New Python Backdoor Uses Tunneling Service to Steal Browser and Cloud Credentials

New Python Backdoor Uses Tunneling Service to Steal Browser and Cloud Credentials

The Hacker News
The Hacker NewsApr 30, 2026

Why It Matters

The framework demonstrates how threat actors can leverage legitimate tunneling services and native scripting languages to bypass traditional defenses, raising the risk of credential theft and long‑term espionage in enterprise environments.

Key Takeaways

  • DEEP#DOOR embeds Python payload inside batch dropper for fileless execution
  • Uses bore.pub tunneling service to hide C2 traffic and avoid infrastructure
  • Harvests browser, OS, and cloud credentials across Chrome, Firefox, AWS, Azure
  • Implements multi‑layer evasion: AMSI patching, Defender tampering, VM detection
  • Persistence via startup scripts, registry Run keys, scheduled tasks, watchdog

Pulse Analysis

The emergence of Python‑driven, fileless RATs marks a shift in adversary tactics, as attackers favor interpreted languages that blend with legitimate system processes. By embedding the malicious script within a seemingly innocuous batch file, DEEP#DOOR sidesteps the need for external payload downloads, reducing its forensic footprint and complicating traditional signature‑based detection. This approach mirrors a broader trend where threat actors exploit native Windows utilities and scripting environments to achieve stealthy persistence and rapid deployment across varied targets.

A distinctive feature of DEEP#DOOR is its reliance on bore.pub, a public Rust‑based tunneling platform, for command‑and‑control. Leveraging a legitimate service eliminates the overhead of maintaining dedicated C2 servers and helps the malicious traffic blend with normal outbound connections, evading network‑based alerts. Once active, the implant conducts extensive reconnaissance, captures keystrokes, screenshots, webcam feeds, and exfiltrates credentials stored in Chrome, Firefox, Windows Credential Manager, and cloud providers such as Amazon Web Services, Google Cloud, and Microsoft Azure. Coupled with sophisticated evasion—AMSI and ETW patching, NTDLL unhooking, and Defender tampering—the malware can remain undetected for extended periods, facilitating espionage and lateral movement.

For defenders, DEEP#DOOR underscores the necessity of behavior‑centric monitoring and zero‑trust principles. Traditional endpoint signatures may miss the embedded Python code, so organizations should prioritize anomaly detection on process creation, network tunneling usage, and unexpected modifications to persistence locations. Hardening AMSI, enforcing strict application control, and monitoring outbound connections to uncommon domains like bore.pub can reduce exposure. As attackers continue to weaponize legitimate services and scripting languages, a layered security strategy that combines endpoint telemetry, network analytics, and rapid incident response becomes essential to mitigate the evolving threat landscape.

New Python Backdoor Uses Tunneling Service to Steal Browser and Cloud Credentials

Comments

Want to join the conversation?

Loading comments...