Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    GuliKit Hyperlink 2 connects (almost) any controller to Nintendo Switch 2, PC and Steam Deck for $17

    With memory shortage worsening, Lenovo executive tells buyers to act fast for lowest prices

    Xiaomi Redmi K90 Ultra and K Pad 2 tipped to feature Bose-tuned speakers

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      Read the extended transcript: President Donald Trump interviewed by ‘NBC Nightly News’ anchor Tom Llamas

      February 6, 2026

      Stocks and bitcoin sink as investors dump software company shares

      February 4, 2026

      AI, crypto and Trump super PACs stash millions to spend on the midterms

      February 2, 2026

      To avoid accusations of AI cheating, college students are turning to AI

      January 29, 2026

      ChatGPT can embrace authoritarian ideas after just one prompt, researchers say

      January 24, 2026
    • Business

      New VoidLink malware framework targets Linux cloud servers

      January 14, 2026

      Nvidia Rubin’s rack-scale encryption signals a turning point for enterprise AI security

      January 13, 2026

      How KPMG is redefining the future of SAP consulting on a global scale

      January 10, 2026

      Top 10 cloud computing stories of 2025

      December 22, 2025

      Saudia Arabia’s STC commits to five-year network upgrade programme with Ericsson

      December 18, 2025
    • Crypto

      Bernstein Discusses Bitcoin’s Weakest Bear Market Yet – “Nothing Broke”

      February 9, 2026

      Ethereum Price Hits Breakdown Target — But Is a Bigger Drop to $1,000 Coming?

      February 9, 2026

      Damex Secures MiCA CASP Licence, Establishing Its Position as a Tier-1 Digital Asset Institution in Europe

      February 9, 2026

      Bitget and BlockSec Introduce the UEX Security Standard, Setting a New Benchmark for Universal Exchanges

      February 9, 2026

      3 Meme Coins To Watch In The Second Week Of February 2026

      February 9, 2026
    • Technology

      GuliKit Hyperlink 2 connects (almost) any controller to Nintendo Switch 2, PC and Steam Deck for $17

      February 10, 2026

      With memory shortage worsening, Lenovo executive tells buyers to act fast for lowest prices

      February 10, 2026

      Xiaomi Redmi K90 Ultra and K Pad 2 tipped to feature Bose-tuned speakers

      February 10, 2026

      Baseus launches new 25,000 mAh 200W power bank with cables

      February 10, 2026

      Overwatch player count surges after name change and planned update, passing Battlefield 6

      February 10, 2026
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»Kraken ransomware benchmarks systems for optimal encryption choice
    Technology

    Kraken ransomware benchmarks systems for optimal encryption choice

    TechAiVerseBy TechAiVerseNovember 14, 2025No Comments4 Mins Read1 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Kraken ransomware benchmarks systems for optimal encryption choice
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    Kraken ransomware benchmarks systems for optimal encryption choice

    The Kraken ransomware, which targets Windows, Linux/VMware ESXi systems, is testing machines to check how fast it can encrypt data without overloading them.

    According to Cisco Talos researchers, Kraken’s feature is a rare capability that uses temporary files to choose between full and partial data encryption.

    The Kraken ransomware emerged at the begining of the year as a continuation of the HelloKitty operation, and engages in big-game hunting attacks with data theft for double extortion.

    On the gang’s data leak sites there are listed victims from the United States, the UK, Canada, Panama, Kuwait, and Denmark.

    Cisco researchers note that various mentions on Kraken’s site, as well as similarities in the ransom note, indicate connections with the now defunct HelloKitty ransomware that gained prominence in 2021 and attempted a rebranding after the leak of its source code.

    Apart from the ransomware operation, Kraken has also launched a new cybercrime forum named “The Last Haven Board” to facilitate supposedly secure communications and exchanges.

    Kraken’s extortion portal on the dark web
    Source: BleepingComputer

    Kraken attack chain

    According to Cisco’s observations, Kraken ransomware attacks typically begin with the exploitation of SMB vulnerabilities on internet-facing assets, providing the threat actors with an initial foothold.

    Next, the intruder extracts admin account credentials and uses them to re-enter the environment via Remote Desktop Protocol (RDP) and deploy the Cloudflared and SSHFS tools.

    Cloudflared is used for creating a reverse tunnel from the victim host back to the attacker’s infrastructure, and SSHFS allows exfiltrating data through mounted remote filesystems.

    Using persistent Cloudflared tunnels and RDP, Kraken operators navigate compromised networks and move laterally to all reachable machines to steal valuable data and lay the ground for the deployment of the ransomware binaries.

    Kraken infection chain
    Source: Cisco

    Setting the encryption mode

    When the encryption command is issued, Kraken will perform a performance benchmark on each machine, the researchers say.

    The process includes the creation of a temporary file with random data, encrypting it in a timed operation, calculating the result, and then deleting the file.

    Based on the result, the encryption decides if the data will be encrypted completely or partially.

    Speed calculation function
    Source: Cisco

    Cisco Talos notes that assessing the machine’s capabilities is likely to move quickly with the final stage of the attack and deal maximum damage without triggering alerts due to intensive resource usage.

    Before triggering the actual encryption, Kraken deletes shadow volumes and the Recycle Bin and stops backup services running on the system.

    Cisco explains that the Windows version of Kraken features four encryption modules: 

    1. SQL database – Identifies Microsoft SQL Server instances through registry keys, locates their database file directories, verifies the paths, and encrypts the SQL data files.
    2. Network share – Enumerates accessible network shares via WNet APIs, ignores ADMIN$ and IPC$, and encrypts files on all other reachable shares.
    3. Local drive – Scans available drive letters, targets removable, fixed, and remote drives, and encrypts their contents using separate worker threads.
    4. Hyper-V – Uses embedded PowerShell commands to list VMs, obtain their virtual disk paths, forcibly stop running VMs, and encrypt the associated VM disk files.

    The Linux/ESXi version enumerates and forcibly terminates running virtual machines to unlock their disk files, and then performs multi-threaded full or partial encryption using the same benchmarking logic as the Windows version.

    After finishing the encryption, an auto-generated ‘bye_bye.sh’ script executes to remove all logs, shell history, the Kraken binary, and finally the script itself.

    Encrypted files are appended with the ‘.zpsc’ file extension, and a ransom note (‘readme_you_ws_hacked.txt’) is dropped on impacted directories.

    Kraken ransom note
    Source: Cisco

    Cisco notes that in one case, it has observed a ransom demand of $1 million to be paid in Bitcoin.

    The complete indicators of compromise (IoCs) associated with Kraken ransomware attacks are available on this GitHub repository.


    Secrets Security Cheat Sheet: From Sprawl to Control

    Whether you’re cleaning up old keys or setting guardrails for AI-generated code, this guide helps your team build securely from the start.

    Get the cheat sheet and take the guesswork out of secrets management.

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleThis New ‘Play And Stay’ USB-C Drive Can Give Your Laptop A Serious Storage Boost
    Next Article Fortinet FortiWeb flaw with public PoC exploited to create admin users
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    GuliKit Hyperlink 2 connects (almost) any controller to Nintendo Switch 2, PC and Steam Deck for $17

    February 10, 2026

    With memory shortage worsening, Lenovo executive tells buyers to act fast for lowest prices

    February 10, 2026

    Xiaomi Redmi K90 Ultra and K Pad 2 tipped to feature Bose-tuned speakers

    February 10, 2026
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025661 Views

    Lumo vs. Duck AI: Which AI is Better for Your Privacy?

    July 31, 2025250 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 2025149 Views

    6 Best MagSafe Phone Grips (2025), Tested and Reviewed

    April 6, 2025111 Views
    Don't Miss
    Technology February 10, 2026

    GuliKit Hyperlink 2 connects (almost) any controller to Nintendo Switch 2, PC and Steam Deck for $17

    GuliKit Hyperlink 2 connects (almost) any controller to Nintendo Switch 2, PC and Steam Deck…

    With memory shortage worsening, Lenovo executive tells buyers to act fast for lowest prices

    Xiaomi Redmi K90 Ultra and K Pad 2 tipped to feature Bose-tuned speakers

    Baseus launches new 25,000 mAh 200W power bank with cables

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    GuliKit Hyperlink 2 connects (almost) any controller to Nintendo Switch 2, PC and Steam Deck for $17

    February 10, 20262 Views

    With memory shortage worsening, Lenovo executive tells buyers to act fast for lowest prices

    February 10, 20262 Views

    Xiaomi Redmi K90 Ultra and K Pad 2 tipped to feature Bose-tuned speakers

    February 10, 20261 Views
    Most Popular

    7 Best Kids Bikes (2025): Mountain, Balance, Pedal, Coaster

    March 13, 20250 Views

    VTOMAN FlashSpeed 1500: Plenty Of Power For All Your Gear

    March 13, 20250 Views

    This new Roomba finally solves the big problem I have with robot vacuums

    March 13, 20250 Views
    © 2026 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.