Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsDormant Iran APT Is Still Alive, Spying on Dissidents
Dormant Iran APT Is Still Alive, Spying on Dissidents
Cybersecurity

Dormant Iran APT Is Still Alive, Spying on Dissidents

•December 18, 2025
0
Dark Reading
Dark Reading•Dec 18, 2025

Companies Mentioned

SafeBreach

SafeBreach

Palo Alto Networks

Palo Alto Networks

PANW

Microsoft

Microsoft

MSFT

Telegram

Telegram

Alamy

Alamy

Spotify

Spotify

SPOT

Apple

Apple

AAPL

Why It Matters

The revival demonstrates that even seemingly dormant nation‑state actors can maintain advanced, stealthy espionage capabilities, forcing organizations worldwide to reassess threat models for Iranian cyber activity.

Key Takeaways

  • •Prince of Persia APT active since 2004.
  • •Uses custom tools Foudre and Tonnerre.
  • •Stealthy C2 via RSA‑verified DGA and Telegram.
  • •Iranian telecom blocked sinkhole, preserving infrastructure.
  • •Targets dissidents across Middle East, Europe, Canada.

Pulse Analysis

The re‑emergence of Prince of Persia underscores a rare continuity in cyber‑espionage: an Iranian APT that has operated for nearly two decades without a public interruption. While newer groups like OilRig dominate headlines, this older actor’s persistence reveals how nation‑state actors can embed themselves deeply in target environments, leveraging long‑term intelligence collection on political opponents and diaspora communities. Its longevity also highlights the challenges security teams face when a threat’s infrastructure evolves faster than detection capabilities.

Technically, Prince of Persia distinguishes itself through a layered malware stack. The lightweight Foudre gathers system data and decides whether to self‑destruct, while the heavier Tonnerre conducts full‑scale exfiltration. Both tools hide their command‑and‑control (C2) channels using a domain‑generation algorithm that produces hundreds of domains weekly, each validated by RSA signature verification—a technique rarely seen in malware. Additionally, Tonnerre can pull Telegram API keys on‑the‑fly, allowing operators to issue commands from private groups without leaving static keys for analysts. This combination of cryptographic rigor and dynamic C2 makes traditional sinkholing ineffective.

The broader implication for defenders is clear: state‑backed actors will continue to invest in resilient, hard‑to‑disrupt infrastructures, especially when supported by national telecom entities. Organizations with employees or customers in the affected regions must prioritize threat‑intel sharing, monitor anomalous Excel‑based payloads, and consider proactive domain‑fronting defenses. As Iran’s cyber capabilities mature, the industry can expect more sophisticated, low‑profile campaigns that blend classic espionage with modern stealth tactics, demanding a shift from signature‑based detection to behavior‑centric monitoring.

Dormant Iran APT is Still Alive, Spying on Dissidents

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...