'T1078',
                           'technique_name': 'Valid Accounts'},
                          {'technique_details': 'Use of valid domain accounts '
                                                'for initial access.',
                           'technique_id': 'T1078.002',
                           'technique_name': 'Valid Accounts: Domain '
                                             'Accounts'}]},
          {'tactic_id': 'TA0002',
           'tactic_name': 'Execution',
           'techniques': [{'technique_details': 'Use of command and scripting '
                                                'interpreters for execution.',
                           'technique_id': 'T1059',
                           'technique_name': 'Command and Scripting '
                                             'Interpreter'},
                          {'technique_details': 'Use of PowerShell for '
                                                'execution.',
                           'technique_id': 'T1059.001',
                           'technique_name': 'Command and Scripting '
                                             'Interpreter: PowerShell'},
                          {'technique_details': 'Use of Windows Command Shell '
                                                'for execution.',
                           'technique_id': 'T1059.003',
                           'technique_name': 'Command and Scripting '
                                             'Interpreter: Windows Command '
                                             'Shell'}]},
          {'tactic_id': 'TA0003',
           'tactic_name': 'Persistence',
           'techniques': [{'technique_details': 'Boot or logon autostart '
                                                'execution for persistence.',
                           'technique_id': 'T1547',
                           'technique_name': 'Boot or Logon Autostart '
                                             'Execution'},
                          {'technique_details': 'Creation of accounts for '
                                                'persistence.',
                           'technique_id': 'T1136',
                           'technique_name': 'Create Account'}]},
          {'tactic_id': 'TA0004',
           'tactic_name': 'Privilege Escalation',
           'techniques': [{'technique_details': 'Exploitation of '
                                                'vulnerabilities for privilege '
                                                'escalation.',
                           'technique_id': 'T1068',
                           'technique_name': 'Exploitation for Privilege '
                                             'Escalation'}]},
          {'tactic_id': 'TA0005',
           'tactic_name': 'Defense Evasion',
           'techniques': [{'technique_details': 'Impairing defenses to avoid '
                                                'detection.',
                           'technique_id': 'T1562',
                           'technique_name': 'Impair Defenses'},
                          {'technique_details': 'Modifying the registry for '
                                                'defense evasion.',
                           'technique_id': 'T1112',
                           'technique_name': 'Modify Registry'},
                          {'technique_details': 'Obfuscation of files or '
                                                'information to evade '
                                                'detection.',
                           'technique_id': 'T1027',
                           'technique_name': 'Obfuscated Files or Information'},
                          {'technique_details': 'Modification of Group Policy '
                                                'for defense evasion.',
                           'technique_id': 'T1484.001',
                           'technique_name': 'Domain Policy Modification: '
                                             'Group Policy Modification'}]},
          {'tactic_id': 'TA0007',
           'tactic_name': 'Discovery',
           'techniques': [{'technique_details': 'Discovery of network '
                                                'services.',
                           'technique_id': 'T1046',
                           'technique_name': 'Network Service Discovery'},
                          {'technique_details': 'Discovery of accounts within '
                                                'the environment.',
                           'technique_id': 'T1087',
                           'technique_name': 'Account Discovery'},
                          {'technique_details': 'Discovery of domain accounts '
                                                'within the environment.',
                           'technique_id': 'T1087.002',
                           'technique_name': 'Account Discovery: Domain '
                                             'Account'},
                          {'technique_details': 'Discovery of domain trust '
                                                'relationships.',
                           'technique_id': 'T1482',
                           'technique_name': 'Domain Trust Discovery'}]},
          {'tactic_id': 'TA0008',
           'tactic_name': 'Lateral Movement',
           'techniques': [{'technique_details': 'Use of remote services for '
                                                'lateral movement.',
                           'technique_id': 'T1021',
                           'technique_name': 'Remote Services'},
                          {'technique_details': 'Use of RDP for lateral '
                                                'movement.',
                           'technique_id': 'T1021.001',
                           'technique_name': 'Remote Services: Remote Desktop '
                                             'Protocol'},
                          {'technique_details': 'Use of SMB/Windows Admin '
                                                'Shares for lateral movement.',
                           'technique_id': 'T1021.002',
                           'technique_name': 'Remote Services: SMB/Windows '
                                             'Admin Shares'},
                          {'technique_details': 'Use of SSH for lateral '
                                                'movement.',
                           'technique_id': 'T1021.004',
                           'technique_name': 'Remote Services: SSH'}]},
          {'tactic_id': 'TA0009',
           'tactic_name': 'Collection',
           'techniques': [{'technique_details': 'Staging of collected data '
                                                'prior to exfiltration.',
                           'technique_id': 'T1074',
                           'technique_name': 'Data Staged'},
                          {'technique_details': 'Local staging of collected '
                                                'data prior to exfiltration.',
                           'technique_id': 'T1074.001',
                           'technique_name': 'Data Staged: Local Data Staging'},
                          {'technique_details': 'Collection of data from '
                                                'network shared drives.',
                           'technique_id': 'T1039',
                           'technique_name': 'Data from Network Shared '
                                             'Drive'}]},
          {'tactic_id': 'TA0010',
           'tactic_name': 'Exfiltration',
           'techniques': [{'technique_details': 'Exfiltration of data over '
                                                'encrypted channels.',
                           'technique_id': 'T1048',
                           'technique_name': 'Exfiltration Over Alternative '
                                             'Protocol'},
                          {'technique_details': 'Exfiltration over symmetric '
                                                'encrypted non-C2 channels.',
                           'technique_id': 'T1048.001',
                           'technique_name': 'Exfiltration Over Alternative '
                                             'Protocol: Exfiltration Over '
                                             'Symmetric Encrypted Non-C2 '
                                             'Protocol'}]},
          {'tactic_id': 'TA0011',
           'tactic_name': 'Command and Control',
           'techniques': [{'technique_details': 'Use of application layer '
                                                'protocols for C2 '
                                                'communication.',
                           'technique_id': 'T1071',
                           'technique_name': 'Application Layer Protocol'},
                          {'technique_details': 'Use of web protocols for C2 '
                                                'communication.',
                           'technique_id': 'T1071.001',
                           'technique_name': 'Application Layer Protocol: Web '
                                             'Protocols'},
                          {'technique_details': 'Use of remote access software '
                                                'for C2.',
                           'technique_id': 'T1219',
                           'technique_name': 'Remote Access Software'}]},
          {'tactic_id': 'TA0040',
           'tactic_name': 'Impact',
           'techniques': [{'technique_details': 'Encryption of data for '
                                                'extortion.',
                           'technique_id': 'T1486',
                           'technique_name': 'Data Encrypted for Impact'},
                          {'technique_details': 'Stopping services to maximize '
                                                'impact.',
                           'technique_id': 'T1489',
                           'technique_name': 'Service Stop'},
                          {'technique_details': 'Leveraging unsecured '
                                                'credentials found in the '
                                                'environment.',
                           'technique_id': 'T1552',
                           'technique_name': 'Unsecured Credentials'}]}],
 'url': 'https://www.ransomware.live/group/thegentlemen',
 'victims': 352,
 'vulnerabilities': []}
Quick Actions
Related TTPs (32)
Data from Network Shared Drive
Collection

Data Staged
Collection

Local Data Staging
Collection

Application Layer Protocol
Command and Control

Web Protocols
Command and Control