Original Article Text

Click to Toggle View

Kraken ransomware benchmarks systems for optimal encryption choice. The Kraken ransomware, which targets Windows, Linux/VMware ESXi systems, is testing machines to check how fast it can encrypt data without overloading them. According to Cisco Talos researchers, Kraken's feature is a rare capability that uses temporary files to choose between full and partial data encryption. The Kraken ransomware emerged at the begining of the year as a continuation of the HelloKitty operation, and engages in big-game hunting attacks with data theft for double extortion. On the gang's data leak sites there are listed victims from the United States, the UK, Canada, Panama, Kuwait, and Denmark. Cisco researchers note that various mentions on Kraken’s site, as well as similarities in the ransom note, indicate connections with the now defunct HelloKitty ransomware that gained prominence in 2021 and attempted a rebranding after the leak of its source code. Apart from the ransomware operation, Kraken has also launched a new cybercrime forum named “The Last Haven Board” to facilitate supposedly secure communications and exchanges. Kraken attack chain According to Cisco’s observations, Kraken ransomware attacks typically begin with the exploitation of SMB vulnerabilities on internet-facing assets, providing the threat actors with an initial foothold. Next, the intruder extracts admin account credentials and uses them to re-enter the environment via Remote Desktop Protocol (RDP) and deploy the Cloudflared and SSHFS tools. Cloudflared is used for creating a reverse tunnel from the victim host back to the attacker’s infrastructure, and SSHFS allows exfiltrating data through mounted remote filesystems. Using persistent Cloudflared tunnels and RDP, Kraken operators navigate compromised networks and move laterally to all reachable machines to steal valuable data and lay the ground for the deployment of the ransomware binaries. Setting the encryption mode When the encryption command is issued, Kraken will perform a performance benchmark on each machine, the researchers say. The process includes the creation of a temporary file with random data, encrypting it in a timed operation, calculating the result, and then deleting the file. Based on the result, the encryption decides if the data will be encrypted completely or partially. Cisco Talos notes that assessing the machine's capabilities is likely to move quickly with the final stage of the attack and deal maximum damage without triggering alerts due to intensive resource usage. Before triggering the actual encryption, Kraken deletes shadow volumes and the Recycle Bin and stops backup services running on the system. Cisco explains that the Windows version of Kraken features four encryption modules:  The Linux/ESXi version enumerates and forcibly terminates running virtual machines to unlock their disk files, and then performs multi-threaded full or partial encryption using the same benchmarking logic as the Windows version. After finishing the encryption, an auto-generated ‘bye_bye.sh’ script executes to remove all logs, shell history, the Kraken binary, and finally the script itself. Encrypted files are appended with the ‘.zpsc’ file extension, and a ransom note (‘readme_you_ws_hacked.txt’) is dropped on impacted directories. Cisco notes that in one case, it has observed a ransom demand of $1 million to be paid in Bitcoin. The complete indicators of compromise (IoCs) associated with Kraken ransomware attacks are available on this GitHub repository. The 2026 CISO Budget Benchmark It's budget season! Over 300 CISOs and security leaders have shared how they're planning, spending, and prioritizing for the year ahead. This report compiles their insights, allowing readers to benchmark strategies, identify emerging trends, and compare their priorities as they head into 2026. Learn how top leaders are turning investment into measurable impact.

Daily Brief Summary

CYBERCRIME // Kraken Ransomware Adopts Advanced Encryption Tactics for Maximum Impact

Kraken ransomware targets Windows and Linux/VMware ESXi systems, benchmarking them to optimize encryption speed and efficiency while avoiding detection.

Originating from the HelloKitty operation, Kraken engages in high-profile attacks with data theft for double extortion, impacting victims in the US, UK, Canada, and more.

The ransomware's attack chain begins with exploiting SMB vulnerabilities, followed by credential extraction and lateral movement using Cloudflared and SSHFS tools.

Kraken's encryption process involves a unique performance benchmark, deciding between full or partial encryption based on system capabilities to maximize damage.

Before encryption, Kraken deletes shadow volumes and backup services, ensuring minimal recovery options for the victim.

The ransomware appends a '.zpsc' extension to encrypted files and demands ransoms, with one observed demand reaching $1 million in Bitcoin.

Cisco Talos researchers have published indicators of compromise (IoCs) on GitHub to assist organizations in detecting and mitigating Kraken ransomware threats.