Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Python-Based Malware Deep#Door Targets Windows

New Python-Based Malware Deep#Door Targets Windows

Posted on May 1, 2026 By CWS

A recently uncovered Python-based backdoor, known as Deep#Door, presents a significant threat to Windows computers by enabling remote command execution and surveillance capabilities, according to a report from Securonix.

Infection Process and Initial Steps

The initial stage of the Deep#Door malware involves executing a batch script that effectively disables critical security measures on the system. These include SmartScreen, firewall logging, Defender tamper protection, and the Antimalware Scan Interface. This step ensures that the system’s defenses are weakened, allowing the malware to operate more freely.

Following this, the malware deploys an embedded Python payload and establishes a robust system of persistence. It achieves this by altering Run registries, generating scheduled tasks, and positioning scripts within the Startup folder, ensuring its continued operation even after system restarts.

Stealth and Evasion Techniques

To avoid detection, the malware developer has embedded the payload directly into the batch script, simplifying the delivery process while evading network-based detection mechanisms. Furthermore, the directory used to deploy the Python backdoor is designed to resemble legitimate Windows services, making the malware blend seamlessly with normal system activities.

Once executed, Deep#Door performs a series of validation checks to verify that it is not operating within virtual machines, sandboxes, or other analysis environments. It does this by inspecting for debuggers, specific virtualization indicators, and particular behavioral and environmental characteristics.

Capabilities and Potential Impact

When active, Deep#Door enables a range of malicious activities, including shell command execution, file manipulation, system and network reconnaissance, and surveillance operations like keylogging and screenshot capturing. It can also access microphones and webcams, as well as harvest credentials and SSH keys.

In addition to espionage, the malware is capable of destructive actions, such as overwriting the Master Boot Record, causing system crashes, and depleting system resources by spawning numerous processes. As noted by Securonix, Deep#Door employs a complex set of evasion techniques to bypass security controls and evade detection, ensuring it remains concealed throughout its lifecycle.

The malware also dynamically generates various communication ports to connect with its command-and-control infrastructure, even if certain ports are blocked. It uses public tunneling for covert and resilient communications, which blend with legitimate traffic, further complicating detection efforts.

Conclusion and Future Outlook

Deep#Door’s multi-layer persistence, advanced evasion techniques, and in-memory stealth capabilities make it a formidable threat to Windows systems, likely designed for prolonged espionage activities. Continued vigilance and enhanced cybersecurity measures are essential in combating such sophisticated threats. Organizations should prioritize updating security protocols and deploying comprehensive monitoring tools to detect and neutralize these persistent threats effectively.

Security Week News Tags:Backdoor, covert communication, Cybersecurity, DeepDoor, defense evasion, Espionage, Malware, network reconnaissance, persistent threat, Python-based threat, Securonix report, system disruption, Windows security

Post navigation

Previous Post: Cyber Experts Sentenced for BlackCat Ransomware Crimes

Related Posts

Chrome Sandbox Escape Earns Researcher 0,000 Chrome Sandbox Escape Earns Researcher $250,000 Security Week News
2 Venezuelans Convicted in US for Using Malware to Hack ATMs 2 Venezuelans Convicted in US for Using Malware to Hack ATMs Security Week News
Customer Service Firm 5CA Denies Responsibility for Discord Data Breach Customer Service Firm 5CA Denies Responsibility for Discord Data Breach Security Week News
Endpoint Security Firm Remedio Raises  Million in First Funding Round Endpoint Security Firm Remedio Raises $65 Million in First Funding Round Security Week News
Critical Linux Flaw ‘Pack2TheRoot’ Grants Root Access Critical Linux Flaw ‘Pack2TheRoot’ Grants Root Access Security Week News
Russian Hacker Pleads Guilty Over Phobos Ransomware Russian Hacker Pleads Guilty Over Phobos Ransomware Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Python-Based Malware Deep#Door Targets Windows
  • Cyber Experts Sentenced for BlackCat Ransomware Crimes
  • New Python Malware DEEP#DOOR Targets Windows Systems
  • US Experts Jailed for Ransomware Conspiracy Involvement
  • Overcoming Key Sales Obstacles in Cybersecurity for MSPs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Python-Based Malware Deep#Door Targets Windows
  • Cyber Experts Sentenced for BlackCat Ransomware Crimes
  • New Python Malware DEEP#DOOR Targets Windows Systems
  • US Experts Jailed for Ransomware Conspiracy Involvement
  • Overcoming Key Sales Obstacles in Cybersecurity for MSPs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark