Cybersecurity researchers have documented a Python-based back door frame that deserves attention for its combination of sigil, persistence and spying range: known in reports as DEEP # DOOR, is installed from a dropper in batch that deactivates security controls and takes out a payload in time of execution Python embedded, which drastically reduces the classic engagement signals on disk.
The technique of embed the implant into the installation script and reconstruct it in memory is important because it turns the attack into a low-profile operation: less calls to external infrastructure and fewer artifacts that defenders can analyze after the fact. The Python component provides complete capabilities of Remote Access Trojan, including remote execution, key capture, clipboard monitoring, screenshots, access to webcam and microphone, and theft of browser credentials, SSH keys and credentials in public clouds such as AWS, GCP and Azure.

Another element that increases the risk is the use of public tunelization services (in this case it is communicated with bore.pub) for the control and control channel, which allows the operator to avoid the need for its own infrastructure and to have the malicious traffic mixed with legitimate traffic. At the same time, malware implements multiple persistence mechanisms - Start folder, Registry Run keys, programmed tasks and WMI subscriptions - and even a "watch dog" mechanism that recites artifacts if they are deleted, complicating the remediation.
DEEP # DOOR also incorporates a wide range of avoidance and anti-analysis techniques: detection of sandboxes and virtual machines, AMSI and ETW patching, NTDLL unhook, Microsoft Defender handling, SmartScreen bypass, PowerShell looms suppression, deleted from the command and track history of timstamps and records. These measures seek reduce forensic visibility and make it difficult to detect by traditional solutions and by incident response teams.
The implications for organizations and professionals are clear: these types of frameworks reinforce the trend towards "fileless" or script-based intrusions that exploit native system components and languages interpreted as Python, which forces the defenses to be adapted beyond simple file scanning. It is recommended to map these techniques against reference frameworks such as MITRE ATT & CK to prioritize effective detections and mitigation; this resource can be consulted at https: / / attack.mitre.org /.

In terms of concrete measures, it is essential to force mechanisms to limit the execution of unmanaged scripts and binary (AppLocker or Windows Defender Application Control), to enable and protect anti-tampering functions in endpoint products (for example, the Microsoft Defender Handling Protection available at Microsoft documentation), and set up a mandatory registration and telemetry for PowerShell and other interpreters to avoid the deletion of login. At the network level, controlling and blocking known tunelization services and restricting outflow by domain / port reduces the attacker's ability to establish C2.
If you suspect commitment, the response must assume persistent access and exfiltration of credentials: isolate the equipment, preserve volatile memory for analysis, review programmed tasks, Run keys, Start folder and any watchdog that recreates persistence; audit credentials repositories, SSH keys and cloud accounts and consider forced rotation of secrets and revocation of affected keys / credentials. In order to understand the scope of the intrusion and to tighten the position, it is appropriate to rely on IR specialists and EDR controls that detect hooking / unhooking techniques and telemetry handling.
DEEP # DOOR is a reminder that adversaries today prioritize evasion and operational resilience over exotic sophistication: the combination of osfussed scripts, regular interpreters and public routing services creates a practical and difficult threat to track. Effective defence requires applying classic principles - less privileges, network segmentation, visibility and execution control - but adapted to the modern picture of scripts-based threats, as well as integrating continuous monitoring and response supported by threat intelligence and good digital hygiene practices.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...