Inside the Leak: A Step-by-Step Guide to Dissecting the Gentlemen RaaS Operation

By ● min read

Overview

On May 4th, 2026, the administrator of The Gentlemen ransomware-as-a-service (RaaS) program confirmed a data leak. A backend database called 'Rocket' was exposed, revealing nine accounts, internal chats, and operational details. This guide takes you through the key findings from Check Point Research's analysis of that leak, turning a raw dump into structured intelligence. You'll learn how to identify the RaaS admin, map affiliate roles, understand negotiation tactics, and trace data reuse—all from the same leaked materials. By the end, you'll be able to apply these steps to similar leaks in the future.

Inside the Leak: A Step-by-Step Guide to Dissecting the Gentlemen RaaS Operation
Source: research.checkpoint.com

Prerequisites

Step-by-Step Instructions

1. Identify the Administrator Accounts

The first step is isolating the admin from the nine leaked accounts. Look for the account with the highest privileges and consistent involvement in infrastructure management.

2. Map Roles, Tools, and CVE Interest

The leak provides a rare end-to-end view of how a RaaS group operates. Extract each role from the chats and assign tools.

Compile this into a map: admin → builds locker & panel → affiliates use initial access tools → SystemBC → ransomware deployment.

3. Analyze Negotiation Tactics and Payment Data

The leak includes screenshots of ransom negotiations. Reconstruct the bargaining trajectory.

4. Trace Data Reuse and Dual-Pressure Tactics

One of the most revealing aspects is how The Gentlemen reused stolen data from one victim to pressure another.

Inside the Leak: A Step-by-Step Guide to Dissecting the Gentlemen RaaS Operation
Source: research.checkpoint.com

5. Cross-Reference Affiliate IDs

Check Point Research collected all available ransomware samples from the program and identified 8 distinct affiliate TOX IDs, including the admin's own TOX ID.

Common Mistakes

Summary

By systematically analyzing the leaked internal database of The Gentlemen RaaS operation, you can extract actionable intelligence: identify the admin (zeta88), map the division of labor, understand negotiation dynamics (anchor $250k, final $190k), track data reuse for dual-pressure, and confirm that the admin also operates as an affiliate. This guide demonstrates how a single leak can provide a comprehensive view of an active RaaS program, and the steps you can apply to any similar incident.

Tags:

Recommended

Discover More

7 Critical Insights for Analyzing Hugging Face Arm64 ReadinessDesigning Next-Generation Mars Helicopters: A Technical Guide for Aspiring EngineersIntel Rushes Linux 7.2 Driver Updates for Crescent Island: 160GB AI Inference Beast Nears LaunchApril 2026 Patch Tuesday: Record-Breaking Updates Address Active Exploits and AI-Driven Vulnerabilities10 Key Developments from Apple's AI-Focused App Store Update on May 14, 2026