{"id":225062,"date":"2025-11-14T01:15:29","date_gmt":"2025-11-14T07:15:29","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2025\/11\/kraken-ransomware-benchmarks-systems-for-optimal-encryption-choice"},"modified":"2025-11-14T01:15:29","modified_gmt":"2025-11-14T07:15:29","slug":"kraken-ransomware-benchmarks-systems-for-optimal-encryption-choice","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2025\/11\/kraken-ransomware-benchmarks-systems-for-optimal-encryption-choice","title":{"rendered":"Kraken ransomware benchmarks systems for optimal encryption choice"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/kraken-ransomware-benchmarks-systems-for-optimal-encryption-choice.jpg\"><\/a><\/p>\n<p>The Kraken ransomware, which targets Windows, Linux\/VMware ESXi systems, is testing machines to check how fast it can encrypt data without overloading them.<\/p>\n<p>According to Cisco Talos researchers, Kraken\u2019s feature is a rare capability that uses temporary files to choose between full and partial data encryption.<\/p>\n<p>The Kraken ransomware emerged at the begining of the year as a continuation of the HelloKitty operation, and engages in big-game hunting attacks with data theft for double extortion.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Kraken ransomware, which targets Windows, Linux\/VMware ESXi systems, is testing machines to check how fast it can encrypt data without overloading them. According to Cisco Talos researchers, Kraken\u2019s feature is a rare capability that uses temporary files to choose between full and partial data encryption. The Kraken ransomware emerged at the begining of the [\u2026]<\/p>\n","protected":false},"author":427,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,1625],"tags":[],"class_list":["post-225062","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode","category-encryption"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/225062","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/427"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=225062"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/225062\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=225062"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=225062"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=225062"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}