top of page

Prince of Persia: Iranian APT Resurfaces with Sophisticated Espionage Malware

ree

Introduction / Background


The Iranian advanced persistent threat (APT) group known as Prince of Persia, also tracked as Infy, has re-emerged after several years of perceived dormancy. Active since at least 2004, Prince of Persia is one of Iran’s earliest state-aligned cyber units, focused on long-term intelligence collection rather than financial gain. Although disruption efforts around 2021–2022 suggested dormancy, recent reporting confirms that the group quietly continued operations while modernizing its malware toolkit and command-and-control (C2) infrastructure.


The current campaign features upgraded versions of its long-standing malware families, Foudre and Tonnerre, along with advanced operational security measures designed to resist sinkholing, takedowns, and third-party interference. Targets include Iranian dissidents, politically sensitive individuals, and select foreign entities across the Middle East, Europe, Asia, and North America. The re-emergence of Prince of Persia underscores a broader trend among mature APT actors: retreat from public visibility during disruption periods, then returning with refined tradecraft to sustain long-term intelligence operations.

Attack Details


Prince of Persia continues to rely on updated variants of its proprietary malware rather than introducing entirely new families. Foudre serves as the primary backdoor, enabling persistent access, command execution, file manipulation, and data exfiltration, while Tonnerre provides secondary functionality, including system profiling and follow-on commands. Recent updates reduce forensic artifacts on disk, improve execution stability, and allow modular tasking from the C2 server. These updates emphasize reliability and stealth, highlighting a mature espionage operation rather than experimental malware development.


The C2 infrastructure is decentralized and resilient, using rotating domains and multiple hosting providers. The group actively monitors its own servers for interference; suspicious traffic patterns trigger immediate abandonment and replacement of C2 servers. Communications between infected hosts and C2 servers are low-noise, minimizing detection risks.


Targeting remains precise and selective, focusing on Iranian dissidents, politically sensitive individuals, and foreign entities of interest. Malware is deployed surgically and maintained quietly over long periods, allowing operators to observe victim behavior before any further action. This deliberate, patient approach reinforces the classification of Prince of Persia as a state-aligned espionage actor rather than a financially motivated group.


Impact


The campaign provides Prince of Persia operators with persistent, long-term access to compromised systems, enabling ongoing intelligence collection that may span months or even years. The precise targeting, combined with modular malware and low-noise C2 communications, significantly lowers detection risk.


The impact on affected organizations and individuals can be summarized as follows:

  • Continuous Surveillance: Operators can monitor activity, communications, and behaviors over extended periods.

  • Strategic Threats: Collected intelligence can be used to influence political narratives, monitor opposition activities, or support state-level strategic decisions.

  • Operational Discretion: Low footprint and limited malware distribution reduce the likelihood of mass detection by conventional security tools.

  • Potential Escalation: While current activity is espionage-focused, the established foothold could facilitate future operations such as credential theft, data exfiltration, or broader system compromise if priorities change.


Overall, the campaign demonstrates a sophisticated, patient approach that prioritizes stealth, precision, and long-term access over immediate exploitation or disruption.


Recommendation

Organizations and individuals at risk should focus on strengthening endpoint and network defenses, hardening access controls, and maintaining strong operational security practices. Advanced endpoint detection and response (EDR) solutions can help identify anomalous behaviors, hidden processes, and covert persistence mechanisms. Multi-factor authentication (MFA) and least-privilege principles are critical to limiting potential exposure.


Network traffic should be continuously monitored for unusual or low-bandwidth outbound connections that may indicate covert C2 communications, and threat intelligence feeds should be leveraged to track known Prince of Persia indicators. User awareness training should emphasize spear-phishing, social engineering, and safe handling of sensitive information. Incident response playbooks should be regularly tested through APT-specific exercises to ensure readiness for rapid containment and remediation.


Conclusion

Prince of Persia’s resurgence demonstrates that mature APT actors can maintain long-term intelligence operations with minimal visibility, leveraging stealth, precise targeting, and resilient infrastructure. The key takeaway is clear: organizations must focus not only on detection but also on prevention, resilience, and continuous monitoring. Protecting endpoints, hardening access controls, integrating threat intelligence, and training users to recognize targeted threats are essential steps to reduce exposure. By prioritizing these defenses, organizations can safeguard sensitive data, maintain operational security, and mitigate the long-term impact of espionage campaigns like Prince of Persia.


Reference

 
 
 

Comments


Address: Office B322, Level 3, Spaces, Platinum Sentral, KL Sentral, 50470 Kuala Lumpur.

  • Facebook
  • Instagram
  • LinkedIn

Hotline+60327224705

© 2025 Vardaan Sdn Bhd. All Rights Reserved.

bottom of page