Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»New Python Backdoor Uses Tunneling Service to Steal Browser and Cloud Credentials
    Cybersecurity

    New Python Backdoor Uses Tunneling Service to Steal Browser and Cloud Credentials

    adminBy adminMay 1, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    New Python Backdoor Uses Tunneling Service to Steal Browser and Cloud Credentials
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Ravie LakshmananApr 30, 2026Cloud Security / Threat Intelligence

    Cybersecurity researchers have disclosed details of a stealthy Python-based backdoor framework called DEEP#DOOR that comes with capabilities to establish persistent access and harvest a wide range of sensitive information from compromised hosts.

    “The intrusion chain begins with execution of a batch script (‘install_obf.bat’) that disables Windows security controls, dynamically extracts an embedded Python payload (‘svc.py’), and establishes persistence through multiple mechanisms including Startup folder scripts, registry Run keys, scheduled tasks, and optional WMI subscriptions,” Securonix researchers Akshay Gaikwad, Shikha Sangwan, and Aaron Beardslee said in a report shared with The Hacker News.

    It’s assessed that the batch script is distributed via traditional approaches like phishing. It’s currently not known how widespread attacks distributing the malware are, and if any of those infections have been successful.

    “Based on our current analysis, there is no clear evidence to suggest that this malware framework was widely used in large-scale or highly active campaigns,” Gaikwad, senior security research engineer at Securonix, told The Hacker News via email. “Its observed usage appears to be limited and somewhat targeted rather than broadly distributed.”

    “At this stage, we have not identified consistent indicators pointing to specific geographies or industry sectors being systematically targeted. However, given the modular nature of the framework, it is possible that different threat actors could adapt it for varied use cases over time.”

    What makes the attack chain noteworthy is that the core Python implant is embedded directly inside the dropper script, from where it’s extracted, reconstructed, and executed. This reduces the need for repeatedly having to reach out to external infrastructure and minimizes the forensic footprint. 

    Once launched, the malware establishes communication with “bore[.]pub,” a Rust-based tunneling service, allowing the operator to issue commands that facilitate remote command execution and extensive surveillance. This includes –

    • Reverse shell
    • System reconnaissance
    • Keylogging
    • Clipboard monitoring
    • Screenshot capture
    • Webcam access
    • Ambient audio recording
    • Web browser credential harvesting
    • SSH key extraction
    • Credentials stored in Google Chrome, Mozilla Firefox, and Windows Credential Manager
    • Cloud credential theft (Amazon Web Services, Google Cloud, and Microsoft Azure)

    The use of public TCP tunneling service for command-and-control (C2) offers several advantages in that it eliminates the need for setting up dedicated infrastructure, blends malicious traffic, and avoids embedding details of the server within the payload.

    In parallel, DEEP#DOOR incorporates a bevy of anti-analysis and defense evasion mechanisms, such as sandbox, debugger, and virtual machine (VM) detection, AMSI and Event Tracing for Windows (ETW) patching, NTDLL unhooking, Microsoft Defender tampering, SmartScreen bypass, PowerShell logging suppression, command-line wiping, timestamp stomping, and log clearing, to fly under the radar and complicate incident response efforts. 

    It also employs multiple persistence mechanisms that involve creating Windows Startup folder scripts, Registry Run keys, and scheduled tasks, while also relying on a watchdog mechanism to make sure the persistence artifacts have not been removed, and if so, automatically recreate them, making remediation challenging.

    “The resulting implant operates as a fully featured Remote Access Trojan (RAT) capable of long-term persistence, espionage, lateral movement, and post-exploitation operations within compromised environments,” Securonix said. “The implant prioritizes evading detection and forensic visibility by directly tampering with Windows security and telemetry mechanisms.”

    “DEEP#DOOR highlights the continued evolution of threat actors toward fileless, script-driven intrusion frameworks that rely heavily on native system components and interpreted languages like Python. By embedding the payload directly within the dropper and extracting it at runtime, the malware significantly reduces external dependencies and limits traditional detection opportunities.”

    backdoor Browser Cloud Credentials Python service steal Tunneling
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleAI traffic is getting bigger, louder, and less predictable
    admin
    • Website

    Related Posts

    AI traffic is getting bigger, louder, and less predictable

    May 1, 2026

    Romanian leader of online swatting ring gets 4 years in prison

    May 1, 2026

    AI Fuels ‘Industrial’ Cybercrime as Time-to-Exploit Shrinks to Hours

    May 1, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    New Python Backdoor Uses Tunneling Service to Steal Browser and Cloud Credentials

    May 1, 2026

    AI traffic is getting bigger, louder, and less predictable

    May 1, 2026

    AI Gives You The Vocabulary. It Doesn’t Give You The Expertise

    May 1, 2026

    Romanian leader of online swatting ring gets 4 years in prison

    May 1, 2026
    Categories
    • Blogging (71)
    • Cybersecurity (1,612)
    • Privacy & Online Earning (193)
    • SEO & Digital Marketing (996)
    • Tech Tools & Mobile / Apps (1,796)
    • WiFi / Internet & Networking (258)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    New Python Backdoor Uses Tunneling Service to Steal Browser and Cloud Credentials

    May 1, 2026

    AI traffic is getting bigger, louder, and less predictable

    May 1, 2026

    AI Gives You The Vocabulary. It Doesn’t Give You The Expertise

    May 1, 2026
    Most Popular
    • New Python Backdoor Uses Tunneling Service to Steal Browser and Cloud Credentials
    • AI traffic is getting bigger, louder, and less predictable
    • AI Gives You The Vocabulary. It Doesn’t Give You The Expertise
    • Romanian leader of online swatting ring gets 4 years in prison
    • When 170,000 people show up: Network refresh readies Churchill Downs for Kentucky Derby
    • AI Fuels ‘Industrial’ Cybercrime as Time-to-Exploit Shrinks to Hours
    • Google Ads adds “Association” metric to Brand Lift Studies
    • TeamPCP Hits SAP Packages With ‘Mini Shai-Hulud’ Attack
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.