Operating model & behaviour
Kraken appears to follow the now common double-extortion playbook:
intruders move laterally in the victim’s network, exfiltrate data and then deploy
ransomware, while simultaneously threatening publication on a dedicated leak blog
if payment is not made.
Public leak site data and victim descriptions suggest a focus on:
- Technology and IT service providers
- Business and professional services firms
- Telecommunications and connectivity providers
- Consumer services and retail-adjacent businesses
- Manufacturing and logistics
The group’s victim set spans North America, Europe and other regions, with
organisations of varying size and criticality.
Leak site & public claims
Kraken maintains a Tor-based leak blog, where it publishes victim names,
descriptions and – in some cases – samples or full archives of stolen data.
The site is used to apply pressure during negotiations and to demonstrate
that the attackers actually hold sensitive information.
We strongly recommend not visiting or interacting with
ransomware leak sites directly. Instead, threat intelligence and legal teams
should assess exposure using controlled and lawful means.
In many cases, the leak listings remain accessible even after a victim
has recovered operations – which is why containment, evidence preservation
and strategic communication are as important as technical decryption.