This is one benchmark you won’t want to top – devious ransomware will test your system to see how easy it is to hack

  • Kraken ransomware measures system performance before deciding the scale of encryption damage
  • Shadow copies, Recycle Bin, and backups are deleted before encryption starts
  • Windows, Linux, and ESXi systems all face Kraken’s benchmark-driven attacks

The Kraken ransomware campaign introduces a benchmark step which times the encryption of a temporary file to determine how quickly it can encrypt a victim’s data.

Researchers from Cisco Talos found the malware creates a random data file, encrypts it, records the speed, and deletes the test file.

The result guides the hackers in choosing between full encryption and a partial approach that still damages files while avoiding excessive system load that could expose their activity.

Targeting key enterprise assets

In their report, the researchers outlined how Kraken prepares each compromised environment by deleting shadow copies, clearing the Recycle Bin, and disabling backup services.

The Windows version includes four separate modules designed to locate and encrypt SQL databases, network shares, local drives, and Hyper-V virtual machines.

These modules confirm paths, stop active virtual machines, and apply encryption with multiple worker threads to increase coverage.

The Linux and ESXi edition terminates running virtual machines to unlock their disks and apply the same benchmark-based logic before encrypting data across the host.

Once the encryption phase is complete, the ransomware executes a script that clears logs, deletes shell history, removes the binary, and eliminates evidence of the operation.

Files receive the .zpsc extension, and a ransom note titled readme_you_ws_hacked.txt appears in affected locations.

Cisco reported a case where the attackers demanded $1 million in Bitcoin, and relevant indicators of compromise are documented in a public repository.

Kraken appears to share operational traits with the former HelloKitty ransomware group, as both groups use identical ransom note filenames and reference each other on leak sites.

The hackers behind Kraken also announced a new underground forum called The Last Haven Board, which claims to offer a secure channel for communication within the cybercrime ecosystem.

In documented cases, attackers gained initial access by exploiting vulnerable SMB services exposed to the internet, harvesting administrator credentials and re-entered the environment using Remote Desktop.

Persistence was maintained through Cloudflare tunnels, and SSHFS was used to move through the network and exfiltrate data.

The attackers deployed the Kraken binary afterward and used stolen credentials to propagate across additional systems.

Staying safe against threats like Kraken requires a consistent approach to limit exposure and reduce potential damage, so organizations should maintain strong ransomware protection, ensuring backups, access controls, and network segmentation are properly applied and monitored.

Keeping antivirus software updated helps detect malicious files before they can spread, while regular malware removal tools clear remnants of intrusions.

Limiting internet-facing services, patching vulnerabilities, and enforcing strong authentication further reduce attackers’ opportunities.

Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds. Make sure to click the Follow button!

And of course you can also follow TechRadar on TikTok for news, reviews, unboxings in video form, and get regular updates from us on WhatsApp too.

Read more @ TechRadar

Latest posts

Trump embraces gas guzzlers and air pollution by weakening fuel economy standards

Motorists drive on Interstate 210 during the morning commute on December 03, 2025 in Pasadena, California. President Donald Trump announced a new plan that lets...

Reddit’s CEO says r/popular ‘sucks,’ and it’s going away

Reddit CEO Steve Huffman. Reddit is “moving away” from r/popular, the default feed for new users, and plans to replace it with “better, more relevant...

Anthropic’s AI bubble ‘YOLO’ warning

Andrew Ross Sorkin and Dario Amodei speak onstage during The New York Times DealBook Summit 2025 at Jazz at Lincoln Center on December 03,...

Satellites keep photobombing the Hubble telescope, and it’s getting worse

A simulated image representing the projected contamination by satellite trails in one of the future space telescopes. The stripes of light reflected from artificial...

BMW iX3 first drive: a ‘New Class’ is in session

BMW has been peppering us with teasers and bits and pieces about its next-gen EV platform, Neue Klasse, for so long - fully two...

Netflix is getting rid of another of its game studios by selling it back to its founders

The developer of Cozy Grove and Alphabear is leaving Netflix. Spry Fox is being sold back to its original founders, Game File reports, and...

OpenAI’s new confession system teaches models to be honest about bad behaviors

OpenAI announced today that it is working on a framework that will train artificial intelligence models to acknowledge when they've engaged in undesirable behavior,...

How to use Accessibility Reader on Apple devices

Earlier this year, Apple launched a new tool that makes it easier to read anything on your device’s screen. Designed for people with visual...

Your ‘dear algo’ Threads posts might actually do something soon

In a lot of social media use, the algorithm is an intangible entity, silent and all-powerful in controlling what we see in our feeds....

Artist Bungie plagiarized for Marathon alpha says the issue has been resolved

Bungie and Sony Interactive Entertainment appear to have settled the plagiarism scandal that rocked Marathon before the game was indefinitely delayed in June 2025....