Close Menu
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Strobes Security Welcomes Ed Adams as Strategic Advisor

March 18, 2026

Your Browser Turns Against You: The Rise of AI-Driven Attacks

March 18, 2026

Enhancing AI Systems: Unlocking Visibility for Proactive Risk Detection

March 18, 2026
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance
Home » Awakening Shadows: Iran’s Silent Surveillance of Dissidents
Compliance

Awakening Shadows: Iran’s Silent Surveillance of Dissidents

Staff WriterBy Staff WriterDecember 18, 2025No Comments3 Mins Read3 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email

Quick Takeaways

  1. Resurgence of Prince of Persia: After a prolonged silence, Iran’s oldest advanced persistent threat group, “Prince of Persia,” is reportedly still operational and has been active in espionage primarily against Iranian citizens and international targets.

  2. Unique Operational Security: The group employs advanced operational security techniques, including using Telegram APIs without a hardcoded key and RSA signature verification for its command and control infrastructure, enhancing stealth and resilience.

  3. Historical Context: Despite being overshadowed by more notorious groups like OilRig and MuddyWater, Prince of Persia has adapted and improved its methods, showing remarkable persistence over nearly two decades of activity.

  4. State Support: Following a significant setback in 2016 due to cybersecurity interventions, the Iranian government intervened to restore the group’s activities, highlighting the intricate relationship between state actors and cyber operations in Iran.

Revived Threat: Prince of Persia’s Espionage

For the first time in over three years, researchers reveal crucial information about Iran’s oldest state-sponsored hacking group, known as “Prince of Persia” or “Infy.” This group, active since at least 2004, has remained mostly quiet while other Iranian actors like OilRig and MuddyWater stole the spotlight. However, a recent report confirms that despite its silence, Prince of Persia continued its operations. It has been spying on Iranian citizens and individuals in various countries, including Iraq, Turkey, and Canada. The group utilizes upgraded versions of its malware, indicating that it has not become obsolete.

The longevity of this cyberthreat surprises cybersecurity experts. A report states that Prince of Persia has operated for nearly 20 years with the same tools. This persistence showcases advanced operational security and innovative communication methods. Indeed, it appears to have stayed under the radar while continuing its espionage activities.

Innovative Infrastructure: Stealthy Operations

Prince of Persia employs two main tools called “Foudre” and “Tonnerre,” French for lightning and thunder. Foudre gathers initial data from targets and can self-destruct if deemed unnecessary. Interestingly, it operates discreetly, using a Microsoft Excel file to evade antivirus detection. Tonnerre, on the other hand, enables deeper espionage while maintaining user privacy.

Notably, these tools demonstrate remarkable security practices, particularly regarding command-and-control (C2) communications. Instead of embedding identifiable keys, which could be exposed, Tonnerre extracts keys only for specific victims. This technique minimizes traces that researchers might exploit. Moreover, Foudre employs cutting-edge RSA signature verification to ensure secure communication with its C2 servers.

The Iran government also plays a role in sustaining this threat actor. After earlier attempts by cybersecurity firms to neutralize its operations, state support has significantly bolstered Prince of Persia’s capabilities. By redirecting internet traffic away from sinkholes set up by researchers, the Iranian government has facilitated the group’s continued activities. Thus, this sophisticated and resilient malware remains an impactful threat in cyber espionage today.

Continue Your Tech Journey

Stay informed on the revolutionary breakthroughs in Quantum Computing research.

Stay inspired by the vast knowledge available on Wikipedia.

CyberRisk-V1

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleUrgent: Zero-Day Exploitation Targets Cisco Secure Email
Next Article RansomHouse RaaS Boosts Threat with Double Extortion—Data Stolen and Encrypted
Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Related Posts

C2 Implant ‘SnappyClient’ Turns Its Focus to Crypto Wallets

March 18, 2026

Hackers Launch 7-Stage Phish Attack on Outpost24

March 17, 2026

GlassWorm Malware Now Hiding in Dependencies

March 16, 2026

Comments are closed.

Latest Posts

Uncovering the Hidden Pattern Behind Cisco’s Rising Vulnerabilities

March 18, 2026

Critical Firewall Zero-Day Breach Sparks Interlock Ransomware Attacks

March 18, 2026

New iOS Exploit: Advanced Tools Targeting iPhone Users to Steal Personal Data

March 18, 2026

FancyBear Server Leak Exposes Credentials, 2FA Secrets, and NATO-Linked Targets

March 18, 2026
Don't Miss

C2 Implant ‘SnappyClient’ Turns Its Focus to Crypto Wallets

By Staff WriterMarch 18, 2026

Top Highlights The malware “SnappyClient” is a stealthy, C++-based command-and-control (C2) implant used primarily for…

Hackers Launch 7-Stage Phish Attack on Outpost24

March 17, 2026

GlassWorm Malware Now Hiding in Dependencies

March 16, 2026

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Recent Posts

  • Strobes Security Welcomes Ed Adams as Strategic Advisor
  • Your Browser Turns Against You: The Rise of AI-Driven Attacks
  • Enhancing AI Systems: Unlocking Visibility for Proactive Risk Detection
  • C2 Implant ‘SnappyClient’ Turns Its Focus to Crypto Wallets
  • Uncovering the Hidden Pattern Behind Cisco’s Rising Vulnerabilities
About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Strobes Security Welcomes Ed Adams as Strategic Advisor

March 18, 2026

Your Browser Turns Against You: The Rise of AI-Driven Attacks

March 18, 2026

Enhancing AI Systems: Unlocking Visibility for Proactive Risk Detection

March 18, 2026
Most Popular

Protecting MCP Security: Defeating Prompt Injection & Tool Poisoning

January 30, 202624 Views

The New Face of DDoS is Impacted by AI

August 4, 202523 Views

Absolute Launches GenAI Tools to Tackle Endpoint Risk

August 7, 202515 Views

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025

Categories

  • Compliance
  • Cyber Updates
  • Cybercrime and Ransomware
  • Editor's pick
  • Emerging Tech
  • Events
  • Featured
  • Insights
  • Threat Intelligence
  • Uncategorized
© 2026 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.