Unleashing the Kraken ransomware group

Nov. 13, 2025, 8:16 p.m.

Description

The Kraken ransomware group, emerging from the remnants of the HelloKitty cartel, has been observed conducting big-game hunting and double extortion attacks. Utilizing SMB vulnerabilities for initial access, they employ tools like Cloudflared for persistence and SSHFS for data exfiltration. Kraken's cross-platform ransomware targets Windows, Linux, and VMware ESXi environments, featuring a unique benchmarking capability. The group operates a data leak site and has announced a new underground forum called 'The Last Haven Board'. Kraken's sophisticated ransomware includes extensive command-line options, encryption performance testing, and anti-analysis techniques. It targets various file types, including SQL databases and network shares, while employing multi-threaded encryption and self-deletion processes to evade detection.

Date

  • Created: Nov. 13, 2025, 6:04 p.m.
  • Published: Nov. 13, 2025, 6:04 p.m.
  • Modified: Nov. 13, 2025, 8:16 p.m.

Indicators

  • d26171b8ecb3cf1b140d062c0274cc6ee125a318d74e2d5e19699213dca3ca9a
  • f6e189a3074fc88dc5f1be8de7887e097fe2115867db56b3ecc68b3a278b4965
  • abba10d2808639724e8c6b3c22d565cb338dc17d680a4f1591d0408b9edf78d8
  • 79d7701146b24e023de7a34519bbfb635375d1db3711bdf58ab21440a42ca7c2
  • 7472ac19dc16fc3bfd621cbb2a49e3641bd86325552d4eeb562e21d963f82bb3
  • 32ead9cd1f4925c8f10b9c04d0aa8b874277495104d9b8adfe7bb42583e51218
  • 340ddd9fd22f2abf0474b580a29129b09cc125fbd00a168eab899f6cdde351d7
  • 2f7cef4fdedf5393a5485ef4e3b718a56052184193b9833220b04930402dc96d
  • 2c26bb95a938b6a5063bf4f95942440a0583d52bb129ea272584fc94906f5e86
  • 2797ce055d37f9ea23080498584979b31fbf1f178d989d00c50f0cbbc93c6cc9
  • 1a449b92a96d37cd8210e25c17d495f9cf65387a3feb81b7b2c6a901e5ab7523

Attack Patterns

Additional Informations

  • Kuwait
  • Panama
  • Denmark
  • Canada
  • United Kingdom of Great Britain and Northern Ireland
  • United States of America