New Deep#Door RAT uses stealth and persistence to target Windows


New Deep#Door RAT uses stealth and persistence to target Windows

Pierluigi Paganini
May 02, 2026

Deep#Door hides a Python RAT inside a batch file, kills Windows defenses, survives via multiple persistence methods, and exfiltrates data through a public TCP tunnel.

Security researchers at Securonix uncovered a sophisticated malware campaign called Deep#Door. Threat actors employed a stealthy Python-based backdoor that uses a surprisingly simple delivery method to achieve deep, persistent access on Windows systems. What makes the campaign stand out is not just what it can do, but how cleverly it avoids being caught doing it.

“Unlike traditional malware loaders that rely on external payload downloads, Deep#Door embeds its Python implant directly inside the dropper script and reconstructs it in-memory and on disk during execution.” reads the report published by Securonix. “The implant then establishes communication with attacker infrastructure hosted on bore[.]pub, a publicly available TCP tunneling service, enabling stealthy remote access without exposing dedicated C2 servers.”

The attacK chain starts with a single batch file: install_obf.bat. When executed, this script reads itself, literally parsing its own contents to extract a hidden Python payload embedded directly inside the script. The extracted file, svc.py, is then written quietly to %LOCALAPPDATA%\SystemServices\, a folder name deliberately chosen to blend in with legitimate Windows components.

This self-referential technique is a key reason the malware is hard to catch early. There are no suspicious downloads, no external URLs being contacted at the staging phase, and no compiled executables to flag. It’s all happening within a script that looks, at first glance, like a routine maintenance tool.

Before doing anything else, the loader systematically dismantles the host’s defenses: Windows Defender is disabled, PowerShell logging is turned off, firewall logging is suppressed, and SmartScreen is bypassed. By the time the Python implant activates, the system is effectively blind.

“The malware incorporates numerous advanced anti-analysis and defense evasion mechanisms including sandbox detection, AMSI and ETW patching, ntdll unhooking, Windows Defender tampering, command-line wiping, timestamp stomping, and log clearing.” continues the report.

Deep#Door doesn’t rely on a single method to survive reboots. It plants itself across multiple locations simultaneously, the Windows Startup folder, registry Run keys, scheduled tasks, and even WMI event subscriptions. On top of that, a background watchdog thread constantly monitors these persistence points and automatically restores any that get deleted.

In practice, this means that simply removing one artifact doesn’t clean the infection. All mechanisms need to be addressed at the same time, which makes manual remediation unusually difficult.

Before fully activating, the malware runs a series of checks to determine whether it’s running on a real machine or inside an analysis environment. It looks for debuggers, virtual machine signatures, sandbox indicators like generic usernames or low system resources, and even security research tools like Wireshark or IDA Pro.

If anything looks suspicious, the malware holds back. This helps it evade automated scanning platforms, which typically analyze samples in virtual or sandboxed environments.

For command-and-control, Deep#Door takes an unconventional approach. Instead of connecting to a dedicated attacker server, which would be easier to detect and block, it uses bore.pub, a legitimate public TCP tunneling service.

The malware scans a dynamic range of ports to find an active tunnel, authenticates using a challenge-response mechanism, and establishes a covert channel that looks like ordinary tunneling traffic.

“Instead of relying on a traditional C2 server, the malware leverages bore.pub,” states the cybersecurity firm, “a public TCP tunneling service:

  • Allows attackers to expose internal services to the internet without opening firewall ports
  • Eliminates the need for attacker-owned infrastructure
  • Blends malicious traffic with legitimate tunneling usage

This significantly complicates attribution and network-based detection, as traffic appears to connect to a legitimate service.”

This makes attribution harder and network-based detection less reliable, since the traffic blends with legitimate use of the same service.

Once active, the implant is a fully featured remote access tool. Operators can execute shell commands, capture screenshots, record audio, log keystrokes, access the webcam, harvest stored passwords from browsers, steal SSH keys and cloud credentials, and scan internal networks. At the destructive end, it can also overwrite the Master Boot Record or force a system crash, these capabilities that suggest it could shift from espionage to sabotage if needed.

Securonix recommends focusing detection efforts on behavioral signals rather than file signatures: PowerShell commands that reference %~f0 (a self-file marker), file writes to SystemServices directories, modifications to Defender settings or event log services, and outbound connections to bore.pub across ports 41234–41243.

“Deep#Door highlights the continued evolution of threat actors toward fileless, script-driven intrusion frameworks that rely heavily on native system components and interpreted languages like Python. By embedding the payload directly within the dropper and extracting it at runtime, the malware significantly reduces external dependencies and limits traditional detection opportunities.” concludes the report.

“The use of public tunneling infrastructure (bore[.]pub) further eliminates the need for dedicated attacker-controlled servers, enabling covert and resilient command-and-control communications that blend with legitimate traffic patterns.”

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, Deep#Door)







Source link

Leave a Reply

Subscribe to Our Newsletter

Get our latest articles delivered straight to your inbox. No spam, we promise.

Recent Reviews


Pool maintenance has long existed in a fragmented state, where different tools solve different problems but rarely work together in a meaningful way. Cleaning the floor, clearing the surface, and maintaining water quality have traditionally required separate interventions, often at different times. What has been missing is a system that not only automates these tasks but also connects them through intelligence.

The Aiper Experts Duo introduces that shift by combining two purpose-built robots, the Scuba V3 and the EcoSurfer S2, into a single, coordinated ecosystem. Instead of operating in isolation, these devices function as a unified system that covers every layer of the pool, from the floor and walls to the waterline and surface.

At the center of this system is Cognitive AI

This moves beyond pre-programmed cleaning cycles and into continuous optimization. The technology works as an adaptive loop that enables the robots to interpret their surroundings, make decisions in real time, and refine their behavior based on past performance. By factoring in variables such as pool size, weather conditions, and cleaning history, the system evolves with use, delivering a level of precision that static automation cannot match. Within the Aiper Experts Duo, these AI-driven capabilities are associated with the Scuba V3, where features such as adaptive cleaning modes, real-time debris detection, and intelligent path planning support navigation and cleaning across the pool’s floor, walls, and waterline.

This intelligence becomes most apparent in how the system manages time and consistency. The EcoSurfer S2 operates using SolarSeeker™ technology, allowing it to maintain surface cleaning throughout the day while intelligently seeking sunlight to sustain its energy levels. At the same time, the Scuba V3 uses AI Navium™ Mode to generate weekly cleaning plans automatically, removing the need for manual scheduling and ensuring the pool remains consistently maintained.

Performance is not just about automation but about efficiency

The Scuba V3’s AI Patrol Cleaning identifies visible debris in real time and adjusts its route accordingly, delivering up to 10× faster cleaning compared to traditional cleaners that rely on standard S-shape floor patterns.  By responding dynamically to what it detects, the system ensures that cleaning is both targeted and time-efficient. This is supported by VisionPath™ technology, which integrates AI vision with advanced sensors to map efficient paths, reduce overlap, and navigate obstacles without unnecessary repetition.

This is supported by VisionPath, which combines an initial AI-led cleaning phase that focuses on visible debris with a structured grid-pattern cleaning of the entire pool floor. The result is a balanced approach that brings together speed and consistency, ensuring that immediate cleaning needs are addressed while still delivering complete and reliable coverage.

The system’s effectiveness also comes from its ability to deliver complete coverage without compromise. While the Scuba V3 handles deep cleaning across the pool’s structure, the EcoSurfer S2 maintains the surface and supports water quality through its adjustable chlorine tablet chamber. Together, they create a continuous maintenance cycle that addresses both visible debris and underlying water balance. Features such as MicroMesh™ filtration capture even ultra-fine particles, while DebrisGuard™ ensures that collected debris remains contained.

Reliability is built into the design through both engineering and architecture

By distributing tasks across two specialized devices, the system reduces wear and improves long-term durability. Combined with solar-assisted operation and energy-efficient path planning, this approach ensures consistent performance while significantly reducing the need for hands-on maintenance, including frequent charging or manual intervention.

For homeowners increasingly investing in connected, more carefree and reliable living environments, this represents a more complete approach to outdoor automation. The Aiper Experts Duo does not simply reduce the effort required to maintain a pool; it removes the need to think about it altogether, allowing maintenance to happen seamlessly in the background.

To explore the system further, visit the official product page:
https://aiper.store/us/products/aiper-experts-duo

As part of the ongoing spring promotion, customers can access savings of up to 25 percent,  available through April 10. In addition, an extra 5 percent discount is available at checkout using the code AiperExpertsDuoXDT, valid through April 25, making this a timely opportunity to transition to a more intelligent and fully integrated pool care system.



Source link