Complex Mathematics

How Kraken ransomware benchmarks your system first, then encrypts everything without warning, and steals data in the background silently




  • Kraken ransomware measures system performance before deciding the scale of encryption damage
  • Shadow copies, Recycle Bin, and backups are deleted before encryption starts
  • Windows, Linux, and ESXi systems all face Kraken’s benchmark-driven attacks

The Kraken ransomware campaign introduces a benchmark step which times the encryption of a temporary file to determine how quickly it can encrypt a victim’s data.

Researchers from Cisco Talos found the malware creates a random data file, encrypts it, records the speed, and deletes the test file.





Source link