For the primary time in additional than three years, researchers have new details about Iran’s oldest state-level menace group.
“Prince of Persia” — also called “Infy” — is not simply the oldest identified Iranian superior persistent menace (APT). It is one of many oldest APTs in existence, rivalled solely by teams like Turla and APT1. A decade in the past, when it was first described in cybersecurity literature, researchers discovered proof that its exercise dated again to December 2004.
So why cannot you bear in mind the identify? Within the decade since, whereas its louder friends OilRig and MuddyWater have been working rampant, Prince of Persia has been conspicuously silent. In 2018, Darkish Studying was already describing it as “out of circulation,” the final main reporting on it occurred in 2021, and researchers have not heard a peep from it since 2022.
Although it could have appeared like inactivity on the time, it seems that Prince of Persia went nowhere in any respect. In a brand new report, SafeBreach has revealed not solely that the group remains to be round, however that it has been lively this complete time. It has been spying on Iranian residents, largely, plus people throughout Iraq, Turkey, India, Europe, and Canada, utilizing upgraded variations of its long-known malware households.
“It is vitally distinctive to have totally operational cyberattack infrastructure working for almost 20 years — it is in all probability the longest publicly identified menace actor who has operated with the identical arsenal,” says Tomer Bar, the writer of the report. “The menace actor has achieved this resulting from very robust persistence and through the use of superior operational safety strategies and cryptographic ideas for communication with a [command and control (C2)] server that I’ve by no means seen in my 20-plus years of expertise.”
Prince of Persia’s Stealthy C2
Prince of Persia has at all times labored with two main, customized instruments: “Foudre,” and “Tonnerre,” French for lightning and thunder, respectively.
Foudre is a light-weight, first-stage software that sends primary system info to the attackers’ C2 infrastructure. Its new model is delivered as an executable inside a Microsoft Excel file, which does not register in any respect with any antivirus engine in VirusTotal (VT). The objective of Foudre appears like triage: figuring out whether or not a sufferer is price pursuing extra deeply. In August 2022, as an illustration, the researchers noticed that after infecting them with Foudre, Prince of Persia separated a few of its victims for additional espionage, and within the different circumstances, despatched a command for Foudre to self-destruct. In contrast, Tonnerre is the heavier program used for extra concerned espionage.
If Foudre and Tonnerre are notable for something, it is how diligently they defend their C2 channels.
For instance, the brand new Tonnerre can even use the Telegram utility programming interface (API) to ship instructions and retrieve victims’ information from the consolation of a non-public Telegram group. By itself, utilizing the personal messaging app for C2 is not so distinctive — loads of menace actors do it, by embedding a Telegram API key of their backdoors’ code. Prince of Persia stands out for the way it does not embed any key inside Tonnerre, so there isn’t any relic left behind for researchers to search out and use towards it. As a substitute, Bar discovered that “it pulls the important thing from the [Tonnerre] C2 just for particular victims, which is considerably extra stealthy. It is not [utilized against] all victims in an effort to maintain the malware exercise and the Telegram group hidden.”
Much more spectacular, maybe, is how Foudre protects its C2 infrastructure, utilizing RSA signature verification. Bar explains that “the malware code features a public key and generates 100 domains of C2 servers every week utilizing a site era algorithm (DGA). The malware connects to the primary one and downloads a signature file, which is encrypted with a non-public key by the menace actor. It verifies utilizing RSA verification that the general public key is ready to decrypt the signature file. If the verification isn’t profitable, the malware will not belief the C2 and continues to the second on the checklist,” Bar explains.
It’d sound boring, but it surely’s remarkably sensible. To illustrate, for instance, {that a} cybersecurity researcher one way or the other found out how Foudre’s DGA works — a feat Bar himself achieved, by recognizing a few of its pseudo-random patterns. Even when a researcher like Bar knew what domains the malware was going to speak with, if he tried to preemptively take management of these domains, “it received’t assist, for the reason that malware will not belief this C2 server, and no takedown or sufferer evaluation may be made. That is solely doable when you’ve got the personal key, which is saved solely in Iran. On this means, nobody is ready to affect the marketing campaign.” As a bonus, he provides that exfiltrated recordsdata additionally demand the proper RSA personal key, stopping him from analyzing the trove he is been sitting on.
Bar marvels that the actual means Foudre makes use of RSA verification “is one thing that’s widespread in [non-malicious] domains, however I’ve by no means seen it utilized by a malware — even in campaigns that had been attributed to Western nation-state actors. I requested different skilled researchers, they usually additionally mentioned they’ve by no means seen it.”
Iranian Authorities Assist
Whether or not it is DGAs, Telegram, or cryptographic C2 verification, Prince of Persia’s efforts to broaden past conventional, doubtlessly weak command-and-control are finest learn within the context of its unusual historical past.
Palo Alto Networks’ Unit 42 was the primary to highlight Prince of Persia’s existence, in 2016. Quickly after, with intimate data of its infrastructure, the cybersecurity agency doubled down by sinkholing its servers. It now not had management over its victims, and the researchers gained unprecedented entry to its inside workings.
Ultimately, the menace actor was bailed out by a exceptional and largely unprecedented deus ex machina. The state-owned Telecommunication Firm of Iran stepped in to assist, blocking visitors to Unit 42’s sinkholes and redirecting the visitors but once more for the attackers’ profit.
“The menace actor realized its lesson properly from the 2016 marketing campaign takedown,” Bar says. “And it got here again with a really safe structure revealed in 2017 that has been working with none takedown since then.”
Elevate your perspective with NextTech Information, the place innovation meets perception.
Uncover the most recent breakthroughs, get unique updates, and join with a worldwide community of future-focused thinkers.
Unlock tomorrow’s tendencies as we speak: learn extra, subscribe to our e-newsletter, and change into a part of the NextTech neighborhood at NextTech-news.com

