How Kraken ransomware first assesses your system, then encrypts everything without warning and steals data in the background silently


  • Kraken ransomware measures system performance before deciding the extent of damage caused by encryption.
  • Shadow copies, Recycle Bin, and backups are deleted before encryption begins
  • Windows, Linux, and ESXi systems all face attacks based on Kraken benchmarks

The Kraken ransomware campaign introduces a benchmark step that times the encryption of a temporary file to determine how quickly it can encrypt a victim’s data.

Cisco Talos researchers discovered that the malware created a random data file, encrypted it, recorded the speed, and deleted the test file.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top