Red Hot Cyber, il blog italiano sulla sicurezza informatica
Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Enterprise BusinessLog 320x200 1
2nd Edition GlitchZone RHC 970x120 2
Midnight Ransomware: A free decryptor has been released thanks to a bug in the code.

Midnight Ransomware: A free decryptor has been released thanks to a bug in the code.

Redazione RHC : 12 November 2025 11:47

Researchers have discovered a vulnerability in the new Midnight ransomware , based on the old Babuk source code. The malware is marketed as an “advanced” version of the malware, but attempts to speed up and enhance the encryption process have proven unsuccessful: Norton researchers have managed to create a free decryptor for the affected data.

Experts say Midnight is based on Babuk’s source code, which was leaked into the public domain in 2021 and subsequently used as the basis for dozens of malware projects.

Midnight almost entirely replicates the structure of its predecessor, but the developers decided to change the encryption scheme: the malware uses ChaCha20 to encrypt the contents of files and RSA to encrypt the ChaCha20 key.

However, researchers discovered a flaw in the RSA key usage, allowing them to partially recover the data and then create a full decryptor . The tool is free and has already been released publicly.

Like Babuk, Midnight encrypts only portions of files to act faster and paralyze the system. The size of the encrypted blocks depends on the file size: large documents or databases become unreadable almost instantly . In recent builds, the malware has expanded its target list to cover almost all file formats, with the exception of executable files (.exe, .dll, and .msi).

Infected devices end up receiving files with the .midnight or .endpoint extension, sometimes this tag is embedded directly into the file’s contents. The victim is left with a standard ransom note (How To Restore Your Files.txt) and sometimes even a log file such as report.midnight or debug.endpoint, which shows how the script is working.

Immagine del sitoRedazione
The editorial team of Red Hot Cyber consists of a group of individuals and anonymous sources who actively collaborate to provide early information and news on cybersecurity and computing in general.

Lista degli articoli