Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
HackTheBox 320x100 1
UtiliaCS 970x120
Midnight Ransomware: A free decryptor has been released thanks to a bug in the code.

Midnight Ransomware: A free decryptor has been released thanks to a bug in the code.

12 November 2025 11:47

Researchers have discovered a vulnerability in the new Midnight ransomware , based on the old Babuk source code. The malware is marketed as an “advanced” version of the malware, but attempts to speed up and enhance the encryption process have proven unsuccessful: Norton researchers have managed to create a free decryptor for the affected data.

Experts say Midnight is based on Babuk’s source code, which was leaked into the public domain in 2021 and subsequently used as the basis for dozens of malware projects.

Midnight almost entirely replicates the structure of its predecessor, but the developers decided to change the encryption scheme: the malware uses ChaCha20 to encrypt the contents of files and RSA to encrypt the ChaCha20 key.

However, researchers discovered a flaw in the RSA key usage, allowing them to partially recover the data and then create a full decryptor . The tool is free and has already been released publicly.

Like Babuk, Midnight encrypts only portions of files to act faster and paralyze the system. The size of the encrypted blocks depends on the file size: large documents or databases become unreadable almost instantly . In recent builds, the malware has expanded its target list to cover almost all file formats, with the exception of executable files (.exe, .dll, and .msi).

Infected devices end up receiving files with the .midnight or .endpoint extension, sometimes this tag is embedded directly into the file’s contents. The victim is left with a standard ransom note (How To Restore Your Files.txt) and sometimes even a log file such as report.midnight or debug.endpoint, which shows how the script is working.

Follow us on Google News to receive daily updates on cybersecurity. Contact us if you would like to report news, insights or content for publication.

Cropped RHC 3d Transp2 1766828557 300x300
The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.