Close Menu
Must Have Gadgets –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    How to use Apple Pay on Amazon to shop Black Friday 2025

    November 19, 2025

    Amazon has sliced 44% off this Fire Stick 4K Max bundle before Black Friday

    November 19, 2025

    Got ‘home security camera’ on your Black Friday wishlist? I’d drop everything and jump on this bonkers Blink Mini 2 deal — it’s now just AU$17

    November 19, 2025
    Facebook X (Twitter) Instagram
    Must Have Gadgets –
    Trending
    • How to use Apple Pay on Amazon to shop Black Friday 2025
    • Amazon has sliced 44% off this Fire Stick 4K Max bundle before Black Friday
    • Got ‘home security camera’ on your Black Friday wishlist? I’d drop everything and jump on this bonkers Blink Mini 2 deal — it’s now just AU$17
    • Faced with naked man, DoorDasher demands police action; they arrest her for illegal surveillance
    • The best Android phones to buy in 2025
    • GOP overhaul of broadband permit laws: Cities hate it, cable companies love it
    • Apes Were Kissing Millions of Years Before Humans, Study Suggests
    • Does Climbing the Stairs Leave You Breathless? Here’s How to Make It Easier On Your Body
    • Home
    • Shop
      • Earbuds & Headphones
      • Smartwatches
      • Mobile Accessories
      • Smart Home Devices
      • Laptops & Tablets
    • Gadget Reviews
    • How-To Guides
    • Mobile Accessories
    • Smart Devices
    • More
      • Top Deals
      • Smart Home
      • Tech News
      • Trending Tech
    Facebook X (Twitter) Instagram
    Must Have Gadgets –
    Home»Mobile Accessories»How Kraken ransomware benchmarks your system first, then encrypts everything without warning, and steals data in the background silently
    Mobile Accessories

    How Kraken ransomware benchmarks your system first, then encrypts everything without warning, and steals data in the background silently

    adminBy adminNovember 19, 2025No Comments3 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    How Kraken ransomware benchmarks your system first, then encrypts everything without warning, and steals data in the background silently
    Share
    Facebook Twitter LinkedIn Pinterest Email

    • Kraken ransomware measures system performance before deciding the scale of encryption damage
    • Shadow copies, Recycle Bin, and backups are deleted before encryption starts
    • Windows, Linux, and ESXi systems all face Kraken’s benchmark-driven attacks

    The Kraken ransomware campaign introduces a benchmark step which times the encryption of a temporary file to determine how quickly it can encrypt a victim’s data.

    Researchers from Cisco Talos found the malware creates a random data file, encrypts it, records the speed, and deletes the test file.

    The result guides the hackers in choosing between full encryption and a partial approach that still damages files while avoiding excessive system load that could expose their activity.


    You may like

    Targeting key enterprise assets

    In their report, the researchers outlined how Kraken prepares each compromised environment by deleting shadow copies, clearing the Recycle Bin, and disabling backup services.

    The Windows version includes four separate modules designed to locate and encrypt SQL databases, network shares, local drives, and Hyper-V virtual machines.

    These modules confirm paths, stop active virtual machines, and apply encryption with multiple worker threads to increase coverage.

    The Linux and ESXi edition terminates running virtual machines to unlock their disks and apply the same benchmark-based logic before encrypting data across the host.

    Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

    Once the encryption phase is complete, the ransomware executes a script that clears logs, deletes shell history, removes the binary, and eliminates evidence of the operation.

    Files receive the .zpsc extension, and a ransom note titled readme_you_ws_hacked.txt appears in affected locations.

    Cisco reported a case where the attackers demanded $1 million in Bitcoin, and relevant indicators of compromise are documented in a public repository.


    You may like

    Kraken appears to share operational traits with the former HelloKitty ransomware group, as both groups use identical ransom note filenames and reference each other on leak sites.

    The hackers behind Kraken also announced a new underground forum called The Last Haven Board, which claims to offer a secure channel for communication within the cybercrime ecosystem.

    In documented cases, attackers gained initial access by exploiting vulnerable SMB services exposed to the internet, harvesting administrator credentials and re-entered the environment using Remote Desktop.

    Persistence was maintained through Cloudflare tunnels, and SSHFS was used to move through the network and exfiltrate data.

    The attackers deployed the Kraken binary afterward and used stolen credentials to propagate across additional systems.

    Staying safe against threats like Kraken requires a consistent approach to limit exposure and reduce potential damage, so organizations should maintain strong ransomware protection, ensuring backups, access controls, and network segmentation are properly applied and monitored.

    Keeping antivirus software updated helps detect malicious files before they can spread, while regular malware removal tools clear remnants of intrusions.

    Limiting internet-facing services, patching vulnerabilities, and enforcing strong authentication further reduce attackers’ opportunities.

    Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds. Make sure to click the Follow button!

    And of course you can also follow TechRadar on TikTok for news, reviews, unboxings in video form, and get regular updates from us on WhatsApp too.

    background benchmarks data encrypts Kraken ransomware silently Steals System warning
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    admin
    • Website

    Related Posts

    Amazon has sliced 44% off this Fire Stick 4K Max bundle before Black Friday

    November 19, 2025

    Best HP Laptops of 2025

    November 18, 2025

    Google Sans Flex font now available for free download

    November 18, 2025
    Leave A Reply Cancel Reply

    Top Posts

    How to use Apple Pay on Amazon to shop Black Friday 2025

    November 19, 2025

    PayPal’s blockchain partner accidentally minted $300 trillion in stablecoins

    October 16, 2025

    The best AirPods deals for October 2025

    October 16, 2025
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    How-To Guides

    How to Disable Some or All AI Features on your Samsung Galaxy Phone

    By adminOctober 16, 20250
    Gadget Reviews

    PayPal’s blockchain partner accidentally minted $300 trillion in stablecoins

    By adminOctober 16, 20250
    Smart Devices

    The best AirPods deals for October 2025

    By adminOctober 16, 20250

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Latest Post

    How to use Apple Pay on Amazon to shop Black Friday 2025

    November 19, 2025

    Amazon has sliced 44% off this Fire Stick 4K Max bundle before Black Friday

    November 19, 2025

    Got ‘home security camera’ on your Black Friday wishlist? I’d drop everything and jump on this bonkers Blink Mini 2 deal — it’s now just AU$17

    November 19, 2025
    Recent Posts
    • How to use Apple Pay on Amazon to shop Black Friday 2025
    • Amazon has sliced 44% off this Fire Stick 4K Max bundle before Black Friday
    • Got ‘home security camera’ on your Black Friday wishlist? I’d drop everything and jump on this bonkers Blink Mini 2 deal — it’s now just AU$17
    • Faced with naked man, DoorDasher demands police action; they arrest her for illegal surveillance
    • The best Android phones to buy in 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer
    © 2025 must-have-gadgets.

    Type above and press Enter to search. Press Esc to cancel.