The midnight hour: when ransomware becomes a business nightmare

How small businesses can recognize, prevent, and recover from ransomware attacks.

Man standing at desk looking at desktop monitor.

The alarm at 3 AM

Picture this: at 3 a.m., the owner of “Maple & Main Café,” a cozy downtown coffee shop in Des Moines, is jolted awake by an alert on her phone. Her POS terminal went offline, her online orders have vanished, and a chilling message appears: “All your files have been encrypted. Pay 15 BTC to unlock them.”

She thinks, “It must be a glitch. We back things up nightly.” But then she checks and sees that yesterday’s backup folder is corrupt. Her bookkeeping, customer records, and marketing files are all locked. She cannot process orders, cannot pay staff, and cannot communicate with vendors. Ransomware sneaks in quietly then slams the door shut and holds your entire digital life hostage. For a small business with tight margins, that pause can be fatal.

How ransomware works in plain terms

  • The Break-In: Attackers usually arrive through a phishing email when someone clicks on a seemingly “safe” link, a weak remote-access port, or an unpatched software loophole.
  • The Lockdown: Once inside, malicious software encrypts files across computers, servers, and even backups, rendering them unusable.
  • The Ransom Note: Hackers demand payment, often in cryptocurrency, for a decryption key and sometimes also threaten to leak or sell your data.
  • Collateral Damage: The fallout includes downtime, legal costs, reputational harm, regulatory fines, and the steep cost of rebuilding or restoring systems.

It is like a burglar who does not take valuables. They just bolt your front door and demand you pay to re-enter.

Why small businesses are especially at risk

For large organizations, ransomware is a painful but manageable risk. For small businesses, it can be existential.

  • Tighter margins and fewer buffers: A few days offline might wipe you out.
  • Limited IT or expertise: Many small businesses do not have dedicated security staff or advanced tools.
  • More trusting customers: When you serve your community, a breach of trust hurts deeply.
  • Regulatory exposure: Even a small data breach such as customer names or payment info can trigger data-protection penalties.

In short, you may not seem “big enough” to be a target, but attackers do not care. They look for vulnerability, not size.

Evolving threats from lockers to full-blown extortion

Ransomware tactics have grown more ruthless.

  • Lockers to Encryptors: Early versions just blocked access. Modern ones encrypt everything including backups.
  • Ransomware-as-a-Service: Criminal syndicates package and lease ransomware tools to less technical attackers.
  • Double extortion: Even if you refuse to pay, attackers threaten to publish or sell your data.
  • Targeted strikes: Instead of “spray and pray,” attackers now study your systems, find your most critical assets such as customer databases, and go straight for them.

A recent example is a new strain called Midnight, which borrows from the notorious Babuk ransomware. It uses modern encryption like ChaCha20, targets backups and databases first, and inserts hooks that complicate recovery. Luckily, Norton has already developed a decryptor to recover files for this particular ransomware strain. If you think you may have been impacted by Midnight Ransomware, you can find more information on how to confirm this as well as a link to our free decryptor at the end of this blog.

Real cases of small business ransomware attacks

Kido nursery breach
In late September 2025, hackers breached Kido International, a chain of 18 nurseries in London with operations in the U.S. too. They stole data from over 8,000 children. Attackers even phoned some parents demanding pressure on Kido to pay ransom. In an unprecedented step, the attackers eventually deleted the data and apologized, likely because they underestimated the public outrage.

Kaseya and REvil
When REvil exploited a vulnerability in Kaseya’s remote-management software, it spread into the networks of managed service providers and their small business clients. Over 1,000 downstream businesses found themselves locked out. A tiny plumbing supplier in rural Minnesota had to shut down operations for days while its entire scheduling, invoicing, and supply orders were offline until recovery.

U.S. school districts and Ryuk Attacks
School systems across the U.S. have been hit repeatedly by Ryuk ransomware. Since schools often run lean IT budgets, the impact is severe: classrooms shut down, student data at risk, and taxpayers left footing the bill. One district spent over $100,000 just to clean up and rebuild systems long before penalties or lost trust were considered.

The takeaway: If attackers can threaten a nursery chain by name and face consequences, no small business is exempt.

The human cost, stress, reputation, and existential risk

Winning back your systems after a ransomware attack is like rebuilding a bombed-out house. The data might be restored, but:

  • Your customers wonder if they can trust you with their data anymore.
  • Local press may haul things into the open.
  • Legal or regulatory agencies may get involved, especially in sectors like healthcare, finance, or education.
  • The emotional burden on the owner or staff, such as sleepless nights and anxiety, can derail morale.

Many small businesses never fully recover.

Your checklist for protection

Think of defense as building layers of protection. No single step will stop every attack, but together they make your business much harder to hit.

  1. Keep reliable backups. Store copies in the cloud or on an external drive that stays disconnected when not in use.
  2. Update everything. Install software and operating system updates as soon as they are available. Patches close the holes attackers use.
  3. Use strong, unique passwords. Protect every account with a strong password and add multi-factor authentication where possible.
  4. Train your team. Make sure employees know how to spot phishing emails and unsafe links. One click can let attackers in.
  5. Rely on security software. Use trusted tools that can block ransomware, filter suspicious emails, and monitor unusual activity.
  6. Limit access. Only give employees the permissions they need for their role. Fewer doors mean fewer entry points for criminals.
  7. Have a response plan. Know in advance who to call — whether it is law enforcement, your IT provider, or a legal advisor — so you can act quickly if an attack happens.


The bottom line
Ransomware is designed to catch you off guard, but preparation shifts the odds in your favor. With regular backups, smart updates, trained employees, and strong security tools, your small business can withstand the pressure and keep moving forward.

Why this story matters to your business future

Ransomware is not cybersecurity theater. It is a real, present danger. The stories above show how attackers are increasingly brazen and targeting sectors once considered off-limits. The stakes are deeply personal for small business owners, not just big corporations. Because you are smaller, your margin for error is thinner and you cannot absorb a week of downtime without serious harm. Reputation and trust are fragile and local customers remember breach stories.

If you own or run a small business, consider this. The most effective moment to harden your defenses is before the alarm goes off. When the digital equivalent of a break-in happens at midnight, you do not want to scramble. You want to act.

How to tell if you have been impacted by Midnight Ransomware

While most ransomware looks similar at first glance, Midnight leaves behind distinct digital fingerprints that can help victims quickly identify it.

If you suspect your system has been infected, look for these signs:

  • File extensions changed to .Midnight or .endpoint
  • A ransom note titled How To Restore Your Files.txt appearing in multiple folders
  • Log files named Report.Midnight or debug.endpoint created on your device
  • Encrypted data that appears normal in name but cannot be opened
  • Unusual system activity such as a temporary lock-up or new files appearing in unexpected locations

Some variants of Midnight may not rename files but instead append the .Midnight extension directly into the file’s content, which can make the changes harder to notice.

If you see any of these indicators, do not pay the ransom and do not delete the encrypted files. There is now a legitimate, researcher-developed decryptor that may be able to restore your data safely.

To read the technical analysis of Midnight Ransomware, visit this Gen blog.

How to recover your files

Researchers at Norton have created a free Midnight Ransomware Decryptor that can help victims recover files without paying criminals.

To use it:

  1. Download the decryptor here.
  2. Run the decryptor as an administrator and follow the step-by-step setup wizard.
  3. Choose which drives or folders to scan. The tool will automatically locate and decrypt Midnight-encrypted files.
  4. Keep the backup option enabled so your encrypted files are preserved in case anything goes wrong.
  5. Allow the process to finish before checking your restored files.

 

Michal Salát
  • Michal Salát
  • Threat Intelligence Director
Michal joined the company as a malware analyst and is now our threat intelligence director.

Editorial note: Our articles provide educational information for you. Our offerings may not cover or protect against every type of crime, fraud, or threat we write about. Our goal is to increase awareness about Cyber Safety. Please review complete Terms during enrollment or setup. Remember that no one can prevent all identity theft or cybercrime, and that LifeLock does not monitor all transactions at all businesses. The Norton and LifeLock brands are part of Gen Digital Inc. 

Contents

    Want more?

    Follow us for all the latest news, tips, and updates.