How Kraken ransomware scans your system first, then encrypts everything without warning and silently steals data in the background




  • Kraken ransomware measures system performance before deciding the extent of encryption damage
  • Shadow copies, recycle bin, and backups are deleted before encryption starts
  • Windows, Linux, and ESXi Systems Face Kraken Benchmark-Based Attacks

The Kraken ransomware campaign introduces a benchmark step that times the encryption of a temporary file to determine how quickly it can encrypt a victim’s data.

Cisco Talos researchers discovered that the malware creates a random data file, encrypts it, records the speed, and deletes the test file.



Leave a Comment

Your email address will not be published. Required fields are marked *