How Kraken ransomware benchmarks your system first, then encrypts everything without warning and silently steals data in the background


  • Kraken ransomware measures system performance before deciding the extent of encryption damage
  • Shadow copies, recycle bin and backup copies are deleted before encryption starts
  • Windows, Linux, and ESXi systems all face Kraken’s benchmark-driven attacks

The Kraken ransomware campaign introduces a benchmark step that times the encryption of a temporary file to determine how quickly it can encrypt a victim’s data.

Cisco Talos researchers found that the malware creates a random data file, encrypts it, records the speed, and deletes the test file.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top