CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◉ Threat Intelligence

Dormant Iran APT is Still Alive, Spying on Dissidents - Dark Reading

Dark Reading Archived Mar 17, 2026 ✓ Full text saved

Dormant Iran APT is Still Alive, Spying on Dissidents Dark Reading

Full text archived locally
✦ AI Summary · Claude Sonnet


    THREAT INTELLIGENCE CYBERATTACKS & DATA BREACHES CYBER RISK VULNERABILITIES & THREATS NEWS Breaking cybersecurity news, news analysis, commentary, and other content from around the world, with an initial focus on the Middle East & Africa and the Asia Pacific Dormant Iran APT is Still Alive, Spying on Dissidents "Prince of Persia" has rewritten the rules of persistence with advanced operational security and cryptographic communication with its command-and-control server. Nate Nelson,Contributing Writer December 18, 2025 5 Min Read SOURCE: ARCADEIMAGES VIA ALAMY STOCK PHOTO For the first time in more than three years, researchers have new information about Iran's oldest state-level threat group. "Prince of Persia" — also known as "Infy" — isn't just the oldest known Iranian advanced persistent threat (APT). It's one of the oldest APTs in existence, rivalled only by groups like Turla and APT1. A decade ago, when it was first described in cybersecurity literature, researchers found evidence that its activity dated back to December 2004. So why can't you remember the name? In the decade since, while its louder peers OilRig and MuddyWater have been running rampant, Prince of Persia has been conspicuously silent. In 2018, Dark Reading was already describing it as "out of circulation," the last major reporting on it occurred in 2021, and researchers haven't heard a peep from it since 2022. Though it may have seemed like inactivity at the time, it turns out that Prince of Persia went nowhere at all. In a new report, SafeBreach has revealed not only that the group is still around, but that it's been active this whole time. It's been spying on Iranian citizens, mostly, plus individuals across Iraq, Turkey, India, Europe, and Canada, using upgraded versions of its long-known malware families. Related:INC Ransomware Group Holds Healthcare Hostage in Oceania "It is very unique to have fully operational cyberattack infrastructure working for nearly 20 years — it's probably the longest publicly known threat actor who has operated with the same arsenal," says Tomer Bar, the author of the report. "The threat actor has achieved this due to very strong persistence and by using advanced operational security techniques and cryptographic concepts for communication with a [command and control (C2)] server that I have never seen in my 20-plus years of experience." Prince of Persia's Stealthy C2 Prince of Persia has always worked with two primary, custom tools: "Foudre," and "Tonnerre," French for lightning and thunder, respectively. Foudre is a lightweight, first-stage tool that sends basic system information to the attackers' C2 infrastructure. Its new version is delivered as an executable inside of a Microsoft Excel file, which doesn't register at all with any antivirus engine in VirusTotal (VT). The goal of Foudre looks like triage: identifying whether a victim is worth pursuing more deeply. In August 2022, for instance, the researchers saw that after infecting them with Foudre, Prince of Persia separated some of its victims for further espionage, and in the other cases, sent a command for Foudre to self-destruct. By contrast, Tonnerre is the heavier program used for more involved espionage. Related:Chinese Cyber Threat Lurks In Critical Asian Sectors for Years If Foudre and Tonnerre are notable for anything, it's how diligently they protect their C2 channels. For example, the new Tonnerre can also use the Telegram application programming interface (API) to send commands and retrieve victims' data from the comfort of a private Telegram group. On its own, using the private messaging app for C2 isn't so unique — plenty of threat actors do it, by embedding a Telegram API key in their backdoors' code. Prince of Persia stands out for how it doesn't embed any key inside Tonnerre, so there's no relic left behind for researchers to find and use against it. Instead, Bar found that "it pulls the key from the [Tonnerre] C2 only for specific victims, which is significantly more stealthy. It's not [utilized against] all victims in an effort to keep the malware activity and the Telegram group hidden." Even more impressive, perhaps, is how Foudre protects its C2 infrastructure, using RSA signature verification. Bar explains that "the malware code includes a public key and generates 100 domain names of C2 servers each week using a domain generation algorithm (DGA). The malware connects to the first one and downloads a signature file, which is encrypted with a private key by the threat actor. It verifies using RSA verification that the public key is able to decrypt the signature file. If the verification is not successful, the malware won't trust the C2 and continues to the second one on the list," Bar explains. Related:LatAm Now Faces 2x More Cyberattacks Than US It might sound boring, but it's remarkably practical. Let's say, for example, that a cybersecurity researcher somehow figured out how Foudre's DGA works — a feat Bar himself achieved, by recognizing some of its pseudo-random patterns. Even if a researcher like Bar knew what domains the malware was going to communicate with, if he tried to preemptively take control of those domains, "it won’t help, since the malware won't trust this C2 server, and no takedown or victim analysis can be made. This is only possible if you have the private key, which is saved only in Iran. In this way, no one is able to influence the campaign." As a bonus, he adds that exfiltrated files also demand the correct RSA private key, preventing him from analyzing the trove he's been sitting on. Bar marvels that the particular way Foudre uses RSA verification "is something that is common in [non-malicious] domains, but I have never seen it used by a malware — even in campaigns that were attributed to Western nation-state actors. I asked other experienced researchers, and they also said they have never seen it." Iranian Government Support Whether it's DGAs, Telegram, or cryptographic C2 verification, Prince of Persia's efforts to expand beyond traditional, potentially vulnerable command-and-control are best read in the context of its strange history. Palo Alto Networks' Unit 42 was the first to spotlight Prince of Persia's existence, in 2016. Soon after, with intimate knowledge of its infrastructure, the cybersecurity firm doubled down by sinkholing its servers. It no longer had control over its victims, and the researchers gained unprecedented access to its inner workings. In the end, the threat actor was bailed out by a remarkable and largely unprecedented deus ex machina. The state-owned Telecommunication Company of Iran stepped in to help, blocking traffic to Unit 42's sinkholes and redirecting the traffic yet again for the attackers' benefit. "The threat actor learned its lesson well from the 2016 campaign takedown," Bar says. "And it came back with a very secure architecture revealed in 2017 that has been working without any takedown since then." Read more about: DR Global Middle East & Africa About the Author Nate Nelson Contributing Writer Nate Nelson is a journalist and scriptwriter. He writes for "Darknet Diaries" — the most popular podcast in cybersecurity — and co-created the former Top 20 tech podcast "Malicious Life." Before joining Dark Reading, he was a reporter at Threatpost. More Insights Industry Reports Frost Radar™: Non-human Identity Solutions 2026 CISO AI Risk Report The ROI of AI in Security Cybersecurity Forecast 2026 ThreatLabz 2025 Ransomware Report Access More Research Webinars Building a Robust SOC in a Post-AI World Retail Security: Protecting Customer Data and Payment Systems Rethinking SSE: When Unified SASE Delivers the Flexibility Enterprises Need Securing Remote and Hybrid Work Forecast: Beyond the VPN AI-Powered Threat Detection: Beyond Traditional Security Models More Webinars You May Also Like THREAT INTELLIGENCE Red Hat Hackers Team Up With Scattered Lapsus$ Hunters by Rob Wright OCT 08, 2025 THREAT INTELLIGENCE 45 New Domains Linked to Salt Typhoon, UNC4841 by Elizabeth Montalbano, Contributing Writer SEP 08, 2025 CYBERATTACKS & DATA BREACHES DeepSeek Breach Opens Floodgates to Dark Web by Emma Zaballos APR 22, 2025 THREAT INTELLIGENCE Chinese APTs Exploit EDR 'Visibility Gap' for Cyber Espionage by Becky Bracken, Senior Editor, Dark Reading APR 14, 2025 Editor's Choice CYBERSECURITY OPERATIONS Why Stryker's Outage Is a Disaster Recovery Wake-Up Call byJai Vijayan MAR 12, 2026 5 MIN READ APPLICATION SECURITY Microsoft Patches 83 CVEs in March Update byJai Vijayan MAR 11, 2026 4 MIN READ THREAT INTELLIGENCE Commercial Spyware Opponents Fear US Policy Shifting byRob Wright MAR 12, 2026 9 MIN READ Want more Dark Reading stories in your Google search results? 2026 Security Trends & Outlooks THREAT INTELLIGENCE Cybersecurity Predictions for 2026: Navigating the Future of Digital Threats JAN 2, 2026 CYBER RISK Navigating Privacy and Cybersecurity Laws in 2026 Will Prove Difficult JAN 12, 2026 ENDPOINT SECURITY CISOs Face a Tighter Insurance Market in 2026 JAN 5, 2026 THREAT INTELLIGENCE 2026: The Year Agentic AI Becomes the Attack-Surface Poster Child JAN 30, 2026 Download the Collection Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox. SUBSCRIBE Webinars Building a Robust SOC in a Post-AI World THURS, MARCH 19, 2026 AT 1PM EST Retail Security: Protecting Customer Data and Payment Systems THURS, APRIL 2, 2026 AT 1PM EST Rethinking SSE: When Unified SASE Delivers the Flexibility Enterprises Need WED, APRIL 1, 2026 AT 1PM EST Securing Remote and Hybrid Work Forecast: Beyond the VPN TUES, MARCH 10, 2026 AT 1PM EST AI-Powered Threat Detection: Beyond Traditional Security Models WED, MARCH 25, 2026 AT 1PM EST More Webinars White Papers Autonomous Pentesting at Machine Speed, Without False Positives Fixing Organizations' Identity Security Posture Best practices for incident response planning Industry Report: AI, SOC, and Modernizing Cybersecurity The Threat Prevention Buyer's Guide: Find the best AI-driven threat protection solution to stop file-based attacks. Explore More White Papers GISEC GLOBAL 2026 GISEC GLOBAL is the most influential and the largest cybersecurity gathering in the Middle East & Africa, uniting global CISOs, government leaders, technology buyers, and ethical hackers for three power-packed days of innovation, strategy, and live cyber drills. 📌 BOOK YOUR SPACE
    💬 Team Notes
    Article Info
    Source
    Dark Reading
    Category
    ◉ Threat Intelligence
    Published
    Archived
    Mar 17, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗