<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>cybercrime.club</title><link>https://cybercrime.club/tags/tradecraft/</link><description>Infrastructure security news for people who build infrastructure.</description><generator>Hugo -- gohugo.io</generator><language>en-us</language><lastBuildDate>Sun, 03 May 2026 23:11:52 -0400</lastBuildDate><atom:link href="https://cybercrime.club/tags/tradecraft/" rel="self" type="application/rss+xml"/><item><title>DEEP#DOOR: Python Backdoor Hides C2 Behind bore.pub Tunneling Service to Steal Cloud and Browser Credentials</title><link>https://cybercrime.club/posts/deepdoor-python-backdoor-borepub-tunneling-c2-credential-stealer/</link><pubDate>Sun, 03 May 2026 23:11:52 -0400</pubDate><guid>https://cybercrime.club/posts/deepdoor-python-backdoor-borepub-tunneling-c2-credential-stealer/</guid><description>Securonix details DEEP#DOOR, a Python backdoor that uses the public bore.pub TCP tunneling service for C2, disables Defender/SmartScreen via batch loader, and harvests browser-stored cloud credentials from compromised hosts.</description><category>malware</category></item></channel></rss>