{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreiemfhb5zp25husyacm33n5c2anwbrfuddjffbra7i5rub4442nawi",
"uri": "at://did:plc:ghkvexthfanuyq7fb5veq6tw/app.bsky.feed.post/3mjzqqr4v2fs2"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreih5uddcvmsmcr3unjas34xewwm73wcaggkcte5ywjxpcpzd6myzlq"
},
"mimeType": "image/jpeg",
"size": 351883
},
"path": "/2026/04/systembc-c2-server-reveals-1570-victims.html",
"publishedAt": "2026-04-21T18:18:00.000Z",
"site": "https://thehackernews.com",
"textContent": "Threat actors associated with The Gentlemen ransomware‑as‑a‑service (RaaS) operation have been observed attempting to deploy a known proxy malware called SystemBC. According to new research published by Check Point, the command-and-control (C2 or C&C) server linked to SystemBC has led to the discovery of a botnet of more than 1,570 victims. \"SystemBC establishes SOCKS5 network tunnels within",
"title": "SystemBC C2 Server Reveals 1,570+ Victims in The Gentlemen Ransomware Operation"
}