Close Menu
TechUpdateAlert

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    My Health Anxiety Means I Won’t Use Apple’s or Samsung’s Smartwatches. Here’s Why

    December 22, 2025

    You can now buy the OnePlus 15 in the US and score free earbuds if you hurry

    December 22, 2025

    Today’s NYT Connections: Sports Edition Hints, Answers for Dec. 22 #455

    December 22, 2025
    Facebook X (Twitter) Instagram
    Trending
    • My Health Anxiety Means I Won’t Use Apple’s or Samsung’s Smartwatches. Here’s Why
    • You can now buy the OnePlus 15 in the US and score free earbuds if you hurry
    • Today’s NYT Connections: Sports Edition Hints, Answers for Dec. 22 #455
    • Android might finally stop making you tap twice for Wi-Fi
    • Today’s NYT Mini Crossword Answers for Dec. 22
    • Waymo’s robotaxis didn’t know what to do when a city’s traffic lights failed
    • Today’s NYT Wordle Hints, Answer and Help for Dec. 22 #1647
    • You Asked: OLED Sunlight, VHS on 4K TVs, and HDMI Control Issues
    Facebook X (Twitter) Instagram Pinterest Vimeo
    TechUpdateAlertTechUpdateAlert
    • Home
    • Gaming
    • Laptops
    • Mobile
    • Software
    • Reviews
    • AI & Tech
    • Gadgets
    • How-To
    TechUpdateAlert
    Home»AI & Tech»How Kraken ransomware benchmarks your system first, then encrypts everything without warning, and steals data in the background silently
    AI & Tech

    How Kraken ransomware benchmarks your system first, then encrypts everything without warning, and steals data in the background silently

    techupdateadminBy techupdateadminNovember 19, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    How Kraken ransomware benchmarks your system first, then encrypts everything without warning, and steals data in the background silently
    Share
    Facebook Twitter LinkedIn Pinterest Email


    • Kraken ransomware measures system performance before deciding the scale of encryption damage
    • Shadow copies, Recycle Bin, and backups are deleted before encryption starts
    • Windows, Linux, and ESXi systems all face Kraken’s benchmark-driven attacks

    The Kraken ransomware campaign introduces a benchmark step which times the encryption of a temporary file to determine how quickly it can encrypt a victim’s data.

    Researchers from Cisco Talos found the malware creates a random data file, encrypts it, records the speed, and deletes the test file.

    The result guides the hackers in choosing between full encryption and a partial approach that still damages files while avoiding excessive system load that could expose their activity.


    You may like

    Targeting key enterprise assets

    In their report, the researchers outlined how Kraken prepares each compromised environment by deleting shadow copies, clearing the Recycle Bin, and disabling backup services.

    The Windows version includes four separate modules designed to locate and encrypt SQL databases, network shares, local drives, and Hyper-V virtual machines.

    These modules confirm paths, stop active virtual machines, and apply encryption with multiple worker threads to increase coverage.

    The Linux and ESXi edition terminates running virtual machines to unlock their disks and apply the same benchmark-based logic before encrypting data across the host.

    Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

    Once the encryption phase is complete, the ransomware executes a script that clears logs, deletes shell history, removes the binary, and eliminates evidence of the operation.

    Files receive the .zpsc extension, and a ransom note titled readme_you_ws_hacked.txt appears in affected locations.

    Cisco reported a case where the attackers demanded $1 million in Bitcoin, and relevant indicators of compromise are documented in a public repository.


    You may like

    Kraken appears to share operational traits with the former HelloKitty ransomware group, as both groups use identical ransom note filenames and reference each other on leak sites.

    The hackers behind Kraken also announced a new underground forum called The Last Haven Board, which claims to offer a secure channel for communication within the cybercrime ecosystem.

    In documented cases, attackers gained initial access by exploiting vulnerable SMB services exposed to the internet, harvesting administrator credentials and re-entered the environment using Remote Desktop.

    Persistence was maintained through Cloudflare tunnels, and SSHFS was used to move through the network and exfiltrate data.

    The attackers deployed the Kraken binary afterward and used stolen credentials to propagate across additional systems.

    Staying safe against threats like Kraken requires a consistent approach to limit exposure and reduce potential damage, so organizations should maintain strong ransomware protection, ensuring backups, access controls, and network segmentation are properly applied and monitored.

    Keeping antivirus software updated helps detect malicious files before they can spread, while regular malware removal tools clear remnants of intrusions.

    Limiting internet-facing services, patching vulnerabilities, and enforcing strong authentication further reduce attackers’ opportunities.


    Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds. Make sure to click the Follow button!

    And of course you can also follow TechRadar on TikTok for news, reviews, unboxings in video form, and get regular updates from us on WhatsApp too.

    Background benchmarks Data encrypts Kraken ransomware silently steals System Warning
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous Article4 Clever Tricks That Make It Worth Switching to Proton Mail
    Next Article Today’s NYT Connections Hints, Answers for Nov. 19 #892
    techupdateadmin
    • Website

    Related Posts

    Mobile

    NotebookLM can turn your messy data into structured tables for Google Sheets

    December 19, 2025
    Gadgets

    Our Exclusive Data Reveals the Best Air Purifier for Preventing Sickness During Cold and Flu Season

    December 12, 2025
    Mobile

    AT&T’s new home security system is powered by Google Home and Abode

    December 11, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    NYT Strands hints and answers for Monday, August 11 (game #526)

    August 11, 202545 Views

    These 2 Cities Are Pushing Back on Data Centers. Here’s What They’re Worried About

    September 13, 202542 Views

    Today’s NYT Connections: Sports Edition Hints, Answers for Sept. 4 #346

    September 4, 202540 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    Best Fitbit fitness trackers and watches in 2025

    July 9, 20250 Views

    There are still 200+ Prime Day 2025 deals you can get

    July 9, 20250 Views

    The best earbuds we’ve tested for 2025

    July 9, 20250 Views
    Our Picks

    My Health Anxiety Means I Won’t Use Apple’s or Samsung’s Smartwatches. Here’s Why

    December 22, 2025

    You can now buy the OnePlus 15 in the US and score free earbuds if you hurry

    December 22, 2025

    Today’s NYT Connections: Sports Edition Hints, Answers for Dec. 22 #455

    December 22, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact us
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    © 2026 techupdatealert. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.