Kraken ransomware uses benchmarking to optimize big-game attacks
Category:Threat Alerts
Kraken ransomware introduces a novel benchmarking phase in its attack chain, measuring how quickly victim systems can process encryption workloads before locking files, and mapping closely to ATT&CK techniques like T1133 (External Remote Services), T1021.001 (RDP), T1486 (Data Encrypted for Impact) and T1041 (Exfiltration Over C2 Channel). Emerging from the remnants of the HelloKitty cartel, this Russian-speaking operation has conducted big-game hunting campaigns across Windows, Linux and VMware ESXi environments. Cisco Talos observed Kraken abusing exposed SMB services for initial access, then using Cloudflare-based tunneling for persistence and SSHFS for data theft before launching the encryptor. The benchmarking step allows Kraken actors to adapt encryption strategy to the underlying hardware and workload, selecting parameters that maximize damage while minimizing the risk of system instability or noisy performance anomalies that could expose the attack. Multi-threaded modules target SQL databases, network shares, local drives and virtual machines in parallel, while exfiltrated data is staged for double extortion on a leak site branded with references to HelloKitty and a new forum called The Last Haven Board. Ransoms reportedly reach around one million dollars in Bitcoin, with victims across the United States, the United Kingdom, Canada, Denmark, Panama and Kuwait. For businesses, Kraken exemplifies how ransomware groups are optimizing not only initial access but also the impact phase, tuning encryption to complete quickly and reliably across hybrid environments. That increases the chance of complete operational disruption while maintaining leverage through stolen data, intensifying regulatory exposure under GDPR, HIPAA or sectoral rules when sensitive customer or health records are involved. The overlap with HelloKitty also suggests that experienced operators and tooling are being recycled into the new brand, shortening the maturation cycle for Kraken as a major ransomware player. Mitigation strategies should prioritize closing external SMB and RDP exposure, enforcing strong authentication and lockout policies on any remaining remote services, and hardening backup strategies against tampering. Detection teams should look for anomalous use of Cloudflare tunnels, SSHFS-based file system access and benchmarking-like activity preceding unusual file access spikes, aligned with techniques such as T1046 (Network Service Discovery), T1021.001 and T1486. Organizations should also maintain offline and immutable backups, test restore procedures regularly and prepare communication and legal workflows for double extortion scenarios where data theft and encryption occur together.
CORTEX Protocol Intelligence Assessment
Business Impact: Kraken’s benchmarking-driven encryption increases the reliability and speed of ransomware deployment across servers, databases and virtual infrastructure, raising the likelihood of full production outages and costly recovery efforts. The group’s double extortion model and global victim set mean that breaches can quickly escalate into regulatory incidents and reputational damage, particularly where customer or operational data is exfiltrated before encryption.
Strategic Intelligence Guidance
- Inventory and close unnecessary external-facing SMB and RDP services, enforcing MFA and strict access control on any remote management exposure that must remain.
- Deploy detections for Cloudflare-based tunneling, SSHFS usage and abnormal high-volume file access patterns that may indicate staging for encryption or exfiltration.
- Harden and regularly test backup and restore processes, ensuring the existence of offline or immutable backups that cannot be modified via ransomware operator credentials.
- Rehearse response to double extortion incidents, including legal review, regulator notification paths and decision frameworks for ransom negotiations or refusal.
Vendors
Threats
Targets
Impact
Financial:around $1,000,000 ransom demands reported
Intelligence Source: Kraken ransomware uses benchmarking to optimize big-game attacks | Nov 18, 2025