Kraken ransomware benchmarks systems before silent encryption

The Kraken ransomware variant first assesses a target's system vulnerability before launching its attack. It then encrypts files without warning while stealing data quietly in the background. Hackers specifically target SQL databases, network shares, and local drives.

According to a TechRadar report published on November 19, 2025, the Kraken ransomware operates in a particularly devious manner. It begins by benchmarking the victim's system to evaluate how easily it can be hacked, allowing attackers to gauge the potential for successful infiltration.

Once the assessment is complete, the ransomware proceeds to encrypt everything on the system without any prior warning to the user. Simultaneously, it steals data silently in the background, evading immediate detection.

The attack actively targets key storage areas, including SQL databases, network shares, and local drives, making it a significant threat to organizational data integrity. This multi-stage approach highlights the evolving sophistication of ransomware tactics employed by hackers.

이 웹사이트는 쿠키를 사용합니다

사이트를 개선하기 위해 분석을 위한 쿠키를 사용합니다. 자세한 내용은 개인정보 보호 정책을 읽으세요.
거부