How Kraken ransomware benchmarks your system first, then encrypts everything without warning, and steals data in the background silently




  • Kraken ransomware measures system performance before deciding the scale of encryption damage
  • Shadow copies, Recycle Bin, and backups are deleted before encryption starts
  • Windows, Linux, and ESXi systems all face Kraken’s benchmark-driven attacks

The Kraken ransomware campaign introduces a benchmark step which times the encryption of a temporary file to determine how quickly it can encrypt a victim’s data.

Researchers from Cisco Talos found the malware creates a random data file, encrypts it, records the speed, and deletes the test file.


https://cdn.mos.cms.futurecdn.net/fg7bgy65pWhFo4Qzib58yX-2560-80.jpg



Source link

Latest articles

spot_imgspot_img

Related articles

spot_imgspot_img