Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

PlushDaemon Hackers Unleash New Malware in China-Aligned Spy Campaigns

November 19, 2025

Hyper-V Malware, Malicious AI Bots, RDP Exploits, WhatsApp Lockdown and More

November 19, 2025

China-Linked Operation “WrtHug” Hijacks Thousands of ASUS Routers

November 19, 2025
Facebook X (Twitter) Instagram
Wednesday, November 19
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Kraken Uses Benchmarking to Enhance Ransomware Attacks
News

Kraken Uses Benchmarking to Enhance Ransomware Attacks

Team-CWDBy Team-CWDNovember 17, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A series of big-game hunting incidents and double extortion attacks carried out by Kraken, a Russian-speaking operation that has emerged from the ashes of the HelloKitty cartel, was observed in August 2025 by Cisco Talos and detailed in an advisory published last week.

The group has been linked to intrusions where Server Message Block (SMB) flaws were abused for entry, followed by the use of Cloudflare for persistence and SSH Filesystem (SSHFS) for data theft before encryption.

Kraken’s toolkit spans Windows, Linux and VMware ESXi, giving it reach across many enterprise environments.

A New Ransomware Strain 

What’s new is Kraken’s unusual benchmarking step, which measures how quickly a victim machine can process encryption before the malware initiates its file-locking routine. This allows the attackers to tailor the encryption method for maximum impact while reducing the chance of triggering system instability or detection.

The group also announced a new underground discussion space, The Last Haven Board, on its leak site, in an effort to create a secure hub for cybercrime collaboration.

Kraken, active since February 2025, relies on double extortion and appears opportunistic rather than focused on specific sectors.

Victims listed on its site include organizations in the US, the UK, Canada, Denmark, Panama and Kuwait.

It applies the .zpsc extension, issues a ransom note titled readme_you_ws_hacked.txt and threatens to publish stolen files if contacted through its onion service.

Read more on ransomware leak sites: Leak Site Ransomware Victims Spike 13% in a Year 

External reporting and Talos observations indicate possible overlap with the HelloKitty threat group. Kraken’s leak portal references HelloKitty by name, and both groups use the same ransom note filename.

The launch of Last Haven included claimed support from HelloKitty operators and WeaCorp, an exploit-buying outfit, adding weight to the theory that Kraken spun out from the earlier cartel.

Kraken Attack Tactics

Talos documented one case in which Kraken actors broke in through an exposed SMB service, extracted privileged credentials, then returned via Remote Desktop.

Afterward, they installed Cloudflare to maintain access, deployed SSHFS to browse and siphon data, and pushed the encryptor across the network via Remote Desktop Protocol (RDP). They demanded roughly $1m in Bitcoin and pledged decryption and non-disclosure after payment.

Key elements of Kraken’s tactics include:

  • Cross-platform encryptors

  • Benchmark-based encryption decisions

  • Multi-threaded modules targeting SQL databases, network shares, local drives and virtual machines

Talos attributed this activity to an increasingly organized group attempting to claim the space left vacant by the collapse of the HelloKitty cartel.

To defend against threats such as this, organizations should strengthen credential hygiene, limit exposure of remote services, harden backup strategies and adopt continuous monitoring to spot abnormal tunneling or data access activity early.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleGoogle Launches New Maps Feature to Help Businesses Report Review-Based Extortion Attempts
Next Article Enterprise Credentials at Risk – Same Old, Same Old?
Team-CWD
  • Website

Related Posts

News

PlushDaemon Hackers Unleash New Malware in China-Aligned Spy Campaigns

November 19, 2025
News

Hyper-V Malware, Malicious AI Bots, RDP Exploits, WhatsApp Lockdown and More

November 19, 2025
News

China-Linked Operation “WrtHug” Hijacks Thousands of ASUS Routers

November 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest News

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views

The risks of unsupported IoT tech

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views
Our Picks

‘What happens online stays online’ and other cyberbullying myths, debunked

September 11, 2025

Watch out for SVG files booby-trapped with malware

September 22, 2025

How chatbots can help spread scams

October 14, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2025 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.