By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Iranian Infy APT Resurfaces with New Malware Activity After Years of Silence
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Iranian Infy APT Resurfaces with New Malware Activity After Years of Silence
Computing

Iranian Infy APT Resurfaces with New Malware Activity After Years of Silence

News Room
Last updated: 2025/12/21 at 12:32 AM
News Room Published 21 December 2025
Share
Iranian Infy APT Resurfaces with New Malware Activity After Years of Silence
SHARE

Dec 21, 2025Ravie LakshmananMalware / Cyber Espionage

Threat hunters have discerned new activity associated with an Iranian threat actor known as Infy (aka Prince of Persia), nearly five years after the hacking group was observed targeting victims in Sweden, the Netherlands, and Turkey.

“The scale of Prince of Persia’s activity is more significant than we originally anticipated,” Tomer Bar, vice president of security research at SafeBreach, said in a technical breakdown shared with The Hacker News. “This threat group is still active, relevant, and dangerous.”

Infy is one of the oldest advanced persistent threat (APT) actors in existence, with evidence of early activity dating all the way back to December 2004, according to a report released by Palo Alto Networks Unit 42 in May 2016 that was also authored by Bar, along with researcher Simon Conant.

The group has also managed to remain elusive, attracting little attention, unlike other Iranian groups such as Charming Kitten, MuddyWater, and OilRig. Attacks mounted by the group have prominently leveraged two strains of malware: a downloader and victim profiler named Foudre that delivers a second-stage implant called Tonnerre to extract data from high-value machines. It’s assessed that Foudre is distributed via phishing emails.

Cybersecurity

The latest findings from SafeBreach have uncovered a covert campaign that has targeted victims across Iran, Iraq, Turkey, India, and Canada, as well as Europe, using updated versions of Foudre (version 34) and Tonnerre (versions 12-18, 50). The latest version of Tonnerre was detected in September 2025.

The attack chains have also witnessed a shift from a macro-laced Microsoft Excel file to embedding an executable within such documents to install Foudre. Perhaps the most notable aspect of the threat actor’s modus operandi is the use of a domain generation algorithm (DGA) to make its command-and-control (C2) infrastructure more resilient.

In addition, Foudre and Tonnerre artifacts are known to validate if the C2 domain is authentic by downloading an RSA signature file, which the malware then decrypts using a public key and compares with a locally-stored validation file.

SafeBreach’s analysis of the C2 infrastructure has also uncovered a directory named “key” that’s used for C2 validation, along with other folders to store communication logs and the exfiltrated files.

“Every day, Foudre downloads a dedicated signature file encrypted with an RSA private key by the threat actor and then uses RSA verification with an embedded public key to verify that this domain is an approved domain,” Bar said. “The request’s format is:

‘https:///key/.sig.'”

Also present in the C2 server is a “download” directory whose current purpose is unknown. It is suspected that it’s used to download and upgrade to a new version.

The latest version of Tonnerre, on the other hand, includes a mechanism to contact a Telegram group (named “سرافراز,” meaning “proudly” in Persian) through the C2 server. The group has two members: a Telegram bot “@ttestro1bot” that’s likely used to issue commands and collect data, and a user with the handle “@ehsan8999100.”

While the use of the messaging app for C2 is not uncommon, what’s notable is that the information about the Telegram group is stored in a file named “tga.adr” within a directory called “t” in the C2 server. It’s worth noting that the download of the “tga.adr” file can only be triggered for a specific list of victim GUIDs.

Also discovered by the cybersecurity company are other older variants used in Foudre campaigns between 2017 and 2020 –

  • A version of Foudre camouflaged as Amaq News Finder to download and execute the malware
  • A new version of a trojan called MaxPinner that’s downloaded by Foudre version 24 DLL to spy on Telegram content
  • A variation of malware called Deep Freeze, similar to Amaq News Finder, is used to infect victims with Foudre
  • An unknown malware called Rugissement
Cybersecurity

“Despite the appearance of having gone dark in 2022, Prince of Persia threat actors have done quite the opposite,” SafeBreach said. “Our ongoing research campaign into this prolific and elusive group has highlighted critical details about their activities, C2 servers, and identified malware variants in the last three years.”

The disclosure comes as DomainTools’ continued analysis of Charming Kitten leaks has painted the picture of a hacking group that functions more like a government department, while running “espionage operations with clerical precision.” The threat actor has also been unmasked as behind the Moses Staff persona.

“APT 35, the same administrative machine that runs Tehran’s long-term credential-phishing operations, also ran the logistics that powered Moses Staff’s ransomware theatre,” the company said.

“The supposed hacktivists and the government cyber-unit share not only tooling and targets but also the same accounts-payable system. The propaganda arm and the espionage arm are two products of a single workflow: different “projects” under the same internal ticketing regime.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article 5 Best Netflix Games That You Have To Play – BGR 5 Best Netflix Games That You Have To Play – BGR
Next Article Cyata flags agentic AI supply-chain risk in Cursor remote code execution bug –  News Cyata flags agentic AI supply-chain risk in Cursor remote code execution bug – News
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Samsung's 43" Q8F TV dips to 7 today only, save up to ,000 across line
Samsung's 43" Q8F TV dips to $347 today only, save up to $5,000 across line
News
Prices Are Falling Like Snow With This Bose Noise-Cancelling Earbuds Deal — Now 28% Off
Prices Are Falling Like Snow With This Bose Noise-Cancelling Earbuds Deal — Now 28% Off
News
Hybrid work, the bet of the Alpha Generation
Hybrid work, the bet of the Alpha Generation
Mobile
Abortion resources, and sometimes misinformation, proliferate on ChatGPT
Abortion resources, and sometimes misinformation, proliferate on ChatGPT
News

You Might also Like

The Best Canva Fonts for Printable Products
Computing

The Best Canva Fonts for Printable Products

20 Min Read
How To Create Pinterest Templates That Actually Rank
Computing

How To Create Pinterest Templates That Actually Rank

18 Min Read
GotaTun Open-Source Rust WireGuard Implementation Announced By Mullvad
Computing

GotaTun Open-Source Rust WireGuard Implementation Announced By Mullvad

1 Min Read
Robust Mask-Guided Matting: Managing Noisy Inputs and Object Versatility | HackerNoon
Computing

Robust Mask-Guided Matting: Managing Noisy Inputs and Object Versatility | HackerNoon

3 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?