Kraken ransomware moves laterally across networks using stolen credentials

Kraken ransomware moves laterally across networks using stolen credentials

Kraken ransomware moves laterally across networks using stolen credentials


  • Kraken ransomware measures system performance before deciding the scale of encryption damage
  • Shadow copies, Recycle Bin, and backups are deleted before encryption starts
  • Windows, Linux, and ESXi systems all face Kraken’s benchmark-driven attacks

The Kraken ransomware campaign introduces a benchmark step which times the encryption of a temporary file to determine how quickly it can encrypt a victim’s data.

Researchers from Cisco Talos found the malware creates a random data file, encrypts it, records the speed, and deletes the test file.





Source link

Back To Top