Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends

0
Medium
Vulnerability
Published: Thu Feb 05 2026 (02/05/2026, 10:25:00 UTC)
Source: The Hacker News

Description

The Iranian state-sponsored threat group Infy (aka Prince of Persia) resumed operations in late January 2026 after a nationwide internet blackout ended. They deployed new command-and-control (C2) infrastructure using advanced techniques such as a dual C2 domain generation algorithm leveraging blockchain data and Telegram bot APIs for stealthy communications. Infy weaponized a recently disclosed one-day WinRAR vulnerability to deliver their Tornado backdoor malware, which establishes persistence and exfiltrates sensitive system data. The group’s malware uses both HTTP and Telegram channels for C2, complicating detection and mitigation. Evidence suggests targeting in Germany and India, with potential espionage campaigns against software repositories like PyPI. Infy’s operations are highly targeted, focusing on intelligence gathering and espionage aligned with Iranian strategic interests. The threat actor’s evolving tradecraft and use of multiple malware stages, including ZZ Stealer and StormKitty variants, indicate a sophisticated and persistent adversary. European organizations should be vigilant, especially those with ties to Iran or operating critical infrastructure and software supply chains.

AI-Powered Analysis

AILast updated: 02/06/2026, 08:52:23 UTC

Technical Analysis

Infy, an Iranian state-sponsored cyber espionage group active since 2004, resumed its operations following the lifting of Iran’s internet blackout in January 2026. The group ceased maintaining its C2 servers during the blackout but quickly established new infrastructure coinciding with the restoration of internet access. Infy’s latest malware iteration, Tornado version 51, employs a novel dual-method domain generation algorithm (DGA) that uses blockchain data de-obfuscation alongside traditional DGA to generate C2 domains, enhancing flexibility and resilience without requiring malware updates. The malware communicates with C2 servers over HTTP and via Telegram bot APIs, enabling covert command issuance and data exfiltration. Infy has leveraged a zero-day or one-day WinRAR vulnerability (CVE-2025-8088 or CVE-2025-6218) to deploy a self-extracting archive containing the Tornado backdoor and persistence mechanisms that evade Avast antivirus. The malware installs scheduled tasks for persistence and collects extensive system information, screenshots, and desktop files. Infy’s campaigns have targeted Germany and India, as indicated by VirusTotal uploads, and have included supply chain attacks on the Python Package Index (PyPI) repository using malicious packages to distribute ZZ Stealer, a custom StormKitty infostealer variant. The group’s use of Telegram channels and bots for C2, combined with multi-stage malware deployment and advanced evasion techniques, underscores their operational sophistication. The correlation with other Iranian groups like Charming Kitten suggests shared tactics or overlapping objectives. Infy’s focus remains on espionage, sabotage, and influence aligned with Iranian geopolitical goals, making them a persistent threat to organizations with strategic or political significance.

Potential Impact

European organizations face significant risks from Infy’s operations, particularly those involved in critical infrastructure, government, defense, technology, and software supply chains. The use of a WinRAR zero-day to deploy malware increases the attack surface, especially since WinRAR is widely used in Europe. The dual C2 communication channels (HTTP and Telegram) complicate detection and response efforts, potentially allowing prolonged undetected access. The malware’s capability to exfiltrate sensitive data, including system information and files, threatens confidentiality and intellectual property. The targeting of software repositories like PyPI raises concerns about supply chain compromise, which could affect European developers and organizations relying on open-source software. The stealthy and persistent nature of Infy’s operations could lead to espionage, data theft, and disruption of services. Additionally, the geopolitical context and Iran’s strategic interests may increase targeting of European countries with diplomatic or economic ties to Iran or those hosting Iranian diaspora communities. The threat actor’s ability to adapt and evolve tactics suggests ongoing risk and the need for continuous vigilance.

Mitigation Recommendations

European organizations should implement targeted defenses beyond generic controls. First, promptly apply patches or mitigations for the identified WinRAR vulnerabilities (CVE-2025-8088 and CVE-2025-6218) and monitor for suspicious RAR archive activity, especially self-extracting archives. Employ network monitoring for anomalous HTTP traffic and Telegram API usage, including unusual bot communications or connections to newly registered domains potentially generated by DGAs. Restrict or monitor use of Telegram and similar messaging apps on corporate networks, and consider blocking unauthorized Telegram bot traffic. Enhance endpoint detection and response (EDR) capabilities to identify persistence mechanisms such as scheduled tasks and DLL side-loading. Conduct supply chain security reviews focusing on open-source dependencies, especially PyPI packages, to detect malicious or unauthorized uploads. Use threat intelligence feeds to track Infy-related indicators and update detection rules accordingly. Implement strict application whitelisting and sandboxing for archive extraction and execution. Train security teams to recognize signs of Infy’s multi-stage malware campaigns and conduct regular threat hunting exercises focused on Iranian APT tactics. Finally, collaborate with national cybersecurity agencies for intelligence sharing and incident response support.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Article Source
{"url":"https://thehackernews.com/2026/02/infy-hackers-resume-operations-with-new.html","fetched":true,"fetchedAt":"2026-02-06T08:51:08.294Z","wordCount":1452}

Threat ID: 6985ab7ef9fa50a62feebb48

Added to database: 2/6/2026, 8:51:10 AM

Last enriched: 2/6/2026, 8:52:23 AM

Last updated: 2/6/2026, 10:40:44 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats