By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends
Computing

Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends

News Room
Last updated: 2026/02/05 at 7:00 AM
News Room Published 5 February 2026
Share
Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends
SHARE

Ravie LakshmananFeb 05, 2026Malware / Cyber Espionage

The elusive Iranian threat group known as Infy (aka Prince of Persia) has evolved its tactics as part of efforts to hide its tracks, even as it readied new command-and-control (C2) infrastructure coinciding with the end of the widespread internet blackout the regime imposed at the start of the month.

“The threat actor stopped maintaining its C2 servers on January 8 for the first time since we began monitoring their activities,” Tomer Bar, vice president of security research at SafeBreach, said in a report shared with The Hacker News.

“This was the same day a country-wide internet shutdown was imposed by Iranian authorities in response to recent protests, which likely suggests that even government-affiliated cyber units did not have the ability or motivation to carry out malicious activities within Iran.”

The cybersecurity company said it observed renewed activity on January 26, 2026, as the hacking crew set up new C2 servers, one day before the Iranian government relaxed internet restrictions within the country. The development is significant, not least because it offers concrete evidence that the adversary is state-sponsored and backed by Iran.

Infy is just one of many state-sponsored hacking groups operating out of Iran that conduct espionage, sabotage, and influence operations aligned with Tehran’s strategic interests. But it’s also one of the oldest and lesser-known groups that has managed to stay under the radar, not attracting attention and operating quietly since 2004 through “laser-focused” attacks aimed at individuals for intelligence gathering.

In a report published in December 2025, SafeBreach disclosed new tradecraft associated with the threat actor, including the use of updated versions of Foudre and Tonnerre, with the latter employing a Telegram bot likely for issuing commands and collecting data. The latest version of Tonnerre (version 50) has been codenamed Tornado.

Continue visibility into the threat actor’s operations between December 19, 2025, and February 3, 2026, has uncovered that the attackers have taken the step of replacing the C2 infrastructure for all versions of Foudre and Tonnerre, along with introducing Tornado version 51 that uses both HTTP and Telegram for C2.

“It uses two different methods to generate C2 domain names: first, a new DGA algorithm and then fixed names using blockchain data de-obfuscation,” Bar said. “This is a unique approach that we assume is being used to provide greater flexibility in registering C2 domain names without the need to update the Tornado version.”

There are also signs that Infy has weaponized a 1-day security flaw in WinRAR (either CVE-2025-8088 or CVE‑2025‑6218) to extract the Tornado payload on a compromised host. The change in attack vector is seen as a way to increase the success rate of its campaigns. The specially-crafted RAR archives were uploaded to the VirusTotal platform in mid-December 2025, suggesting the two countries may have been targeted.

Present within the RAR file is a self-extracting archive (SFX) that contains two files –

  • AuthFWSnapin.dll, the main Tornado version 51 DLL
  • reg7989.dll, an installer that first checks if Avast antivirus software is not installed, and if yes, creates a scheduled task for persistence and executes the Tornado DLL

Tornado establishes communication with the C2 server over HTTP to download and execute the main backdoor and harvest system information. If Telegram is chosen as the C2 method, Tornado uses the bot API to exfiltrate system data and receive more commands.

It’s worth noting that version 50 of the malware used a Telegram group named سرافراز (literally translates to “sarafraz,” meaning proudly) that featured the Telegram bot “@ttestro1bot” and a user with the handle “@ehsan8999100.” In the latest version, a different user called “@Ehsan66442” has been added in place of the latter.

“As before, the bot member of the Telegram group still doesn’t have permissions to read the group’s chat messages,” Bar said. “On December 21, the original user @ehsan8999100 was added to a new Telegram channel named Test that had three subscribers. The goal of this channel is still unknown, but we assume it is being used for command and control over the victim’s machines.”

SafeBreach said it managed to extract all messages within the private Telegram group, enabling access to all exfiltrated Foudre and Tonnerre files since February 16, 2025, including 118 files and 14 shared links containing encoded commands sent to Tonnerre by the threat actor. An analysis of this data has led to two crucial discoveries –

  • A malicious ZIP file that drops ZZ Stealer, which loads a custom variant of the StormKitty infostealer
  • A “very strong correlation” between the ZZ Stealer attack chain and a campaign targeting the Python Package Index (PyPI) repository with a package named “testfiwldsd21233s” that’s designed to drop a previous iteration of ZZ Stealer and exfiltrate the data through the Telegram bot API
  • A “weaker potential correlation” between Infy and Charming Kitten (aka Educated Manticore) owing to the use of ZIP and Windows Shortcut (LNK) files, and a PowerShell loader technique

“ZZ Stealer appears to be a first-stage malware (like Foudre) that first collects environmental data, screenshots, and exfiltrates all desktop files,” SafeBreach explained. “In addition, upon receiving the command ‘8==3’ from the C2 server, it will download and execute the second-stage malware also named by the threat actor as ‘8==3.'”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Google parent earnings beat projections amid plans to invest deeply in AI Google parent earnings beat projections amid plans to invest deeply in AI
Next Article Gemini 3 Brought Over 100 Million More Users to Google’s AI Tools Gemini 3 Brought Over 100 Million More Users to Google’s AI Tools
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Why Measuring Time is Not Enough: a Practical Roofline Model for ML Training | HackerNoon
Why Measuring Time is Not Enough: a Practical Roofline Model for ML Training | HackerNoon
Computing
If Your AI Prompts Stink, Try This Lifetime Subscription for Under
If Your AI Prompts Stink, Try This Lifetime Subscription for Under $65
News
Best Small Soundbars 2026: The perfect picks for smaller spaces
Best Small Soundbars 2026: The perfect picks for smaller spaces
Gadget
JLab’s new Bluetooth speaker doubles as supersized headphones
JLab’s new Bluetooth speaker doubles as supersized headphones
News

You Might also Like

Why Measuring Time is Not Enough: a Practical Roofline Model for ML Training | HackerNoon
Computing

Why Measuring Time is Not Enough: a Practical Roofline Model for ML Training | HackerNoon

24 Min Read
Poor State Management Breaks Everything (and Why Distributed Systems Do It Better)  | HackerNoon
Computing

Poor State Management Breaks Everything (and Why Distributed Systems Do It Better) | HackerNoon

16 Min Read
Why OpenAI’s Move Into Health Data Should Alarm Anyone Paying Attention | HackerNoon
Computing

Why OpenAI’s Move Into Health Data Should Alarm Anyone Paying Attention | HackerNoon

7 Min Read
Infrastructure, not influence, defines creator earnings in Africa
Computing

Infrastructure, not influence, defines creator earnings in Africa

4 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?