Tech Wavo
  • Home
  • Technology
  • Computers
  • Gadgets
  • Mobile
  • Apps
  • News
  • Financial
  • Stock
Tech Wavo
No Result
View All Result

How Kraken ransomware benchmarks your system first, then encrypts everything without warning, and steals data in the background silently

Tech Wavo by Tech Wavo
November 19, 2025
in Computers
0




  • Kraken ransomware measures system performance before deciding the scale of encryption damage
  • Shadow copies, Recycle Bin, and backups are deleted before encryption starts
  • Windows, Linux, and ESXi systems all face Kraken’s benchmark-driven attacks

The Kraken ransomware campaign introduces a benchmark step which times the encryption of a temporary file to determine how quickly it can encrypt a victim’s data.

Researchers from Cisco Talos found the malware creates a random data file, encrypts it, records the speed, and deletes the test file.

The result guides the hackers in choosing between full encryption and a partial approach that still damages files while avoiding excessive system load that could expose their activity.


You may like

Targeting key enterprise assets

In their report, the researchers outlined how Kraken prepares each compromised environment by deleting shadow copies, clearing the Recycle Bin, and disabling backup services.

The Windows version includes four separate modules designed to locate and encrypt SQL databases, network shares, local drives, and Hyper-V virtual machines.

These modules confirm paths, stop active virtual machines, and apply encryption with multiple worker threads to increase coverage.

The Linux and ESXi edition terminates running virtual machines to unlock their disks and apply the same benchmark-based logic before encrypting data across the host.

Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

Once the encryption phase is complete, the ransomware executes a script that clears logs, deletes shell history, removes the binary, and eliminates evidence of the operation.

Files receive the .zpsc extension, and a ransom note titled readme_you_ws_hacked.txt appears in affected locations.

Cisco reported a case where the attackers demanded $1 million in Bitcoin, and relevant indicators of compromise are documented in a public repository.


You may like

Kraken appears to share operational traits with the former HelloKitty ransomware group, as both groups use identical ransom note filenames and reference each other on leak sites.

The hackers behind Kraken also announced a new underground forum called The Last Haven Board, which claims to offer a secure channel for communication within the cybercrime ecosystem.

In documented cases, attackers gained initial access by exploiting vulnerable SMB services exposed to the internet, harvesting administrator credentials and re-entered the environment using Remote Desktop.

Persistence was maintained through Cloudflare tunnels, and SSHFS was used to move through the network and exfiltrate data.

The attackers deployed the Kraken binary afterward and used stolen credentials to propagate across additional systems.

Staying safe against threats like Kraken requires a consistent approach to limit exposure and reduce potential damage, so organizations should maintain strong ransomware protection, ensuring backups, access controls, and network segmentation are properly applied and monitored.

Keeping antivirus software updated helps detect malicious files before they can spread, while regular malware removal tools clear remnants of intrusions.

Limiting internet-facing services, patching vulnerabilities, and enforcing strong authentication further reduce attackers’ opportunities.


Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds. Make sure to click the Follow button!

And of course you can also follow TechRadar on TikTok for news, reviews, unboxings in video form, and get regular updates from us on WhatsApp too.

Previous Post

European tech gets political | TechCrunch

Next Post

My ultimate Mac mini M4 accessories guide – 9 must-have add-ons for your mini

Next Post
My ultimate Mac mini M4 accessories guide – 9 must-have add-ons for your mini

My ultimate Mac mini M4 accessories guide – 9 must-have add-ons for your mini

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This AI-powered security camera is just $100 for Black Friday, with solar charging and no sneaky subscription fees

by Tech Wavo
November 19, 2025
0
This AI-powered security camera is just $100 for Black Friday, with solar charging and no sneaky subscription fees
Computers

There are some super-affordable home security cameras in this year's Black Friday sales, but there's often a catch: although the...

Read more

How TradeTrust helps businesses trade seamlessly across borders

by Tech Wavo
November 19, 2025
0
How TradeTrust helps businesses trade seamlessly across borders
Computers

Global trade hit a record US$33 trillion in 2024. That same year, Singapore, one of the world’s largest trading hubs,...

Read more

Wicked: For Good turns the musical’s sobering second half into the most unmissable movie of 2025

by Tech Wavo
November 19, 2025
0
Wicked: For Good turns the musical’s sobering second half into the most unmissable movie of 2025
Computers

Why you can trust TechRadar We spend hours testing every product or service we review, so you can be sure...

Read more

Black Friday deals in Australia are now live – I’ve found the 100+ best offers on phones, laptops, TVs, appliances and more

by Tech Wavo
November 19, 2025
0
Black Friday deals in Australia are now live – I’ve found the 100+ best offers on phones, laptops, TVs, appliances and more
Computers

Refresh When I checked prices this morning, a whole bunch of tech has become cheaper. And now it feels like...

Read more

Site links

  • Home
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms of use
  • Home
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms of use

No Result
View All Result
  • Home
  • Technology
  • Computers
  • Gadgets
  • Mobile
  • Apps
  • News
  • Financial
  • Stock