Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Python Malware DEEP#DOOR Targets Windows Systems

New Python Malware DEEP#DOOR Targets Windows Systems

Posted on May 1, 2026 By CWS

A newly discovered Python-based malware, DEEP#DOOR, poses a significant threat to Windows users by integrating a comprehensive backdoor with an efficient credential-stealing mechanism.

This malware operates stealthily, deeply embedding itself into compromised systems to gather sensitive information from various sources simultaneously.

How DEEP#DOOR Infiltrates Systems

DEEP#DOOR infiltrates target systems through an obfuscated batch script commonly named “finallyJob.bat,” which serves as the initial trigger for execution.

Unlike other malware that depend on additional payloads, DEEP#DOOR carries the entire Python backdoor within the batch file, minimizing detection by network security tools.

The infection starts when a user unknowingly executes what seems to be a harmless batch file on a Windows device.

Malware Operations and Evasion Tactics

Securonix Threat Research analysts have dissected DEEP#DOOR, identifying it as a batch loader aimed at deploying a persistent backdoor and credential-stealing implant on Windows systems.

The attack sequence begins with the execution of a batch script that dynamically extracts and executes an embedded Python Remote Access Tool payload, establishing persistence through various system modifications.

Once activated, the malware communicates with attacker-managed infrastructure via a TCP tunneling service, granting remote operators extensive control, including command execution and surveillance capabilities.

Credential Theft and Security Implications

DEEP#DOOR’s credential-stealing capability is particularly damaging. It targets browser-stored passwords, cloud authentication tokens, sensitive credentials, and SSH keys, facilitating unauthorized access across impacted networks.

The malware uses specific functions to extract data from browser databases and configuration files, and it retrieves credentials from the Windows Credential Manager.

This broad-spectrum data collection can expose an organization’s entire access framework, allowing attackers easy reinfiltration even after initial malware removal.

Preventive Measures Against DEEP#DOOR

Organizations should avoid executing unknown batch files, particularly those received via email or shared links. Monitoring unusual command-line activity and auditing system configurations are essential preventive measures.

Regularly rotating cloud tokens and SSH keys, enabling Windows Defender tamper protection, and deploying network monitoring tools are recommended to mitigate the risk of DEEP#DOOR.

Additionally, behavioral analytics and anomaly detection should be prioritized over traditional antivirus solutions, given the malware’s reliance on obfuscated scripting.

Stay updated with more cybersecurity news by following us on Google News, LinkedIn, and X.

Cyber Security News Tags:backdoor malware, cloud security, credential theft, cyber threats, Cybersecurity, data protection, DeepDoor, Hacking, internet security, malware detection, network security, Python malware, remote access tool, Securonix, Windows security

Post navigation

Previous Post: US Experts Jailed for Ransomware Conspiracy Involvement
Next Post: Cyber Experts Sentenced for BlackCat Ransomware Crimes

Related Posts

Hackers Can Leverage Delivery Receipts on WhatsApp and Signal to Extract User Private Information Hackers Can Leverage Delivery Receipts on WhatsApp and Signal to Extract User Private Information Cyber Security News
Fortinet FortiManager Flaw Risks Unauthorized Command Execution Fortinet FortiManager Flaw Risks Unauthorized Command Execution Cyber Security News
Critical Vulnerability Exposes 50,000 WordPress Sites Critical Vulnerability Exposes 50,000 WordPress Sites Cyber Security News
SetupHijack Tool Exploits Race Conditions and Insecure File Handling in Windows Installer Processes SetupHijack Tool Exploits Race Conditions and Insecure File Handling in Windows Installer Processes Cyber Security News
20 Best Kubernetes Monitoring Tools in 2025 20 Best Kubernetes Monitoring Tools in 2025 Cyber Security News
Chinese Cybersecurity Firm Data Breach Exposes State-Sponsored Hackers Cyber Weapons and Target List Chinese Cybersecurity Firm Data Breach Exposes State-Sponsored Hackers Cyber Weapons and Target List Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Google Revamps Bug Bounties as AI Transforms Security
  • New Python-Based Malware Deep#Door Targets Windows
  • Cyber Experts Sentenced for BlackCat Ransomware Crimes
  • New Python Malware DEEP#DOOR Targets Windows Systems
  • US Experts Jailed for Ransomware Conspiracy Involvement

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Google Revamps Bug Bounties as AI Transforms Security
  • New Python-Based Malware Deep#Door Targets Windows
  • Cyber Experts Sentenced for BlackCat Ransomware Crimes
  • New Python Malware DEEP#DOOR Targets Windows Systems
  • US Experts Jailed for Ransomware Conspiracy Involvement

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark