{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreiemfhb5zp25husyacm33n5c2anwbrfuddjffbra7i5rub4442nawi",
    "uri": "at://did:plc:ghkvexthfanuyq7fb5veq6tw/app.bsky.feed.post/3mjzqqr4v2fs2"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreih5uddcvmsmcr3unjas34xewwm73wcaggkcte5ywjxpcpzd6myzlq"
    },
    "mimeType": "image/jpeg",
    "size": 351883
  },
  "path": "/2026/04/systembc-c2-server-reveals-1570-victims.html",
  "publishedAt": "2026-04-21T18:18:00.000Z",
  "site": "https://thehackernews.com",
  "textContent": "Threat actors associated with The Gentlemen ransomware‑as‑a‑service (RaaS) operation have been observed attempting to deploy a known proxy malware called SystemBC. According to new research published by Check Point, the command-and-control (C2 or C&C) server linked to SystemBC has led to the discovery of a botnet of more than 1,570 victims. \"SystemBC establishes SOCKS5 network tunnels within",
  "title": "SystemBC C2 Server Reveals 1,570+ Victims in The Gentlemen Ransomware Operation"
}